Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3301
ОРГАНИЗАЦИЯ ОБРАЗОВАТЕЛЬНОГО ПРОЦЕССА ДЛЯ ДЕТЕЙ С ОГРАНИЧЕННЫМИ ВОЗМОЖНОСТЯМИ ЗДОРОВЬЯ В ОЦЕНКАХ РОДИТЕЛЕЙ И ЗАКОННЫХ ПРЕДСТАВИТЕЛЕЙ. РЕЗУЛЬТАТЫ СОЦИОЛОГИЧЕСКОГО ИССЛЕДОВАНИЯ...
Published 2025-02-01“…Society and Security Insights…”
Get full text
Article -
3302
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
3303
On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
3304
ПРАЗДНИКИ И ПРАЗДНИЧНЫЕ МЕРОПРИЯТИЯ В КОНТЕКСТЕ СОЦИАЛЬНОГО УПРАВЛЕНИЯ В СФЕРЕ КУЛЬТУРЫ: ДИЛЕММА ПРЕЕМСТВЕННОСТИ...
Published 2025-02-01“…Society and Security Insights…”
Get full text
Article -
3305
СПЕЦИФИКА ВЗАИМООБУСЛОВЛЕННОСТИ ГРАЖДАНСКОЙ ИДЕНТИФИКАЦИИ И СОЦИАЛЬНОЙ АКТИВНОСТИ НАСЕЛЕНИЯ (НА ПРИМЕРЕ ПРИГРАНИЧНЫХ РЕГИОНОВ РОССИИ)...
Published 2025-02-01“…Society and Security Insights…”
Get full text
Article -
3306
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
3307
Efficient constructions for large‐state block ciphers based on AES New Instructions
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
3308
Stacking ensemble learning with heterogeneous models and selected feature subset for prediction of service trust in internet of medical things
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
3309
New attacks against reduced Rijndael‐160
Published 2022-01-01“…IET Information Security…”
Get full text
Article -
3310
Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
3311
Seahorse nanos3 plays essential roles in germ cell development in the absence of nanos2
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
3312
Research on design and implementation of innovative UGV modular platform in mine action programs
Published 2025-02-01“…Defense and Security Studies…”
Get full text
Article -
3313
An interpretable semi‐supervised system for detecting cyberattacks using anomaly detection in industrial scenarios
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
3314
Similarity Property and Slide Attack of Block Cipher FESH
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
3315
СМИ КАК СУБЪЕКТЫ МЕДИЙНОГО ПРОСТРАНСТВА ТЮРКСКОГО МИРА: ОЦЕНКА БАЗОВЫХ ХАРАКТЕРИСТИК
Published 2025-02-01“…Society and Security Insights…”
Get full text
Article -
3316
Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
3317
Shadows of empire: post-Soviet parastates in Russian foreign policy
Published 2024-01-01“…Journal of Regional Security…”
Get full text
Article -
3318
A survey on intrusion detection system in IoT networks
Published 2025-12-01“…Cyber Security and Applications…”
Get full text
Article -
3319
Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
3320
Yoyo trick on type‐II generalised Feistel networks
Published 2021-11-01“…IET Information Security…”
Get full text
Article