Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4381
Law enforcement activities of the National Guard under martial law
Published 2024-12-01“…Its functioning is due to the threat to public security and order of the state, in particular from the Russian Federation. …”
Get full text
Article -
4382
User Needs of Online Tutoring Applications Using House of Quality
Published 2025-01-01“…Conclusion: The top user priorities for online tutoring applications are security and privacy, performance, and information. …”
Get full text
Article -
4383
-
4384
Geopolitics of the European Rule of Law — Lessons from Ukraine and the Western Balkans
Published 2022-08-01“…Abstract Several opportunities arise for rule of law promoters: to reclaim the security discourse; to explain EU enlargement through the commitment to the rule of law; and consequently, to develop a strategy to influence opponents of enlargement.…”
Get full text
Article -
4385
THE METHODOLOGY OF THE FINANCIAL PROVIDING OF ACTIVITY OF THE FEDERAL GOVERNMENT BUDGETARY INSTITUTIONS
Published 2017-01-01“…In this article considered the key principles of financing federal state budgetary institutions, analyzed the main sources of financial support activities, and also the analysis of the structure of financial security of the federal government budgetary institutions.…”
Get full text
Article -
4386
Stock price prediction with attentive temporal convolution-based generative adversarial network
Published 2025-03-01Get full text
Article -
4387
-
4388
The financial character of policing in Tunisia: collusions, extraversion and the criminalization of informality
Published 2024-07-01“…This article attempts to shed light on the development of a financial/security assemblages in Tunisia, from an international political sociology perspective that looks at the development of practices of security and policing from a transnational and postcolonial vantage point. …”
Get full text
Article -
4389
Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy
Published 2022-12-01“…To determine the level of security, a passive sniffing attack and an active Known Plaintext Attack (KPA) were tested. …”
Get full text
Article -
4390
-
4391
Understanding the Behavioral Differences Between American and German Users: A Data-Driven Study
Published 2018-12-01Get full text
Article -
4392
A dataset of Antarctic ecosystems in ice-free lands: classification, descriptions, and maps
Published 2025-01-01Get full text
Article -
4393
-
4394
Blockchain-assisted improved interval type-2 fuzzy deep learning-based attack detection on internet of things driven consumer electronics
Published 2025-01-01“…An intrusion detection system (IDS) is paramount in IoT security, as it dynamically monitors device behaviours and network traffic to detect and mitigate any possible cyber threats. …”
Get full text
Article -
4395
-
4396
-
4397
-
4398
-
4399
TRANSPORT SECTOR AND ITS ROLE IN THE IMPORT SUBSTITUTION OF AGRICULTURAL PRODUCTS: FORESIGHT
Published 2016-05-01“…It also proposes a project of factory-farm integration to ensure the economic security of our country.…”
Get full text
Article -
4400
REDUCING ELECTRICITY CONSUMPTION FOR IRON AND STEEL SMELTING
Published 2013-09-01“…It is shown that the introduction of high-temperature heating installation charge fusion provides increased security, stability of operation arc, reduced noise to 75–85 dB, the elimination of fugitive emissions in the work zone…”
Get full text
Article