Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
481
European Union (EU) Information Security Policies Türkay
Published 2013-11-01“…The importance and scope of these policies were examined based on the McCumber information security model, which is a comprehensive and multidimensional information security model. …”
Get full text
Article -
482
Development of multi-agent information security management system
Published 2022-12-01Subjects: “…information security management systems…”
Get full text
Article -
483
Survey on RDMA protocol applications and security protection technologies
Published 2024-04-01“…The security risks faced by RDMA applications in relevant scenarios were investigated, and a summary of the research progress in the RDMA security field over recent years was provided. …”
Get full text
Article -
484
INFORMATION SECURITY IN THE COUNTRIES OF CENTRAL ASIA: THE CASE OF KAZAKHSTAN
Published 2016-12-01Subjects: Get full text
Article -
485
Future of European Security Policies: Is Geopolitical Europe Possible?
Published 2024-03-01“…Since the aftermath of World War II, the pursuit of European autonomy in ensuring its security began with the 1950s French proposal for a pan-European defense force, though never realized. …”
Get full text
Article -
486
Joint security and performance improvement in multilevel shared caches
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
487
Security of the industrial Internet of things and localization of the core technology
Published 2018-06-01Subjects: Get full text
Article -
488
Study on Differentiated Security Service Based on Cloud Computing
Published 2013-03-01Subjects: Get full text
Article -
489
Information security of the region: Approaches to consideration and economic essence
Published 2023-05-01Subjects: “…information; information resources; information security; information technologies; threat; danger…”
Get full text
Article -
490
Research on Security Connotation and Response Strategies for Big Data
Published 2014-02-01Subjects: “…ig data security…”
Get full text
Article -
491
The Strategic Measures for the Industrial Security of Small and Medium Business
Published 2014-01-01“…The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. …”
Get full text
Article -
492
Theoretical and Practical Fundamentals for Armenia’s National Security Strategy
Published 2013-02-01Subjects: “…the national security strategy…”
Get full text
Article -
493
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01Subjects: “…security protocol…”
Get full text
Article -
494
Analysis of security extension protocol in e-mail system
Published 2020-12-01Subjects: Get full text
Article -
495
Adaptively secure attribute-based encryption for traitor tracing
Published 2016-01-01Subjects: Get full text
Article -
496
CONCEPTUAL MODELLING AND ORGANIZATION OF SECURITY MECHANISMS IN DISTRIBUTED SYSTEMS
Published 2016-10-01“…We analyze the existing DS from the point of security and construct a two-level hierarchy of models. …”
Get full text
Article -
497
Security model without managers for blockchain trading system
Published 2020-12-01Subjects: Get full text
Article -
498
6G endogenous security:architecture and key technologies
Published 2020-01-01Subjects: Get full text
Article -
499
Security technologies in 4G network for power grid
Published 2015-12-01Subjects: Get full text
Article -
500
Spatial changes management in order to ensure economic security
Published 2020-04-01Subjects: “…economic security…”
Get full text
Article