Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
521
Host security assessment method based on attack graph
Published 2022-02-01Subjects: “…host security…”
Get full text
Article -
522
ECONOMIC SECURITY OF A TECHNICAL UNIVERSITY: CONCEPTUAL BASES
Published 2016-12-01Subjects: Get full text
Article -
523
Reverse teaching design of curriculum ideological and political in information security major—Take the wireless communication network security course of Xidian University as an example
Published 2021-06-01Subjects: “…information security…”
Get full text
Article -
524
-
525
D. Ricardo’s theory of comparative advantages as applied to interest rate swaps in the financial market
Published 2023-11-01Subjects: Get full text
Article -
526
-
527
THE ANALYSIS OF DAHIYA DOCTRINE IN THE CONTEXT OF ISRAEL’S FURTHER SECURITY CLAIM
Published 2018-06-01Subjects: Get full text
Article -
528
Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
Published 2014-01-01“…We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. …”
Get full text
Article -
529
Translocality, Remittances, and Food Security in the Ghana-Qatar Migration Corridor
Published 2025-01-01“…The findings reveal that cash remittances play a crucial role in enhancing food security and the overall welfare of households in Ghana. …”
Get full text
Article -
530
Behavior-oriented inside network security situation modeling and analysis
Published 2016-08-01Subjects: Get full text
Article -
531
Host security threat analysis approach for network dynamic defense
Published 2018-04-01Subjects: “…cyber security…”
Get full text
Article -
532
Secure IoT data dissemination with blockchain and transfer learning techniques
Published 2025-01-01“…However, most existing systems for storing and disseminating IoT data streams lack reliability, security, and transparency, primarily due to centralized architectures that create single points of failure. …”
Get full text
Article -
533
The Analysis of Conformity of Proliferation Security Initiative Rules with International Law
Published 2021-01-01Subjects: “…security council…”
Get full text
Article -
534
Security flaws and improvement to a wireless authentication protocol with anonymity
Published 2006-01-01Subjects: Get full text
Article -
535
Secure control plane for SDN using Bayesian Stackelberg games
Published 2017-11-01Subjects: Get full text
Article -
536
A robust scheme for securing relational data incremental watermarking
Published 2025-06-01Subjects: Get full text
Article -
537
Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks
Published 2013-10-01Get full text
Article -
538
CYCLIC SYSTEM FOR TRAINING SPECIALISTS OF ECONOMIC SECURITY OF ENTERPRISES AND ORGANIZATIONS
Published 2020-09-01Subjects: Get full text
Article -
539
Efficient and provably-secure certificateless sequential aggregate signature scheme
Published 2022-05-01Get full text
Article -
540
Characteristics of security risks of large industrial investments and their management principles
Published 2025-01-01Subjects: “…Industrial investment, risk assessment, asset security, data protection…”
Get full text
Article