Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
781
The relationship of security needs with irrational beliefs among medical students
Published 2022-03-01Subjects: Get full text
Article -
782
Security sharing and associated deleting scheme for multi-replica in cloud
Published 2015-11-01Subjects: Get full text
Article -
783
Governmental approaches to food security management: A bibliometric analysis
Published 2024-07-01“…The analysis showed an exponential increase in the number of publications since 2000, with peaks in 2008 (financial crisis), 2019–2020 (COVID-19), and 2023 (threat to food security due to military conflicts). The clustering of scientific papers by content showed that the most significant (red) cluster unites research that links food security to agricultural development, sustainable development, climate change, and water supply. …”
Get full text
Article -
784
THE THEORY OF ECONOMIC SECURITY IN THE CONTEXT OF THE ACHIEVEMENTS OF DIFFERENT ECONOMIC SCHOOLS
Published 2016-07-01Subjects: “…economic security…”
Get full text
Article -
785
NATIONAL SECURITY: A RE-ENGAGEMENT WITH CONCEPTS, STRUCTURES, AND PLANS
Published 2022-05-01Subjects: “…Security…”
Get full text
Article -
786
Syria in Turkey-US Relations: Security, Terror and Strategic Dilemmas
Published 2024-09-01“…Turkey’s national security strategies and its cooperation dynamics with the US can be reshaped through diplomatic negotiations and strategic cooperation mechanisms. …”
Get full text
Article -
787
Data security and protection techniques in big data:a survey
Published 2016-04-01Subjects: Get full text
Article -
788
Integrating PCA and DEA techniques for strategic assessment of network security
Published 2023-03-01Subjects: Get full text
Article -
789
A Cooperative Model for IS Security Risk Management in Distributed Environment
Published 2014-01-01“…Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. …”
Get full text
Article -
790
Research on Satellite Internet Security Protection Based on Zero Trust
Published 2021-09-01Subjects: Get full text
Article -
791
The Americas after September 11. Hemispheric Integration and Human Security
Published 2003-01-01Get full text
Article -
792
Recent progress in the security evaluation of multivariate public‐key cryptography
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
793
Correcting the security definition of the Bellare-Rogaway 3PKD model
Published 2007-01-01Subjects: “…security model…”
Get full text
Article -
794
Security Problems and Solutions of Smart Terminal Mobile Operating System
Published 2015-03-01Subjects: Get full text
Article -
795
Challenges and innovative solutions of space-ground integrated network security
Published 2024-06-01Subjects: Get full text
Article -
796
Evolution,characteristics and revelation of the US cyber-security review system
Published 2019-12-01Subjects: Get full text
Article -
797
Efficient and secure electronic evidence exchange scheme for internet of things
Published 2025-01-01Subjects: Get full text
Article -
798
Coding-aware secure routing for multi-hop wireless networks
Published 2012-06-01Subjects: Get full text
Article -
799
Trust based secure routing algorithm for wireless sensor networks
Published 2008-01-01Subjects: Get full text
Article -
800
Ensuring the Security of the Educational Environment: Cases of US, Russia and Europe
Published 2015-08-01Subjects: Get full text
Article