Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1661
2003 Handbook of Employment Regulations Affecting Florida Farm Employers and Workers: Social Security and Medicare [Federal]
Published 2003-07-01“… The purpose of Social Security and Medicare is to provide social benefits to qualified workers who retire, become disabled, and/or require medical assistance. …”
Get full text
Article -
1662
Research on power plant security issues monitoring and fault detection using attention based LSTM model
Published 2025-01-01Subjects: Get full text
Article -
1663
Cyber-Physical System Security for Manufacturing Industry 4.0 Using LSTM-CNN Parallel Orchestration
Published 2025-01-01“…Its innovative concept, the distinctive mechanism of the PLO algorithm, and applying it in a simulated manufacturing industry make the proposed security system superior to comparable approaches.…”
Get full text
Article -
1664
Prerequisites for the legal mechanisms development to combat disinformation in social media in the context of national security: problem statement
Published 2021-12-01Subjects: Get full text
Article -
1665
-
1666
Securing safer care staff: a model for the assessment, selection and training of staff to work in residential care
Published 2006-03-01Subjects:Article -
1667
Designing the Interventions to Mitigate the Barriers of Coordination in Handling Food Security: Insight from Central Java Province
Published 2022-01-01“…This study aims to identify the underlying barriers that may prevent public policy coordination among stakeholders in dealing with food security in Central Java Province and suggest recommendations to enhance the coordination. …”
Get full text
Article -
1668
Warehouse mobile access network security associate pre-anticipated notification scheme based on AAA authentication
Published 2012-09-01Subjects: Get full text
Article -
1669
Marilena Koppa. The Evolution of the Common Security and Defence Policy: Critical Junctures and the Quest for EU Strategic Autonomy
Published 2024-04-01“…The Evolution of the Common Security and Defence Policy: Critical Junctures and the Quest for EU Strategic Autonomy. …”
Get full text
Article -
1670
Advancing hospital healthcare: achieving IoT-based secure health monitoring through multilayer machine learning
Published 2025-01-01“…Because of this, the conceptual IoT-based secure health monitoring system employs machine learning algorithms for enhanced accuracy. …”
Get full text
Article -
1671
Study of tactics and personal security measures of the dialogue police during the protection of public order at mass events
Published 2022-12-01Subjects: Get full text
Article -
1672
The Short Stint of a Coordinator: National Security Adviser H. R. McMaster in the Trump Administration
Published 2021-07-01Subjects: Get full text
Article -
1673
Secure relay node selection method based on Q-learning for fog computing in 5G network
Published 2019-07-01Subjects: Get full text
Article -
1674
RETRACTED: Security indicators and standards for microprocessor centralization in “2x2” and “1x1” systems
Published 2024-01-01Get full text
Article -
1675
Exploring Text Mining and Analytics for Applications in Public Security: an in-depth dive into a systematic literature review
Published 2023-07-01Subjects: Get full text
Article -
1676
Singapore Government Securitization Measures against Transboundary Haze Pollution as a Non-Traditional Security Threat
Published 2025-01-01“…It can be inferred that the government possesses complete authority to secure the smog issue. The community's response is critical in determining the success of haze securitization. …”
Get full text
Article -
1677
Quantum secure patient login credential system using blockchain for electronic health record sharing framework
Published 2025-02-01“…This study proposes a secure Patient Login Credential System (PLCS) for EHRS. …”
Get full text
Article -
1678
Intelligent Beam-Hopping-Based Grant-Free Random Access in Secure IoT-Oriented Satellite Networks
Published 2025-01-01“…This research presents an intelligent beam-hopping-based grant-free random access (GFRA) architecture designed for secure Internet of Things (IoT) communications in Low Earth Orbit (LEO) satellite networks. …”
Get full text
Article -
1679
Using the five-factor questionnaire to study the personality of a specialist-cynologist of the security agencies of the Russian Federation
Published 2024-11-01Subjects: Get full text
Article -
1680
Directions of the territory’s investment security mechanisms improvement in the context of digital transformation: Krasnodar Krai case study
Published 2023-03-01Subjects: “…investment security…”
Get full text
Article