Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 5
- Computer networks 4
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
7321
Derin Öğrenme Modellerinde Mahremiyet ve Güvenlik Üzerine Bir Derleme Çalışması
Published 2021-10-01Subjects: Get full text
Article -
7322
Yakut diocese in 1917 (based on materials from the regional press)
Published 2020-12-01Subjects: “…bulletin of yakut public security committee…”
Get full text
Article -
7323
La guerra en Gaza y el conflicto palestino-israelí: Un punto de inflexión en medio de un ciclo sin fin de violencia
Published 2024-01-01Subjects: Get full text
Article -
7324
MODERN ISSUES OF DEVELOPING INNOVATIVE PRODUCTS IN COMMERCIAL BANKS
Published 2022-05-01Subjects: Get full text
Article -
7325
REPO AS A SOURCE TO MAINTAIN LIQUIDITY FOR CREDIT ORGANISATIONS
Published 2022-05-01Subjects: Get full text
Article -
7326
-
7327
THE LEGAL AND POLITICS BASES OF NATIONAL SECURTY OF RUSSIA: INTERNATIONAL ASPECT
Published 2022-10-01Subjects: “…legal basis of state policy in the field of national security…”
Get full text
Article -
7328
MANAGING THE USE OF DERIVATIVE INSTRUMENTS FOR PORTFOLIO RISK PURPOSES
Published 2017-05-01Subjects: Get full text
Article -
7329
-
7330
A HYBRID APPROACH FOR MALARIA CLASSIFICATION USING CNN-BASED FEATURE EXTRACTION AND TRADITIONAL MACHINE LEARNING CLASSIFIERS
Published 2025-07-01Subjects: “…Web vulnerabilities, feature extraction, feature selection, data mining, supervised machine learning, phishing websites, cyber security, and phishing identification…”
Get full text
Article -
7331
Enhancing Secure Software Development with AZTRM-D: An AI-Integrated Approach Combining DevSecOps, Risk Management, and Zero Trust
Published 2025-07-01Subjects: Get full text
Article -
7332
-
7333
Artificial Noise Injection–Based Secrecy Improvement for FSO Systems
Published 2021-01-01Subjects: Get full text
Article -
7334
Comprehensive Physical Layer Security Analysis of FSO Communications Over Málaga Channels
Published 2020-01-01Subjects: Get full text
Article -
7335
Secure Transmission for Energy Efficient Parallel Mixed FSO/RF System in Presence of Independent Eavesdroppers
Published 2022-01-01Subjects: “…Physical layer security (PLS)…”
Get full text
Article -
7336
THE PLACE OF «SBERBANK» ON THE MODERN FINANCIAL MARKET
Published 2022-03-01Subjects: Get full text
Article -
7337
-
7338
Blockchain Technology in Supply Chain Management Prospects and Challenges for Implementation
Published 2025-01-01Subjects: Get full text
Article