Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
421
Conceptual and Institutional Aspects of EU Energy Policy (1990-2014)
Published 2015-02-01Subjects: “…energy security…”
Get full text
Article -
422
Axiomatic approach to ensuring nuclear safety and nuclear deterrence in the interests of the Russian Arctic region sustainable development
Published 2023-12-01Subjects: Get full text
Article -
423
National interests in Russia’s foreign policy
Published 2024-03-01Subjects: “…national security…”
Get full text
Article -
424
Investigating the effect of sense of security and perceived value on tourists\' spatial attachment Case Study (Zanjan Province)
Published 2022-09-01Subjects: “…feelings of security…”
Get full text
Article -
425
Behavior-oriented inside network security situation modeling and analysis
Published 2016-08-01Subjects: Get full text
Article -
426
Counterterrorism in the Southern American Cone
Published 2024-12-01Subjects: “…Counterterrorism, UNASUR, Argentina, Brazil, Chile, Security Assemblages.…”
Get full text
Article -
427
-
428
-
429
Design of United Identity Authentication and Key Agreement Protocol for Hybrid Cloud
Published 2014-04-01Subjects: Get full text
Article -
430
Spoofing detection on adaptive authentication System‐A survey
Published 2022-03-01Subjects: Get full text
Article -
431
Research on continuous monitoring of cloud computing service
Published 2016-10-01Subjects: Get full text
Article -
432
EPN:encryption padding for NTRU with provable security
Published 2008-01-01Subjects: Get full text
Article -
433
Discrete propagation model of CDC-based benign worms
Published 2007-01-01Subjects: “…network security…”
Get full text
Article -
434
-
435
Discussion on Key Issue of Batch Testing About the Security of Mobile Application
Published 2014-12-01Subjects: Get full text
Article -
436
The influence of the great powers on the national interests of the Republic of Serbia
Published 2023-01-01Subjects: Get full text
Article -
437
To the problem of optimization of criteria for evaluating the effectiveness of providing the national security of the State
Published 2022-03-01Subjects: Get full text
Article -
438
An Improved Network Risk Evaluation Metbod Based on Markov Game
Published 2014-07-01Subjects: “…network security…”
Get full text
Article -
439
A quantifiable cloud computing platform security evaluation model
Published 2020-07-01Subjects: Get full text
Article -
440
RETHINKING CLIMATE CHANGE AND NATIONAL SECURITY: IMPLICATIONS FOR SUSTAINABLE DEVELOPMENT IN NIGERIA
Published 2024-12-01Subjects: Get full text
Article