Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
501
Designing a Future Study Model: Examining Bank Employees’ Attitudes Towards Job Security in the Era of Blockchain Technology (Horizon 2031)
Published 2024-12-01Subjects: Get full text
Article -
502
Research towards IoT-oriented universal control system security model
Published 2012-11-01Subjects: Get full text
Article -
503
Research on key technology of vulnerability threat classification
Published 2012-09-01Subjects: “…information security…”
Get full text
Article -
504
Efficient and safe software defined network topology discovery protocol
Published 2023-12-01Subjects: Get full text
Article -
505
-
506
ANATOMY OF CAUSES AND EFFECTS OF THE FARMER-HERDER CONFLICT ON FOOD SECURITY IN BENUE STATE, 2015-2023
Published 2024-05-01Subjects: Get full text
Article -
507
Improvement Options and Directions for Crisis Management Exercises Organised by Local Governmental Administration on the Example of Podkarpackie Voivodship — Theoretical Assumption...
Published 2024-12-01Subjects: “…security…”
Get full text
Article -
508
Review of cloud based trust model
Published 2011-01-01Subjects: “…evaluate information security…”
Get full text
Article -
509
USING COAL AS A PRESSURE INSTRUMENT OR ENERGY WEAPON
Published 2022-12-01Subjects: “…energy security…”
Get full text
Article -
510
Plaider la « bonne gouvernance sécuritaire » au Maroc : Domestiquer les savoirs de réforme en régime de contrainte consensuelle
Published 2024-09-01Subjects: Get full text
Article -
511
Quelques grammes d’histoire pour des tonnes de riz : produire plus suffira-t-il à éradiquer la faim dans le monde ?
Published 2008-11-01Subjects: Get full text
Article -
512
Research on Intelligent Security Access Platform Based on SDN
Published 2023-09-01Subjects: Get full text
Article -
513
IoT and Cloud Computing Issues, Challenges and Opportunities: A Review
Published 2021-03-01Subjects: “…Internet of Things, IoT, Cloud Computing, Privacy, Security.…”
Get full text
Article -
514
Security analysis and improvement of two attribute-based signature schemes
Published 2016-10-01Subjects: Get full text
Article -
515
Causes and optimization of the false alarm rate of code review system
Published 2020-12-01Subjects: Get full text
Article -
516
PRODUCTION AND SECURITY OF FOOD IN GLOBAL CIRCLE
Published 2022-12-01Subjects: Get full text
Article -
517
Protocol for public opinion survey, Ecuador 2025
Published 2025-02-01Subjects: Get full text
Article -
518
Strategic guidelines on the development of renewable energy sources
Published 2019-08-01Subjects: “…energy security…”
Get full text
Article -
519
-
520
Police crime in 1947 in the coverage of the Ukrainian SSR state security agencies
Published 2022-12-01Subjects: Get full text
Article