Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
621
An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework
Published 2025-02-01Subjects: Get full text
Article -
622
Evaluating the network security by the Read<sub>W</sub>rite transition model
Published 2010-01-01Subjects: Get full text
Article -
623
SOCIAL PROTECTION IN THE CONTEXT OF CLIMATE CHANGE
Published 2024-12-01Subjects: Get full text
Article -
624
Constitute the passive infrastructure in network
Published 2003-01-01Subjects: “…network security…”
Get full text
Article -
625
Digital health data security practices among health professionals in low-resource settings: cross-sectional study in Amhara Region, Ethiopia
Published 2025-02-01Subjects: Get full text
Article -
626
Design and implement of integrative access layer in campus network
Published 2014-10-01Subjects: Get full text
Article -
627
DeepRD:LSTM-based Siamese network for Android repackaged applications detection
Published 2018-08-01Subjects: Get full text
Article -
628
-
629
Automated configuration,simulation and verification platform for event-driven home automation IoT system
Published 2019-09-01Subjects: Get full text
Article -
630
Visualization analysis and design of DDoS attack
Published 2017-02-01Subjects: “…network security…”
Get full text
Article -
631
Model typowania sprawców zamachów z wykorzystaniem bojowych środków chemicznych
Published 2023-04-01Subjects: Get full text
Article -
632
Legal basis for ensuring public security and order at the regional level and the place of administrative and legal norms among them
Published 2022-12-01Subjects: Get full text
Article -
633
Text Categorization Approach for Secure Design Pattern Selection Using Software Requirement Specification
Published 2018-01-01Subjects: Get full text
Article -
634
Pumpkin and watermelon production constraints and management practices in Uganda
Published 2022-06-01Subjects: Get full text
Article -
635
User authentication scheme based on the ElGamal signature for mobile communication system
Published 2005-01-01Subjects: Get full text
Article -
636
Research on quantitative assessment model on vulnerability risk for information system
Published 2009-01-01Subjects: Get full text
Article -
637
The Urgency of Job Loss Security Program for the Protection of Human Rights
Published 2024-09-01Subjects: “…job loss security program…”
Get full text
Article -
638
Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review
Published 2024-01-01Subjects: Get full text
Article -
639
Economic security specifics in the context of digitalisation
Published 2022-06-01Subjects: Get full text
Article -
640
Motorcycle Parking Security System based on Website and QR Code Technology
Published 2023-09-01Subjects: “…Motorcycle; Security; Microcontroller ESP32; Website; Motor servo…”
Get full text
Article