Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
641
Preliminary study on the cultivation mode of innovative talents in the first-class cyber security college
Published 2019-06-01Subjects: “…cyberspace security…”
Get full text
Article -
642
Trusted fuzzy routing scheme in flying ad-hoc network
Published 2024-03-01Subjects: “…security…”
Get full text
Article -
643
Accelerated traffic replay method based on time compression
Published 2021-10-01Subjects: “…cyber security…”
Get full text
Article -
644
Privacy-preserving image processing in cloud computing
Published 2016-01-01Subjects: Get full text
Article -
645
Quantum secure communication network architecture and mobile application solution
Published 2018-09-01Subjects: Get full text
Article -
646
Risques climatiques et sécurité alimentaire et nutritionnelle au Niger : cartographie des impacts et des besoins de résilience
Published 2024-03-01Subjects: Get full text
Article -
647
Accelerated algorithm in attribute-based encryption over cloud environment
Published 2019-11-01Subjects: Get full text
Article -
648
Formal modeling and analyzing method for database security policy
Published 2015-09-01Subjects: Get full text
Article -
649
Architecture and practice of BGP internet routing visibility and security detection
Published 2021-12-01Subjects: Get full text
Article -
650
CYBERCRIME IN RUSSIA: CURRENT CHALLENGES AND GOOD PRACTICES IN COMBATING CYBERCRIME
Published 2022-04-01Subjects: Get full text
Article -
651
Intensified Drought Threatens Future Food Security in Major Food-Producing Countries
Published 2024-12-01Subjects: “…food security…”
Get full text
Article -
652
An ownership transfer protocol for wearable devices
Published 2015-12-01Subjects: Get full text
Article -
653
Qualitative analysis of it reliability and security in local government financial reporting
Published 2024-12-01Subjects: Get full text
Article -
654
Research on data integration privacy preservation mechanism for DaaS
Published 2016-04-01Subjects: “…cloud security…”
Get full text
Article -
655
COVID-19 as a Catalyst of Food Security Crisis. Whether the Existing System of Agriculture Can Remain the Same
Published 2022-12-01Subjects: Get full text
Article -
656
IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions
Published 2024-08-01Subjects: “…security protocol…”
Get full text
Article -
657
Provably secure private key protection scheme for smart mobile terminal
Published 2012-12-01Subjects: Get full text
Article -
658
A mutual authentication security scheme for mobile NFC devices
Published 2017-08-01Subjects: Get full text
Article -
659
THE RISE OF ETHNIC MILITIA, BANDITRY AND IMPLICATION ON NATIONAL SECURITY IN NIGERIA
Published 2022-05-01Subjects: Get full text
Article -
660
Ethics of Blockchain by Design: Guiding a Responsible Future for Healthcare Innovation
Published 2024-12-01Subjects: Get full text
Article