Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
761
Private data access control model based on block chain technology in the internet of things environment
Published 2022-12-01Subjects: Get full text
Article -
762
Safeguarding Nigeria: strategies for combating insurgency and terrorism
Published 2024-12-01Subjects: Get full text
Article -
763
Construction and Application for Operation-BusinessOriented Mobile GIS Service Platform
Published 2015-06-01Subjects: Get full text
Article -
764
A Secure Image Steganography Using Shark Smell Optimization and Edge Detection Technique
Published 2022-10-01Subjects: Get full text
Article -
765
Key distribution scheme of wireless sensor networks based on logic grid
Published 2009-01-01Subjects: Get full text
Article -
766
LiteST: a lightweight secure time synchronization protocol for wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
767
Hunger Solution: One-Dimensional and Multi-Dimensional Food Security Programs
Published 2018-12-01Subjects: Get full text
Article -
768
-
769
Dynamics of the Indonesian Parliament in Formulating Food Laws to Achieve Food Security at the End of the New Order
Published 2024-07-01Subjects: Get full text
Article -
770
Research on Satellite Internet Security Protection Based on Zero Trust
Published 2021-09-01Subjects: Get full text
Article -
771
Scheme for identifying malware traffic with TLS data based on machine learning
Published 2020-02-01Subjects: “…transport layer security…”
Get full text
Article -
772
Azerbaijan-Türkiye Relations in the Context of Security Community: One Nation, Two States
Published 2024-12-01Subjects: “…security community…”
Get full text
Article -
773
Evolution entropy risk assessment of ERP information security based on the business process
Published 2012-09-01Subjects: Get full text
Article -
774
Two new color (n, n)-secret sharing schemes
Published 2007-01-01Subjects: “…data security…”
Get full text
Article -
775
Correcting the security definition of the Bellare-Rogaway 3PKD model
Published 2007-01-01Subjects: “…security model…”
Get full text
Article -
776
Information Assurance Framework of Military Cloud
Published 2015-12-01Subjects: Get full text
Article -
777
Research on evolution and security risk of Metaverse
Published 2022-04-01Subjects: Get full text
Article -
778
Role-based abstract modeling of blockchain auction contracts and verification of temporal security and fairness
Published 2024-10-01Subjects: Get full text
Article -
779
Efficient and secure electronic evidence exchange scheme for internet of things
Published 2025-01-01Subjects: Get full text
Article -
780
Analysis of security extension protocol in e-mail system
Published 2020-12-01Subjects: Get full text
Article