Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
881
Prerequisites for the legal mechanisms development to combat disinformation in social media in the context of national security: problem statement
Published 2021-12-01Subjects: Get full text
Article -
882
Blockchain-enabled digital twin system for brain stroke prediction
Published 2025-01-01Subjects: “…Security and privacy…”
Get full text
Article -
883
Trustworthy component model supporting networks reconfiguration
Published 2013-03-01Subjects: Get full text
Article -
884
Analysis and Application of Security Risk Management Based on Business Process Granularity
Published 2013-11-01Subjects: “…security risk management…”
Get full text
Article -
885
Time based incremental backup scheme for mobile cloud computing
Published 2016-08-01Subjects: Get full text
Article -
886
Modeling and countermeasures of a social network-based botnet with strong destroy-resistance
Published 2017-01-01Subjects: “…network security…”
Get full text
Article -
887
Research and implementation of data security for mobile terminal based on TEE
Published 2017-03-01Subjects: Get full text
Article -
888
Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services
Published 2019-06-01Subjects: Get full text
Article -
889
Quantum Key Distribution Applicability to Smart Grid Cybersecurity Systems
Published 2025-01-01Subjects: “…Smart grid security…”
Get full text
Article -
890
Climate variability, population growth, and globalization impacting food security in Pakistan
Published 2025-02-01Subjects: Get full text
Article -
891
Study of Mobile Internet Security Risk and End-to-End Service Security Evaluation
Published 2013-08-01Subjects: Get full text
Article -
892
“Shoot Against the Waves”: Securitization and Militarization of Natural Disasters and Humanitarian Help in Latin America
Published 2019-05-01Subjects: Get full text
Article -
893
THE ESSENCE AND COMPONENTS OF THREATS TO THE ECONOMIC SECURITY OF HIGHER EDUCATION INSTITUTIONS
Published 2025-01-01Subjects: Get full text
Article -
894
Classified risk assessment method of Android application based on multi-factor clustering selection
Published 2021-04-01Subjects: Get full text
Article -
895
The Global Assessment of Oilseed Brassica Crop Species Yield, Yield Stability and the Underlying Genetics
Published 2022-10-01Subjects: Get full text
Article -
896
Dynamic P2P trust model based on time-window feedback mechanism
Published 2010-01-01Subjects: “…information security…”
Get full text
Article -
897
Exploring the talent training mode of“cybersecurity doctor”
Published 2019-06-01Subjects: Get full text
Article -
898
A Lightweight Mitigation Technique Against a Modified Version Number Attack in IoT Networks
Published 2025-01-01Subjects: Get full text
Article -
899
Mistaken Worlds: When “Abundance” and “Scarcity” Collide in the Colombian Amazon
Published 2016-01-01Subjects: Get full text
Article -
900
Provable secure mutual RFID authentication protocol based on QC-MDPC code
Published 2014-11-01Subjects: Get full text
Article