Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
981
Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
Published 2021-03-01Subjects: Get full text
Article -
982
The roles of women in contemporary terrorism: Perpetrators, victims or something else?
Published 2024-01-01Subjects: Get full text
Article -
983
Ontological security dynamics in the EU accession process of North Macedonia
Published 2024-01-01Subjects: “…ontological security…”
Get full text
Article -
984
Legal regulation of relations connected to service in the Security Service of Ukraine
Published 2023-12-01Subjects: Get full text
Article -
985
Del bosque a la mesa: Conocimientos tradicionales sobre los hongos alimenticios de la comunidad P’urhepecha de Cherán K’eri
Published 2018-06-01Subjects: “…food security…”
Get full text
Article -
986
Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework
Published 2025-02-01Subjects: Get full text
Article -
987
Indonesia’s South China Sea Policy under Joko Widodo: Building Credibility in Indo-Pacific Geostrategic Circuit
Published 2023-04-01Subjects: Get full text
Article -
988
PaySwitch: Smart Contract-Based Payment Switch for Off-Chain Payment Channel Networks
Published 2025-01-01Subjects: Get full text
Article -
989
Personalized trajectory privacy preserving method based on graph partition
Published 2015-03-01Subjects: “…privacy security…”
Get full text
Article -
990
Provable data possession scheme with authentication
Published 2016-10-01Subjects: Get full text
Article -
991
STATISTICAL ANALYSIS OF INFORMATION SOCIETY DEVELOPMENT IN RUSSIAN FEDERATION
Published 2018-09-01Subjects: Get full text
Article -
992
Social financial information security risk analysis and prevention
Published 2016-03-01Subjects: Get full text
Article -
993
Security of the deployment of SDN-based IoT using blockchain
Published 2020-12-01Subjects: “…network security…”
Get full text
Article -
994
Lightweight malicious domain name detection model based on separable convolution
Published 2020-12-01Subjects: Get full text
Article -
995
Armed aggression of the Russian Federation against Ukraine as a threat to the collective security system
Published 2023-03-01Subjects: “…collective security…”
Get full text
Article -
996
Social Justice as a Principle of Social Security
Published 2022-07-01Subjects: Get full text
Article -
997
NIGERIA'S FOREIGN POLICY AND TRANSBORDER CRIME: AN OVERIEW
Published 2024-05-01Subjects: Get full text
Article -
998
Secrecy analysis for orthogonal time frequency space technique based LEO satellite communication
Published 2021-08-01Subjects: Get full text
Article -
999
Suggestions on cyber security talents cultivation
Published 2016-03-01Subjects: “…cyber security…”
Get full text
Article -
1000
Research on security defense of mobile edge computing
Published 2021-02-01Subjects: Get full text
Article