Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1961
Survey on intellectual property protection for deep learning model
Published 2022-04-01Subjects: “…neural network security…”
Get full text
Article -
1962
Assessment of the food security level in the regions of the European North of Russia based on benchmarking methodology
Published 2020-12-01Subjects: Get full text
Article -
1963
Simple power analysis attack on random pseudo operations
Published 2012-05-01Subjects: “…information security…”
Get full text
Article -
1964
AllianceBlockchain in the Governance Innovation of Internet Hospitals
Published 2024-12-01Subjects: Get full text
Article -
1965
Physical layer security performance of MF relay selection systems
Published 2021-09-01Subjects: Get full text
Article -
1966
Travel with Diabetes: A Comprehensive Review for Clinicians
Published 2023-01-01Subjects: Get full text
Article -
1967
An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare security
Published 2025-01-01Subjects: Get full text
Article -
1968
Enhancing Africa’s agriculture and food systems through responsible and gender inclusive AI innovation: insights from AI4AFS network
Published 2025-01-01Subjects: Get full text
Article -
1969
Strengthening health systems to tackle oral diseases in Africa: Africa centers for disease control and prevention’s role
Published 2025-01-01Subjects: Get full text
Article -
1970
“Moscovites” - “Non-Moscovites”: from the dichotomy of opposition to the search for identity
Published 2024-12-01Subjects: Get full text
Article -
1971
Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
Published 2025-01-01Subjects: Get full text
Article -
1972
Progress in research on active network flow watermark
Published 2014-07-01Subjects: “…network security…”
Get full text
Article -
1973
Established interpretive practice on social security contributions
Published 2023-03-01Subjects: Get full text
Article -
1974
A New Physical Layer Security Scheme Based on Adaptive Bit Channel Selection for Polar-Coded OFDM
Published 2024-01-01Subjects: Get full text
Article -
1975
Measuring coordination between land ecological security and high-quality economic development: a case of the Beijing-Tianjin-Hebei region
Published 2025-02-01Subjects: “…land ecological security (LES)…”
Get full text
Article -
1976
On Some Tendencies in Defense Policy of Germany
Published 2015-04-01Subjects: “…defense and security policy…”
Get full text
Article -
1977
Digital economic security of Russian organizations, industries and Russia as a whole
Published 2019-09-01Subjects: “…digital economic security of the organization…”
Get full text
Article -
1978
Global Mountain Safeguard Research (GLOMOS): Five Years Into Action
Published 2025-02-01Subjects: “…united nations university institute for environment and human security (unu-ehs)…”
Get full text
Article -
1979
-
1980
A model for developing dependable systems using a component‐based software development approach (MDDS‐CBSD)
Published 2023-02-01Subjects: Get full text
Article