Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1
-
2
Overview and prospect of 5G security
Published 2020-12-01Subjects: “…5G security…”
Get full text
Article -
3
IMPACT OF FLOODING ON HUMAN SECURITY IN NORTHERN NIGERIA
Published 2024-10-01Subjects: Get full text
Article -
4
An Assessment of Nigeria Security Sector Reform, 1999-2010
Published 2023-09-01Subjects: “…Security…”
Get full text
Article -
5
PHILOSOPHICAL AND SOCIOCULTURAL DIMENSIONS OF PERSONALITY PSYCHOLOGICAL SECURITY
Published 2018-12-01Subjects: “…security…”
Get full text
Article -
6
-
7
Security environment of the state in the context of the Ministry of Internal Affairs of Ukraine activities
Published 2023-06-01Subjects: “…security…”
Get full text
Article -
8
Human resources security as an element of economic security in region
Published 2018-06-01Subjects: “…personnel security…”
Get full text
Article -
9
Costs and benefits of business information security
Published 2023-12-01Subjects: “…information security…”
Get full text
Article -
10
Adaptive security architecture defense platform based on software defined security
Published 2020-12-01Subjects: Get full text
Article -
11
Economic security of the enterprise: The essence, structure and mechanism of ensuring
Published 2023-03-01Subjects: “…economic security; enterprise; financial security; intellectual and personnel security; information security; technical and technological security; factors; methods…”
Get full text
Article -
12
Perception technology of virtual threat for large enterprise's information security construction
Published 2016-12-01Subjects: Get full text
Article -
13
Approach to making strategies for network security enhancement based on attack graphs
Published 2009-01-01Subjects: “…network security…”
Get full text
Article -
14
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
Published 2025-01-01Subjects: Get full text
Article -
15
Legal aspects of functional security standardisation of the Internet of Things
Published 2023-09-01Subjects: Get full text
Article -
16
Formation and development of special police units: a retrospective analysis
Published 2024-03-01Subjects: Get full text
Article -
17
FEATURES OF THE CONCEPT AND CONTENT OF PUBLIC SECURITY
Published 2024-12-01Subjects: “…security; national security; public security; public order; public order; law and order; civil security…”
Get full text
Article -
18
Ontology model based on security parameters capturing process for network systems
Published 2017-02-01Subjects: “…security evaluation…”
Get full text
Article -
19
Design and implementation of national security vulnerability database
Published 2011-01-01Subjects: “…information security…”
Get full text
Article -
20
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01Subjects: “…security analysis…”
Get full text
Article