Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
381
A topology-guided high-quality solution learning framework for security-constraint unit commitment based on graph convolutional network
Published 2025-03-01Subjects: “…Security-constrained unit commitment…”
Get full text
Article -
382
CENTRAL ASIA IN SEARCH FOR ITS OWN WAY OF INTEGRATION
Published 2018-09-01Subjects: Get full text
Article -
383
Evaluation of tourism ecological security and its obstacles in semi-arid river valley urban: a case study of Lanzhou, China
Published 2025-01-01Subjects: Get full text
Article -
384
Prerequisites for the legal mechanisms development to combat disinformation in social media in the context of national security: problem statement
Published 2021-12-01Subjects: Get full text
Article -
385
Blockchain-enabled digital twin system for brain stroke prediction
Published 2025-01-01Subjects: “…Security and privacy…”
Get full text
Article -
386
Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services
Published 2019-06-01Subjects: Get full text
Article -
387
Quantum Key Distribution Applicability to Smart Grid Cybersecurity Systems
Published 2025-01-01Subjects: “…Smart grid security…”
Get full text
Article -
388
Climate variability, population growth, and globalization impacting food security in Pakistan
Published 2025-02-01Subjects: Get full text
Article -
389
“Shoot Against the Waves”: Securitization and Militarization of Natural Disasters and Humanitarian Help in Latin America
Published 2019-05-01Subjects: Get full text
Article -
390
The Global Assessment of Oilseed Brassica Crop Species Yield, Yield Stability and the Underlying Genetics
Published 2022-10-01Subjects: Get full text
Article -
391
A Lightweight Mitigation Technique Against a Modified Version Number Attack in IoT Networks
Published 2025-01-01Subjects: Get full text
Article -
392
Mistaken Worlds: When “Abundance” and “Scarcity” Collide in the Colombian Amazon
Published 2016-01-01Subjects: Get full text
Article -
393
On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory
Published 2024-03-01Subjects: Get full text
Article -
394
A comparison of several intrusion detection methods using the NSL-KDD dataset
Published 2024-06-01Subjects: “…Cyber Security…”
Get full text
Article -
395
Cloud-Based Transaction Fraud Detection: An In-depth Analysis of ML Algorithms
Published 2024-06-01Subjects: “…Cloud-Security, Fraud-Detection, Fraud-Transaction, ML, Evaluation, Performance.…”
Get full text
Article -
396
Transport Corridors in the Russian Integration Projects, the Case of the Eurasian Economic Union
Published 2015-02-01Subjects: Get full text
Article -
397
Enhancing Democratic Processes: A Survey of DRE, Internet, and Blockchain in Electronic Voting Systems
Published 2025-01-01Subjects: Get full text
Article -
398
Stress, nutrients and genotype: understanding and managing asparagine accumulation in wheat grain
Published 2020-07-01Subjects: Get full text
Article -
399
-
400
Editorial: Multilevel medical security systems and big data in healthcare: trends and developments
Published 2025-01-01Subjects: “…multilevel medical security systems…”
Get full text
Article