Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
341
Quantitative threat situational assessment method for higher secure attribute value device
Published 2020-10-01Subjects: Get full text
Article -
342
Research on cloud computing users’ public safety trust model based on scorecard-random forest
Published 2018-05-01Subjects: “…cloud computing security…”
Get full text
Article -
343
Practice on edge cloud security of telecom operators
Published 2023-04-01Subjects: Get full text
Article -
344
Extra-Legal Actions of the Security Council in Violation of Fundamental Human Rights
Published 2024-09-01Subjects: “…security council…”
Get full text
Article -
345
Security & safety issues and endogenous security for intelligent connected vehicles
Published 2024-12-01Subjects: Get full text
Article -
346
THE ROLE OF INTERNATIONAL LEGAL INSTRUMENTS IN THE FORMATION OF A SECURITY ENVIRONMENT
Published 2024-05-01Subjects: “…security environment, international legal instrument, information security, international terrorism, international obligations.…”
Get full text
Article -
347
Legal bases for counteracting financial terrorism
Published 2021-09-01Subjects: “…economic security…”
Get full text
Article -
348
Application of the Gordon Loeb model to security investment metrics: a proposal
Published 2024-12-01Subjects: Get full text
Article -
349
Security flaws and improvement to a wireless authentication protocol with anonymity
Published 2006-01-01Subjects: Get full text
Article -
350
The Impact of Peatland Damage and Its Influence on Food Security Policy in Sungai Apit Sub-District in 2023
Published 2025-01-01Subjects: Get full text
Article -
351
Survey on network security based on blockchain
Published 2018-03-01Subjects: “…network security…”
Get full text
Article -
352
HTTP behavior characteristics generation and extraction approach for Android malware
Published 2016-08-01Subjects: Get full text
Article -
353
-
354
AGRICULTURE AS A UNIFER OF SECURITY AND DEVELOPMENT IN THE FACE OF FREE MARKET CHALLENGES
Published 2024-12-01Subjects: “…security…”
Get full text
Article -
355
Pengaruh Job Security dan Leader Safety Commitment terhadap Work Engagement Karyawan Selama Pandemi Covid-19
Published 2022-05-01Subjects: Get full text
Article -
356
Design of multi-key encryption method
Published 2020-11-01Subjects: “…information security…”
Get full text
Article -
357
-
358
A lightweight and trusted communication protocol for IoT
Published 2021-11-01Subjects: Get full text
Article -
359
Exposição Universal 2015: luzes e sombras sobre a insegurança e a ajuda alimentar na Europa
Published 2017-01-01Subjects: Get full text
Article -
360
Terrorismo extremo e os tensionamentos nas democracias
Published 2005-01-01Subjects: Get full text
Article