Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
421
Exploiting statistical effective fault attack in a blind setting
Published 2023-07-01Subjects: Get full text
Article -
422
EU’s strategy and practice of 5G network security
Published 2020-06-01Subjects: Get full text
Article -
423
Research and practice of SASE cloud security
Published 2022-01-01Subjects: “…cloud security…”
Get full text
Article -
424
Geopolitical choice of the national security ideology: the example of Ukraine
Published 2023-04-01Subjects: Get full text
Article -
425
The concept of security in German foreign policy
Published 2024-08-01Subjects: Get full text
Article -
426
The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia
Published 2024-11-01Subjects: Get full text
Article -
427
ESTIMATION OF ENERGY SECURITY OF AZERBAIJAN REPUBLIC WITH DUE ACCOUNT OF TENDENCY INFLUENCE ON INDICATORS’ CHANGES
Published 2014-02-01Subjects: “…energy security…”
Get full text
Article -
428
Patterns of economically safe restructuring of Russian industry
Published 2022-11-01Subjects: Get full text
Article -
429
-
430
L’agrobiodiversité végétale au sein des paysages forestiers utilisés par les communautés Baka et Konabembé au Sud-Est Cameroun
Published 2018-06-01Subjects: “…food security…”
Get full text
Article -
431
Research on IoT device identification based on blockchain
Published 2018-06-01Subjects: Get full text
Article -
432
An Entropy Based Anomaly Traffic Detection Approach in SDN
Published 2015-09-01Subjects: Get full text
Article -
433
VNF lifecycle security management measures in NFV
Published 2016-11-01Subjects: Get full text
Article -
434
Research on relay related handover security in LTE-A
Published 2013-08-01Subjects: Get full text
Article -
435
Security Management Technology of Multilayer Satellite Internet Based on Blockchain
Published 2022-03-01Subjects: Get full text
Article -
436
EFFECT OF PERCEIVED EASE OF USE AND SECURITY OF E-BANKING ON CUSTOMER SATISFACTION
Published 2022-12-01Subjects: Get full text
Article -
437
Les effets paradoxaux du transfert des forces de sécurité en Tunisie (juin 1955-mars 1956)
Published 2024-07-01Subjects: Get full text
Article -
438
Upgrade of the dedicated network for the Department of Ecology and Environment based on SDWAN bearer technology
Published 2024-05-01Subjects: Get full text
Article -
439
Trustworthy network based on blockchain technology
Published 2019-10-01Subjects: Get full text
Article -
440