Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
561
Defense mechanism of SDN application layer against DDoS attack based on API call management
Published 2022-04-01Subjects: Get full text
Article -
562
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01Subjects: “…security protocol…”
Get full text
Article -
563
Improving farm households’ economic status to address food security in Ghana: The role of participation in nonfarm activities
Published 2025-02-01Subjects: “…Security…”
Get full text
Article -
564
Food Security in Nigeria: Enhancing Workers’ Productivity in Precision Agriculture
Published 2022-12-01Subjects: “…Food security…”
Get full text
Article -
565
Security of intelligent edge computing:a survey
Published 2018-07-01Subjects: Get full text
Article -
566
CRITICAL INFRASTRUCTURE PROTECTION - STRATEGIC OPPORTUNITIES
Published 2025-03-01Subjects: Get full text
Article -
567
-
568
Suggestion on establishing curriculum system for information security major
Published 2016-07-01Subjects: “…information security…”
Get full text
Article -
569
BSAMS: Blockchain-Based Secure Authentication Scheme in Meteorological Systems
Published 2023-03-01Subjects: Get full text
Article -
570
Key Technology and Application of Next-Generation UICC with Remote Management Capability
Published 2015-03-01Subjects: Get full text
Article -
571
Research on Anti-Trojan Malware Mechanism Based on Characteristic Behavior
Published 2014-11-01Subjects: Get full text
Article -
572
Information Security Management in Small Public Sector Organizations: Requirements and Design of a Procedural Approach
Published 2023-12-01Subjects: Get full text
Article -
573
Community Development in the Rural Areas through Traditional Indigenous Knowledge
Published 2019Subjects: “…Community Development, Indigenous Knowledge, Peace and Security…”
Get full text
Article -
574
The Russian Federation subjects budgets as a financial basis for their economic security
Published 2022-11-01Subjects: Get full text
Article -
575
Host security threat analysis approach for network dynamic defense
Published 2018-04-01Subjects: “…cyber security…”
Get full text
Article -
576
United Nations - African Union Cooperation In Conflict Prevention, Peacekeeping and Peacebuildin
Published 2015-12-01Subjects: Get full text
Article -
577
An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning
Published 2022-05-01Subjects: Get full text
Article -
578
Research of duality and multi-level security model based on intransitive noninterference theory
Published 2009-01-01Subjects: “…multi-level security…”
Get full text
Article -
579
The situation in Afghanistan and its possible evolution in the context of the "factor 2014"
Published 2013-04-01Subjects: Get full text
Article -
580
Improving the level of food security of the region: cluster approach
Published 2021-10-01Subjects: “…economic security…”
Get full text
Article