Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
781
-
782
Research on OLE object vulnerability analysis for RTF file
Published 2016-01-01Subjects: Get full text
Article -
783
Agriculture urbaine comme réponse au chômage à Kinshasa, République Démocratique du Congo
Published 2011-05-01Subjects: Get full text
Article -
784
-
785
Religion and Public Policy: Digital-Based Islamic Political Economy and Human Security on Covid-19 Handling
Published 2022-07-01Subjects: Get full text
Article -
786
Transitional justice mechanisms and processes: international experience for restoring Ukraine’s sovereignty and national security
Published 2023-09-01Subjects: “…security…”
Get full text
Article -
787
Security monitoring system of intelligent substation based on IoT
Published 2018-09-01Subjects: Get full text
Article -
788
The status of the Prime Minister in the sphere of security
Published 2024-12-01Subjects: “…security…”
Get full text
Article -
789
An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework
Published 2025-02-01Subjects: Get full text
Article -
790
Evaluating the network security by the Read<sub>W</sub>rite transition model
Published 2010-01-01Subjects: Get full text
Article -
791
SOCIAL PROTECTION IN THE CONTEXT OF CLIMATE CHANGE
Published 2024-12-01Subjects: Get full text
Article -
792
Constitute the passive infrastructure in network
Published 2003-01-01Subjects: “…network security…”
Get full text
Article -
793
Digital health data security practices among health professionals in low-resource settings: cross-sectional study in Amhara Region, Ethiopia
Published 2025-02-01Subjects: Get full text
Article -
794
Design and implement of integrative access layer in campus network
Published 2014-10-01Subjects: Get full text
Article -
795
DeepRD:LSTM-based Siamese network for Android repackaged applications detection
Published 2018-08-01Subjects: Get full text
Article -
796
-
797
Automated configuration,simulation and verification platform for event-driven home automation IoT system
Published 2019-09-01Subjects: Get full text
Article -
798
Visualization analysis and design of DDoS attack
Published 2017-02-01Subjects: “…network security…”
Get full text
Article -
799
Model typowania sprawców zamachów z wykorzystaniem bojowych środków chemicznych
Published 2023-04-01Subjects: Get full text
Article -
800
Legal basis for ensuring public security and order at the regional level and the place of administrative and legal norms among them
Published 2022-12-01Subjects: Get full text
Article