Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
801
Text Categorization Approach for Secure Design Pattern Selection Using Software Requirement Specification
Published 2018-01-01Subjects: Get full text
Article -
802
Pumpkin and watermelon production constraints and management practices in Uganda
Published 2022-06-01Subjects: Get full text
Article -
803
User authentication scheme based on the ElGamal signature for mobile communication system
Published 2005-01-01Subjects: Get full text
Article -
804
Research on quantitative assessment model on vulnerability risk for information system
Published 2009-01-01Subjects: Get full text
Article -
805
The Urgency of Job Loss Security Program for the Protection of Human Rights
Published 2024-09-01Subjects: “…job loss security program…”
Get full text
Article -
806
Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review
Published 2024-01-01Subjects: Get full text
Article -
807
Economic security specifics in the context of digitalisation
Published 2022-06-01Subjects: Get full text
Article -
808
Motorcycle Parking Security System based on Website and QR Code Technology
Published 2023-09-01Subjects: “…Motorcycle; Security; Microcontroller ESP32; Website; Motor servo…”
Get full text
Article -
809
Preliminary study on the cultivation mode of innovative talents in the first-class cyber security college
Published 2019-06-01Subjects: “…cyberspace security…”
Get full text
Article -
810
Trusted fuzzy routing scheme in flying ad-hoc network
Published 2024-03-01Subjects: “…security…”
Get full text
Article -
811
Accelerated traffic replay method based on time compression
Published 2021-10-01Subjects: “…cyber security…”
Get full text
Article -
812
Privacy-preserving image processing in cloud computing
Published 2016-01-01Subjects: Get full text
Article -
813
Quantum secure communication network architecture and mobile application solution
Published 2018-09-01Subjects: Get full text
Article -
814
Risques climatiques et sécurité alimentaire et nutritionnelle au Niger : cartographie des impacts et des besoins de résilience
Published 2024-03-01Subjects: Get full text
Article -
815
Accelerated algorithm in attribute-based encryption over cloud environment
Published 2019-11-01Subjects: Get full text
Article -
816
Formal modeling and analyzing method for database security policy
Published 2015-09-01Subjects: Get full text
Article -
817
Architecture and practice of BGP internet routing visibility and security detection
Published 2021-12-01Subjects: Get full text
Article -
818
CYBERCRIME IN RUSSIA: CURRENT CHALLENGES AND GOOD PRACTICES IN COMBATING CYBERCRIME
Published 2022-04-01Subjects: Get full text
Article -
819
Intensified Drought Threatens Future Food Security in Major Food-Producing Countries
Published 2024-12-01Subjects: “…food security…”
Get full text
Article -
820
An ownership transfer protocol for wearable devices
Published 2015-12-01Subjects: Get full text
Article