Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
941
Azerbaijan-Türkiye Relations in the Context of Security Community: One Nation, Two States
Published 2024-12-01Subjects: “…security community…”
Get full text
Article -
942
Evolution entropy risk assessment of ERP information security based on the business process
Published 2012-09-01Subjects: Get full text
Article -
943
Two new color (n, n)-secret sharing schemes
Published 2007-01-01Subjects: “…data security…”
Get full text
Article -
944
Information Assurance Framework of Military Cloud
Published 2015-12-01Subjects: Get full text
Article -
945
Research on evolution and security risk of Metaverse
Published 2022-04-01Subjects: Get full text
Article -
946
Role-based abstract modeling of blockchain auction contracts and verification of temporal security and fairness
Published 2024-10-01Subjects: Get full text
Article -
947
Efficient and secure electronic evidence exchange scheme for internet of things
Published 2025-01-01Subjects: Get full text
Article -
948
Analysis of security extension protocol in e-mail system
Published 2020-12-01Subjects: Get full text
Article -
949
Research on Operators Mobile Malware Protection Architecture and Key Technologies
Published 2014-01-01Subjects: “…mobile internet security…”
Get full text
Article -
950
Interdomain routing instability traceable detection method based on route state causal chain
Published 2021-12-01Subjects: “…interdomain routing security…”
Get full text
Article -
951
Influence of Internet plus on cyberspace security and the technology development trend in Internet plus era
Published 2017-05-01Subjects: Get full text
Article -
952
Securing E.U. Democracy and Citizenship at what Costs? Reflections on Defence Spendings Between North-South and West-East Divergens
Published 2024-12-01Subjects: Get full text
Article -
953
Democracia política como plataforma para a expansão de direitos na América Latina
Published 2019-01-01Subjects: Get full text
Article -
954
Code security of mobile backup modules on the Android platform
Published 2017-01-01Subjects: Get full text
Article -
955
Analysis of the implications of digital voting through neutrosophic Delphi modeling
Published 2024-11-01Subjects: Get full text
Article -
956
-
957
Research on Satellite Internet Security Simulation Test Technology
Published 2023-06-01Subjects: Get full text
Article -
958
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Published 2025-01-01Subjects: Get full text
Article -
959
Shanxi province food security evaluation research
Published 2025-01-01Subjects: “…Food security…”
Get full text
Article -
960