Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
981
‘Bottom-up securitization’: A visual turn in security studies
Published 2024-03-01Subjects: “…international security…”
Get full text
Article -
982
FOOD SECURITY IN SOUTH ASIA: MAJOR CHALLENGES AND SOLUTIONS
Published 2018-05-01Subjects: “…national policies for food security…”
Get full text
Article -
983
Theories and Practices of Societal Security in the Scandinavian Countries: A Comparative Analysis
Published 2024-12-01Subjects: Get full text
Article -
984
Education as a Fundamental Element in Ensuring the National Security of the State
Published 2024-12-01Subjects: “…national security of the state…”
Get full text
Article -
985
New remote authorization protocol for vehicle diagnosis
Published 2014-11-01Subjects: “…security protocol…”
Get full text
Article -
986
Social Engineering Analysis Framework: A Comprehensive Playbook for Human Hacking
Published 2025-01-01Subjects: Get full text
Article -
987
HARMONIZATION OF INDUSTRIAL AND TRADE POLICY OF THE ENTERPRISE
Published 2018-08-01Subjects: Get full text
Article -
988
SliceScore: A Network Function Sharing Aware and Slice-Oriented DDoS Filtering Approach
Published 2025-01-01Subjects: Get full text
Article -
989
Novel approach based on neighborhood relation signature against polymorphic internet worms
Published 2011-01-01Subjects: “…information security…”
Get full text
Article -
990
-
991
-
992
Secure control plane for SDN using Bayesian Stackelberg games
Published 2017-11-01Subjects: Get full text
Article -
993
A robust scheme for securing relational data incremental watermarking
Published 2025-06-01Subjects: Get full text
Article -
994
PROBLEMS OF DIGITAL TRANSFORMATION OF UKRAINIAN CORPORATE MEDIA
Published 2024-12-01Subjects: Get full text
Article -
995
Analysis on Mobile Internet Application Security Issues Based on the Cloud Computing Mode
Published 2013-03-01Subjects: Get full text
Article -
996
The Role of Pension Funds in Financing US Federal Debt
Published 2017-03-01Subjects: Get full text
Article -
997
Secure federated learning scheme based on adaptive Byzantine defense
Published 2024-08-01Subjects: Get full text
Article -
998
MANAGING FRAUD IN CONTEMPORARY BUSINESS ENVIRONMENT, THE ROLE OF INFORMATION SECURITY MANAGEMENT: A STUDY OF QUOTED DEPOSIT MONEY BANKS (DMBs) IN NIGERIA
Published 2024-05-01Subjects: “…information security management…”
Article -
999
Research on technology of data encryption and search based on access broker
Published 2018-07-01Subjects: “…cloud security…”
Get full text
Article -
1000
TCCL:secure and efficient development of desktop cloud structure
Published 2017-10-01Subjects: Get full text
Article