Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1041
Automatic generation of AppArmor security policies based on large language models
Published 2024-06-01Subjects: Get full text
Article -
1042
RELEVANT ASPECTS REGARDING THE EUROPEAN UNION INDEPENDENCE ON ENERGY IMPORTS
Published 2024-12-01Subjects: “…energy security…”
Get full text
Article -
1043
-
1044
CENTRAL ASIA IN SEARCH FOR ITS OWN WAY OF INTEGRATION
Published 2018-09-01Subjects: Get full text
Article -
1045
Evaluation of tourism ecological security and its obstacles in semi-arid river valley urban: a case study of Lanzhou, China
Published 2025-01-01Subjects: Get full text
Article -
1046
Research on energy-efficient physical-layer secure transmission mechanism in decode-and-forward cooperative networks
Published 2017-01-01Subjects: Get full text
Article -
1047
Machine learning for QoS and security enhancement of RPL in IoT-Enabled wireless sensors
Published 2024-01-01Subjects: Get full text
Article -
1048
Prerequisites for the legal mechanisms development to combat disinformation in social media in the context of national security: problem statement
Published 2021-12-01Subjects: Get full text
Article -
1049
Blockchain-enabled digital twin system for brain stroke prediction
Published 2025-01-01Subjects: “…Security and privacy…”
Get full text
Article -
1050
Trustworthy component model supporting networks reconfiguration
Published 2013-03-01Subjects: Get full text
Article -
1051
Analysis and Application of Security Risk Management Based on Business Process Granularity
Published 2013-11-01Subjects: “…security risk management…”
Get full text
Article -
1052
Time based incremental backup scheme for mobile cloud computing
Published 2016-08-01Subjects: Get full text
Article -
1053
Modeling and countermeasures of a social network-based botnet with strong destroy-resistance
Published 2017-01-01Subjects: “…network security…”
Get full text
Article -
1054
Research and implementation of data security for mobile terminal based on TEE
Published 2017-03-01Subjects: Get full text
Article -
1055
Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services
Published 2019-06-01Subjects: Get full text
Article -
1056
Quantum Key Distribution Applicability to Smart Grid Cybersecurity Systems
Published 2025-01-01Subjects: “…Smart grid security…”
Get full text
Article -
1057
Climate variability, population growth, and globalization impacting food security in Pakistan
Published 2025-02-01Subjects: Get full text
Article -
1058
Study of Mobile Internet Security Risk and End-to-End Service Security Evaluation
Published 2013-08-01Subjects: Get full text
Article -
1059
“Shoot Against the Waves”: Securitization and Militarization of Natural Disasters and Humanitarian Help in Latin America
Published 2019-05-01Subjects: Get full text
Article -
1060
THE ESSENCE AND COMPONENTS OF THREATS TO THE ECONOMIC SECURITY OF HIGHER EDUCATION INSTITUTIONS
Published 2025-01-01Subjects: Get full text
Article