Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1061
Classified risk assessment method of Android application based on multi-factor clustering selection
Published 2021-04-01Subjects: Get full text
Article -
1062
The Global Assessment of Oilseed Brassica Crop Species Yield, Yield Stability and the Underlying Genetics
Published 2022-10-01Subjects: Get full text
Article -
1063
Dynamic P2P trust model based on time-window feedback mechanism
Published 2010-01-01Subjects: “…information security…”
Get full text
Article -
1064
Exploring the talent training mode of“cybersecurity doctor”
Published 2019-06-01Subjects: Get full text
Article -
1065
A Lightweight Mitigation Technique Against a Modified Version Number Attack in IoT Networks
Published 2025-01-01Subjects: Get full text
Article -
1066
Mistaken Worlds: When “Abundance” and “Scarcity” Collide in the Colombian Amazon
Published 2016-01-01Subjects: Get full text
Article -
1067
Provable secure mutual RFID authentication protocol based on QC-MDPC code
Published 2014-11-01Subjects: Get full text
Article -
1068
Meta-analysis of water stress impact on rice quality in China
Published 2025-02-01Subjects: Get full text
Article -
1069
Survey of data possession provability proving on cloud storage
Published 2012-11-01Subjects: Get full text
Article -
1070
Research on professional learning margin of university information security teachers in China
Published 2017-07-01Subjects: “…information security…”
Get full text
Article -
1071
On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory
Published 2024-03-01Subjects: Get full text
Article -
1072
Analysis and improvement of sensor networks security protocol
Published 2011-01-01Subjects: Get full text
Article -
1073
The New Anti-Terrorism Act of the Philippines and Its Conflict with the International Human Rights System
Published 2024-03-01Subjects: Get full text
Article -
1074
Les politiques agricoles de l'Indonésie et de la Malaisie face aux impératifs de la sécurité alimentaire
Published 2014-05-01Subjects: Get full text
Article -
1075
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01Subjects: Get full text
Article -
1076
A comparison of several intrusion detection methods using the NSL-KDD dataset
Published 2024-06-01Subjects: “…Cyber Security…”
Get full text
Article -
1077
The EU-Azerbaijan Relations in the Gas Transporting Sector
Published 2022-11-01Subjects: Get full text
Article -
1078
Research on color QR code watermarking technology based on chaos theory
Published 2018-07-01Subjects: “…information security…”
Get full text
Article -
1079
Cloud-Based Transaction Fraud Detection: An In-depth Analysis of ML Algorithms
Published 2024-06-01Subjects: “…Cloud-Security, Fraud-Detection, Fraud-Transaction, ML, Evaluation, Performance.…”
Get full text
Article -
1080
Transport Corridors in the Russian Integration Projects, the Case of the Eurasian Economic Union
Published 2015-02-01Subjects: Get full text
Article