Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1341
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
Published 2025-01-01Subjects: Get full text
Article -
1342
Resilience of breadfruit agro-ecosystems in Hawaiʻi during the COVID-19 pandemic
Published 2022-09-01Subjects: Get full text
Article -
1343
Identification of ecological security pattern in the Qinghai-Tibet Plateau
Published 2025-01-01Subjects: Get full text
Article -
1344
Database anomaly detection model based on mining object-condition association rules
Published 2009-01-01Subjects: “…database security…”
Get full text
Article -
1345
Botnet detecting method based on group-signature filter
Published 2010-01-01Subjects: “…network security…”
Get full text
Article -
1346
Overview of mobile communication network authentication
Published 2018-12-01Subjects: Get full text
Article -
1347
New adaptively secure key-policy attribute-based encryption scheme
Published 2012-09-01Subjects: Get full text
Article -
1348
Universally composable secure trusted access protocol for WLAN Mesh networks
Published 2008-01-01Subjects: “…universally composable security…”
Get full text
Article -
1349
Communication and Security Integrated Space-Earth Heterogeneous Network Architecture
Published 2020-12-01Subjects: Get full text
Article -
1350
Study of BGP secure scheme based on divide and conquer strategy
Published 2012-05-01Subjects: “…border gateway protocol security…”
Get full text
Article -
1351
Two-hop cover-based access control scheme for wireless sensor networks
Published 2010-01-01Subjects: Get full text
Article -
1352
Joint amplitude and phase partition based physical layer key generation method
Published 2021-05-01Subjects: Get full text
Article -
1353
Understanding transactional sex among small scale fisherfolks in Ghana
Published 2025-01-01Subjects: Get full text
Article -
1354
Biopolitical Strategies in Media Discourses: Responses to the COVID-19 Pandemic in Russia, Germany, and France
Published 2024-07-01Subjects: Get full text
Article -
1355
Environmental degradation and food security in Somalia
Published 2025-02-01Subjects: Get full text
Article -
1356
Technology and practice of intelligent governance for financial data security
Published 2023-06-01Subjects: “…financial data security…”
Get full text
Article -
1357
Web plug-in paradigm for anti-DoS attack based on end hopping
Published 2017-10-01Subjects: “…network security…”
Get full text
Article -
1358
Robust resource allocation algorithm for multicarrier NOMA security communication system
Published 2022-03-01Subjects: Get full text
Article -
1359
Vaccinations for Hajj: Enhancing health and global health security
Published 2025-01-01Subjects: Get full text
Article -
1360