Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1561
Secure key-sharing algorithm based on smart grid
Published 2021-08-01Subjects: “…smart grid security,…”
Get full text
Article -
1562
Research on HTML5 application cache poison attack
Published 2016-10-01Subjects: “…Web security…”
Get full text
Article -
1563
DEVELOPMENT OF THE EXTERNAL ENERGY POLICY OF THE EUROPEAN UNION
Published 2013-08-01Subjects: Get full text
Article -
1564
Research of Fragment Mechanism Security in IPv6 Network Protocol
Published 2013-10-01Subjects: “…IPv6 network security…”
Get full text
Article -
1565
Efficient chosen-ciphertext secure proxy re-encryption scheme
Published 2013-07-01Subjects: Get full text
Article -
1566
Optimal relay selection scheme and outage probability analysis in cooperative wireless networks
Published 2018-11-01Subjects: “…physical layer security…”
Get full text
Article -
1567
WLAN Mesh security association scheme in trusted computing environment
Published 2014-07-01Subjects: Get full text
Article -
1568
Intrusion detection model based on non-symmetric convolution auto-encode and support vector machine
Published 2018-11-01Subjects: Get full text
Article -
1569
D. Ricardo’s theory of comparative advantages as applied to interest rate swaps in the financial market
Published 2023-11-01Subjects: Get full text
Article -
1570
Women empowerment, efficiency and food security nexus in rural Ethiopia: A generalized structural equation modeling
Published 2025-01-01Subjects: Get full text
Article -
1571
Multi‐data classification detection in smart grid under false data injection attack based on Inception network
Published 2024-10-01Subjects: Get full text
Article -
1572
A Novel Authentication Management for the Data Security of Smart Grid
Published 2024-01-01Subjects: Get full text
Article -
1573
Genesis of social security regulation for police officers in Ukraine
Published 2023-07-01Subjects: Get full text
Article -
1574
Transforming global governance: Crafting sustainable peace through Global South perspectives
Published 2024-12-01Subjects: Get full text
Article -
1575
Review of community development initiatives for poverty reduction in Southern Africa
Published 2024-08-01Subjects: Get full text
Article -
1576
-
1577
Self-corrected coefficient smoothing method based network security situation prediction
Published 2020-05-01Subjects: “…security situation…”
Get full text
Article -
1578
Service security monitoring mechanism for application server cluster
Published 2016-06-01Subjects: Get full text
Article -
1579
Research progress on cloud data assured deletion based on cryptography
Published 2016-08-01Subjects: “…cloud data security…”
Get full text
Article -
1580
Network protocol identification based on active learning and SVM algorithm
Published 2013-10-01Subjects: “…network security…”
Get full text
Article