Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1781
Theoretical Approaches to Nuclear Proliferation
Published 2015-08-01Subjects: Get full text
Article -
1782
-
1783
Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
Published 2025-01-01Subjects: Get full text
Article -
1784
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01Subjects: “…Web application security…”
Get full text
Article -
1785
Technology evolution and application innovation of industrial PON
Published 2024-12-01Subjects: Get full text
Article -
1786
Modelling the Impacts of Climate Change on the Yield of Crops
Published 2021-12-01Subjects: Get full text
Article -
1787
Business or Security? Goals and Decision-Making Inside the French Oil Policy of the 1920s
Published 2022-03-01Subjects: Get full text
Article -
1788
SAT-based lazy formal analysis method for security protocols
Published 2014-11-01Subjects: “…security protocols…”
Get full text
Article -
1789
Legal support for information security of legal entities under Lithuanian and Ukrainian legislation
Published 2023-12-01Subjects: “…information security…”
Get full text
Article -
1790
ANALYSIS OF LEVEL OF THE RUSSIAN DIGITAL ECONOMY DEVELOPMENT
Published 2018-08-01Subjects: Get full text
Article -
1791
Staff Management in Social Security Hospitals in Tehran: Challenges and Solutions
Published 2024-05-01Subjects: Get full text
Article -
1792
Integrating PCA and DEA techniques for strategic assessment of network security
Published 2023-03-01Subjects: Get full text
Article -
1793
AKADEMİK YAŞANTIDA SANAL TEHDİTLER VE VAKALAR ÜZERİNE BİR ANALİZ - AN ANALYSIS THROUGH CASES AND CYBER THREATS IN ACADEMIC LIFE
Published 2018-06-01Subjects: “…information security…”
Get full text
Article -
1794
Links between protein-source diversity, household behavior, and protein consumption inadequacy in the Indian rural semi-arid tropics
Published 2025-02-01Subjects: Get full text
Article -
1795
Comparison of Rice Yield among Farmer's Fertilizer Practices
Published 2025-01-01Subjects: Get full text
Article -
1796
Survey on the privacy-preserving content based image retrieval
Published 2019-08-01Subjects: Get full text
Article -
1797
Designing a cyber insurance implementation model using foundational data theory
Published 2024-05-01Subjects: Get full text
Article -
1798
Readiness of Higher Education Institutions for Digital Transformation Processes
Published 2021-07-01Subjects: Get full text
Article -
1799
Challenges and innovative solutions of space-ground integrated network security
Published 2024-06-01Subjects: Get full text
Article -
1800
IMPACT OF PENSION SYSTEM REFORMS ON PUBLIC FINANCE EXPENDITURES IN POLAND
Published 2019-12-01Subjects: Get full text
Article