Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1861
The State of the Arctic Problems of the Nenets Autonomous Okrug and Prospects of their Solution
Published 2024-08-01Subjects: “…strategy for developing the russian arctic zone and ensuring national security until 2035…”
Get full text
Article -
1862
Which dietary shifts to improve nutritional quality while reducing diet cost in the French West Indies?
Published 2025-01-01Subjects: Get full text
Article -
1863
Security Vetting of Judges and Lessons from One Albanian Case
Published 2024-07-01Subjects: “…constitution; rule of law; security vetting; right to a fair trial; european court of human rights.…”
Get full text
Article -
1864
Solution for smart government cloud based on cloud security technology
Published 2017-03-01Subjects: Get full text
Article -
1865
A Lost Opportunity : The Flawed Implementation of Assertive Multilateralism (1991-1993)
Published 2012-12-01Subjects: Get full text
Article -
1866
Method for Information Security Events Detection in a Cloud Signature Systems
Published 2024-06-01Subjects: Get full text
Article -
1867
-
1868
COMPARATIVE ANALYSIS OF INVESTMENT EXPENDITURES IN BUDGETS: REGIONAL ASPECT
Published 2020-06-01Subjects: Get full text
Article -
1869
TRANSFORMATION OF PUBLIC PROCUREMENT OF INDUSTRIAL PRODUCTS TAKING INTO ACCOUNT THE ENVIRONMENTAL FACTOR
Published 2020-09-01Subjects: Get full text
Article -
1870
Iron Brothers: The Strategic Bond between China and Pakistan
Published 2024-12-01Subjects: Get full text
Article -
1871
La construction du Maghreb au défi du partenariat euro-méditerranéen de l’Union européenne
Published 2013-10-01Subjects: Get full text
Article -
1872
Risk assessment method for network attack surface based on Bayesian attack graph
Published 2018-06-01Subjects: Get full text
Article -
1873
Secret level valuation method of BLP model based on some application properties
Published 2013-09-01Subjects: “…information security…”
Get full text
Article -
1874
Analysis of physical layer secret key capacity in the uniform scattering environment
Published 2016-09-01Subjects: “…physical layer security…”
Get full text
Article -
1875
SOME RESULTS OF REFORM OF THE SOCIAL SPHERE OF THE RUSSIAN FEDERATION
Published 2019-05-01Subjects: Get full text
Article -
1876
THE INTERNATIONAL CONFERENCE ON SYRIA (“GENEVA-2”): DIFFICULTIES OF INTER-SYRIAN TALKS AND ROLE OF FOREIGN PLAYERS
Published 2013-10-01Subjects: Get full text
Article -
1877
New signcryption algorithm for secure communication of ad hoc networks
Published 2010-01-01Subjects: Get full text
Article -
1878
Design and application research on management information system security architecture in digital campus
Published 2014-10-01Subjects: Get full text
Article -
1879
Network security threat warning method based on qualitative differential game
Published 2018-08-01Subjects: “…network security threat…”
Get full text
Article -
1880
PCA and PSO based optimized support vector machine for efficient intrusion detection in internet of things
Published 2025-02-01Subjects: Get full text
Article