Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
2001
Introduction and critical technology analysis of internet of vehicle
Published 2016-08-01Subjects: Get full text
Article -
2002
Research and application of Web of things resource management framework
Published 2022-06-01Subjects: Get full text
Article -
2003
Key Elements in Integrity Management of Underground Gas Storage: A Framework for Energy Safety
Published 2025-01-01Subjects: Get full text
Article -
2004
Seguridad ciudadana como elemento fundamental para el desarrollo humano: Análisis de delitos en Chile mediante un modelo logístico espacio-temporal
Published 2023-05-01Subjects: Get full text
Article -
2005
The EU Methodology of Security and Defense Planning
Published 2015-10-01Subjects: Get full text
Article -
2006
Eastern Dimension of the European Neighbourhood Policy: Europeanization Mutual Trap
Published 2014-12-01Subjects: Get full text
Article -
2007
El posicionamiento de la República Popular China en relación a la seguridad internacional: una introducción al caso del Atlántico Sur Occidental.
Published 2024-11-01Subjects: Get full text
Article -
2008
Efficient conditional aggregation of encrypted data in tiered sensor networks
Published 2012-12-01Subjects: Get full text
Article -
2009
San Francisco Konferansı Sürecinde Büyük Devletlerin Veto Yetkisi Üzerine Tartışmalar
Published 2021-10-01Subjects: Get full text
Article -
2010
Reflections on the Impact of Extreme Weather on New Power Systems and Countermeasures
Published 2025-01-01Subjects: Get full text
Article -
2011
-
2012
Spatio-temporal evolution and driving forces of urban gravity centers and ecological security risk gravity centers in China
Published 2025-01-01Subjects: Get full text
Article -
2013
TCN-Based DDoS Detection and Mitigation in 5G Healthcare-IoT: A Frequency Monitoring and Dynamic Threshold Approach
Published 2025-01-01Subjects: Get full text
Article -
2014
South African Electoral Commission’s mobile app for voters: Data privacy and security dimensions
Published 2024-12-01Subjects: “…elections, voters, technology, mobile apps, data privacy, data security, South Africa, Electoral Commission, IEC…”
Get full text
Article -
2015
A Control-Theoretical Zero-Knowledge Proof Scheme for Networked Control Systems
Published 2024-01-01Subjects: “…Computer/network security…”
Get full text
Article -
2016
Evolution of U.S. Policy Approaches to Ensuring Cybersecurity and Defense of Critical Information Infrastructure
Published 2020-11-01Subjects: Get full text
Article -
2017
Double layer federated security learning architecture for artificial intelligence of things
Published 2024-12-01Subjects: Get full text
Article -
2018
Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images
Published 2025-01-01Subjects: Get full text
Article -
2019
The Role of International Arbitration in Maintaining World Peace and Security with an Emphasis on Non- State Actors
Published 2024-03-01Subjects: “…world peace and security…”
Get full text
Article -
2020
Physical layer security of relay selection NOMA wireless systems
Published 2024-03-01Subjects: Get full text
Article