Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
2261
The Korean Peninsula as a Hotbed of Cold War 2.0
Published 2023-03-01Subjects: Get full text
Article -
2262
The effectiveness of monitoring as a necessary condition for the adoption of correct decisions on the security оf technosphere
Published 2020-04-01Subjects: “…security оf technosphere…”
Get full text
Article -
2263
Designing the behavioral model of stakeholders in the corporate governance of iran's social security organization and its affiliated companies
Published 2024-08-01Subjects: Get full text
Article -
2264
Secure performance analysis of WCDMA systems over correlated Nakagami fading channels
Published 2018-10-01Subjects: “…physical layer security…”
Get full text
Article -
2265
Legal and Ethical Challenges of the Use of Nuclear Technologies in Space: Risks and Opportunities
Published 2024-12-01Subjects: Get full text
Article -
2266
Kadın, Barış ve Güvenlik Gündemi: Uluslararası Siyasete Feminist Müdahaleler ve Sınırları
Published 2023-10-01Subjects: “…international security…”
Get full text
Article -
2267
Integrated Evaluation of the Ecological Security Pattern in Central Beijing Using InVEST, MSPA, and Multifactor Indices
Published 2025-01-01Subjects: “…ecological security patterns…”
Get full text
Article -
2268
Information technology industry state support as a key problem of ensuring the national security of the Russian Federation
Published 2022-10-01Subjects: Get full text
Article -
2269
-
2270
The Problem of Energy Security in the Early 21st Century: Challenges and Opportunities
Published 2013-02-01Subjects: “…energy security…”
Get full text
Article -
2271
THE DEFINING FEATURES OF SOFT POWER STRATEGY IN GERMAN FOREIGN POLICY
Published 2016-02-01Subjects: Get full text
Article -
2272
Performance analysis of dual non-orthogonal multiple access technology in the Internet of things
Published 2019-03-01Subjects: “…high spectral efficiency secure access (HSESA)…”
Get full text
Article -
2273
Adaptive Security Solutions for NOMA Networks: The Role of DDPG and RIS-Equipped UAVs
Published 2024-11-01Subjects: “…non-orthogonal multiple access, reconfigurable intelligent surface, unmanned aerial vehicles, deep reinforcement learning, deep deterministic policy gradient, physical layer security.…”
Get full text
Article -
2274
Modern Conflicts Features in Latin America. The Role of the OAS in the Settlement of the Falklands Conflict
Published 2015-02-01Subjects: Get full text
Article -
2275
“Simplifying” Digital Complexity? A Socio-Technical Perspective. Editorial Introduction to Issue 33 of CSIMQ
Published 2022-12-01Subjects: Get full text
Article -
2276
Transformation of the fuel and energy complex to ensure Russia’s energy security in the era of sanctions restrictions
Published 2023-11-01Subjects: Get full text
Article -
2277
Social and humanitarian policy of Ukraine in the conditions of war
Published 2024-06-01Subjects: Get full text
Article -
2278
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Subjects: “…Fog cloud computing security…”
Get full text
Article -
2279
A survey of physical layer security in space-air-ground communication and networks
Published 2020-09-01Subjects: Get full text
Article -
2280
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
Published 2025-01-01Subjects: Get full text
Article