Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
381
Application of generative adversarial networks for financial data
Published 2024-06-01Subjects: Get full text
Article -
382
Discussions on the talent cultivation of cyber security
Published 2016-02-01Subjects: “…cyber security…”
Get full text
Article -
383
CHURCH RESPONSE TO SECURITY CHALLENGES IN THE 21ST CENTURY: THE NIGERIAN EXPERIENCE
Published 2023-07-01Subjects: Get full text
Article -
384
RANCANG BANGUN ALAT PELATIHAN PARKIR MOBIL BERBASIS MIKROKONTROLER
Published 2024-10-01Subjects: “…parking, microcontroller, ultrasonic sensor, security, LCD…”
Get full text
Article -
385
The security system of the Republic of Serbia: The character and value of knowledge in its products
Published 2024-01-01Subjects: “…security system…”
Get full text
Article -
386
Automatic Verification Analysis Technology of Network Security Domain
Published 2015-01-01Subjects: “…security domain…”
Get full text
Article -
387
Anomaly detection in backbone networks using Filter-ary-Sketch
Published 2011-01-01Subjects: “…network security…”
Get full text
Article -
388
ADDRESSING DESERTIFICATION TO PROMOTE SUSTAINABLE PEACE BETWEEN FARMERS AND HERDSMEN IN NIGERIA
Published 2023-09-01Subjects: Get full text
Article -
389
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01Subjects: Get full text
Article -
390
Lightweight Models for Real-Time Steganalysis: A Comparison of MobileNet, ShuffleNet, and EfficientNet
Published 2024-12-01Subjects: Get full text
Article -
391
Investigation,analysis and improvement mentality of the revision on information security’s training program to undergraduates in Hunan University
Published 2020-08-01Subjects: Get full text
Article -
392
Hubungan Secure Attachment Orang Tua dengan Penyesuaian Diri pada Siswa SMP Islamic Boarding School
Published 2022-10-01Subjects: Get full text
Article -
393
Research on the Entered Business Model of Telecom Customer Behavior Tagged Data
Published 2013-11-01Subjects: Get full text
Article -
394
Research on the anti-synchronization chaos system group &large scale distributed system security communication
Published 2017-07-01Subjects: “…secure communication…”
Get full text
Article -
395
Research on the invulnerability of regional network based on topology analysis
Published 2021-11-01Subjects: Get full text
Article -
396
-
397
NIGERIAN YOUTH UNEMPLOYMENT AND SECURITY ISSUES: EVALUATING THE ENTREPRENEURSHIP OPTION
Published 2024-05-01Subjects: “…Security Challenger…”
Get full text
Article -
398
Scaling up Sustainable Agriculture and Food Security With Nanoscience and Technology
Published 2024-12-01Subjects: “…food security…”
Get full text
Article -
399
CLIMATE CHANGE AND LAND-BASED CONFLICT: THE IMPACT ON FOOD SECURITY IN NIGERIA
Published 2022-05-01Subjects: Get full text
Article -
400
IMPACT OF CLIMATE CHANGE ON THE GROWTH, YIELD, AND SUNFLOWER CULTIVAR PERFORMANCE UNDER THE INFLUENCE OF PLANT DENSITY.
Published 2025-01-01Subjects: “…GDD, CAT, Climate action, food security…”
Get full text
Article