Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
461
Research on Anti-Trojan Malware Mechanism Based on Characteristic Behavior
Published 2014-11-01Subjects: Get full text
Article -
462
Information Security Management in Small Public Sector Organizations: Requirements and Design of a Procedural Approach
Published 2023-12-01Subjects: Get full text
Article -
463
Analisis Burnout Programmer Terhadap Penerapan Secure Coding
Published 2024-08-01Subjects: Get full text
Article -
464
Community Development in the Rural Areas through Traditional Indigenous Knowledge
Published 2019Subjects: “…Community Development, Indigenous Knowledge, Peace and Security…”
Get full text
Article -
465
The Russian Federation subjects budgets as a financial basis for their economic security
Published 2022-11-01Subjects: Get full text
Article -
466
Host security threat analysis approach for network dynamic defense
Published 2018-04-01Subjects: “…cyber security…”
Get full text
Article -
467
SAFE-CAST: secure AI-federated enumeration for clustering-based automated surveillance and trust in machine-to-machine communication
Published 2025-01-01Subjects: Get full text
Article -
468
United Nations - African Union Cooperation In Conflict Prevention, Peacekeeping and Peacebuildin
Published 2015-12-01Subjects: Get full text
Article -
469
An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning
Published 2022-05-01Subjects: Get full text
Article -
470
Research of duality and multi-level security model based on intransitive noninterference theory
Published 2009-01-01Subjects: “…multi-level security…”
Get full text
Article -
471
The situation in Afghanistan and its possible evolution in the context of the "factor 2014"
Published 2013-04-01Subjects: Get full text
Article -
472
Improving the level of food security of the region: cluster approach
Published 2021-10-01Subjects: “…economic security…”
Get full text
Article -
473
ANALYSIS OF THE RESULTS OF SIMULATIVE MODELLING OF THE INFORMATION SECURITY SYSTEM IN THE CORPORATE NETWORKS OF HIGHER EDUCATION INSTITUTIONS
Published 2024-09-01Subjects: Get full text
Article -
474
Social leadership and authority in the field of national and military security: problems of formation in the digital world
Published 2021-04-01Subjects: Get full text
Article -
475
DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article -
476
The Factor of Food in Biopolitics and National Security
Published 2014-12-01Subjects: Get full text
Article -
477
Securitization of China in the NATO discourse in the late 2010s— early 2020s: Towards a global collective identity
Published 2024-07-01Subjects: Get full text
Article -
478
Conceptual and Institutional Aspects of EU Energy Policy (1990-2014)
Published 2015-02-01Subjects: “…energy security…”
Get full text
Article -
479
Axiomatic approach to ensuring nuclear safety and nuclear deterrence in the interests of the Russian Arctic region sustainable development
Published 2023-12-01Subjects: Get full text
Article -
480
National interests in Russia’s foreign policy
Published 2024-03-01Subjects: “…national security…”
Get full text
Article