Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
561
-
562
Research on the data link layer secure protocol of TES network based on ECC
Published 2009-01-01Subjects: Get full text
Article -
563
Designing a Future Study Model: Examining Bank Employees’ Attitudes Towards Job Security in the Era of Blockchain Technology (Horizon 2031)
Published 2024-12-01Subjects: Get full text
Article -
564
Research towards IoT-oriented universal control system security model
Published 2012-11-01Subjects: Get full text
Article -
565
Research on key technology of vulnerability threat classification
Published 2012-09-01Subjects: “…information security…”
Get full text
Article -
566
Efficient and safe software defined network topology discovery protocol
Published 2023-12-01Subjects: Get full text
Article -
567
-
568
ANATOMY OF CAUSES AND EFFECTS OF THE FARMER-HERDER CONFLICT ON FOOD SECURITY IN BENUE STATE, 2015-2023
Published 2024-05-01Subjects: Get full text
Article -
569
Improvement Options and Directions for Crisis Management Exercises Organised by Local Governmental Administration on the Example of Podkarpackie Voivodship — Theoretical Assumption...
Published 2024-12-01Subjects: “…security…”
Get full text
Article -
570
Review of cloud based trust model
Published 2011-01-01Subjects: “…evaluate information security…”
Get full text
Article -
571
USING COAL AS A PRESSURE INSTRUMENT OR ENERGY WEAPON
Published 2022-12-01Subjects: “…energy security…”
Get full text
Article -
572
Plaider la « bonne gouvernance sécuritaire » au Maroc : Domestiquer les savoirs de réforme en régime de contrainte consensuelle
Published 2024-09-01Subjects: Get full text
Article -
573
Quelques grammes d’histoire pour des tonnes de riz : produire plus suffira-t-il à éradiquer la faim dans le monde ?
Published 2008-11-01Subjects: Get full text
Article -
574
Research on Intelligent Security Access Platform Based on SDN
Published 2023-09-01Subjects: Get full text
Article -
575
IoT and Cloud Computing Issues, Challenges and Opportunities: A Review
Published 2021-03-01Subjects: “…Internet of Things, IoT, Cloud Computing, Privacy, Security.…”
Get full text
Article -
576
Security analysis and improvement of two attribute-based signature schemes
Published 2016-10-01Subjects: Get full text
Article -
577
Causes and optimization of the false alarm rate of code review system
Published 2020-12-01Subjects: Get full text
Article -
578
PRODUCTION AND SECURITY OF FOOD IN GLOBAL CIRCLE
Published 2022-12-01Subjects: Get full text
Article -
579
Protocol for public opinion survey, Ecuador 2025
Published 2025-02-01Subjects: Get full text
Article -
580
Strategic guidelines on the development of renewable energy sources
Published 2019-08-01Subjects: “…energy security…”
Get full text
Article