Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
841
Research on system call forwarding mechanism of SGX-based LibOS
Published 2024-10-01Subjects: Get full text
Article -
842
Ways of improving the economic security of fuel and energy complex enterprises
Published 2023-02-01Subjects: “…economic security…”
Get full text
Article -
843
基于层次分析—模糊评价的云计算安全评估与对策
Published 2016-10-01Subjects: “…security requirements…”
Get full text
Article -
844
Secure and transparent data aggregation for wireless sensor networks
Published 2012-10-01Subjects: Get full text
Article -
845
Changes in grocery shopping behaviour among low-income households during the COVID-19 pandemic
Published 2025-01-01Subjects: “…Food security…”
Get full text
Article -
846
Perempuan dan Ketahanan Pangan (Rumah Tangga) pada Masa Revolusi
Published 2024-07-01Subjects: Get full text
Article -
847
Private data access control model based on block chain technology in the internet of things environment
Published 2022-12-01Subjects: Get full text
Article -
848
Safeguarding Nigeria: strategies for combating insurgency and terrorism
Published 2024-12-01Subjects: Get full text
Article -
849
Construction and Application for Operation-BusinessOriented Mobile GIS Service Platform
Published 2015-06-01Subjects: Get full text
Article -
850
A Secure Image Steganography Using Shark Smell Optimization and Edge Detection Technique
Published 2022-10-01Subjects: Get full text
Article -
851
Key distribution scheme of wireless sensor networks based on logic grid
Published 2009-01-01Subjects: Get full text
Article -
852
LiteST: a lightweight secure time synchronization protocol for wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
853
Hunger Solution: One-Dimensional and Multi-Dimensional Food Security Programs
Published 2018-12-01Subjects: Get full text
Article -
854
-
855
Dynamics of the Indonesian Parliament in Formulating Food Laws to Achieve Food Security at the End of the New Order
Published 2024-07-01Subjects: Get full text
Article -
856
Research on Satellite Internet Security Protection Based on Zero Trust
Published 2021-09-01Subjects: Get full text
Article -
857
Scheme for identifying malware traffic with TLS data based on machine learning
Published 2020-02-01Subjects: “…transport layer security…”
Get full text
Article -
858
Azerbaijan-Türkiye Relations in the Context of Security Community: One Nation, Two States
Published 2024-12-01Subjects: “…security community…”
Get full text
Article -
859
Evolution entropy risk assessment of ERP information security based on the business process
Published 2012-09-01Subjects: Get full text
Article -
860
Two new color (n, n)-secret sharing schemes
Published 2007-01-01Subjects: “…data security…”
Get full text
Article