Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
961
A topology-guided high-quality solution learning framework for security-constraint unit commitment based on graph convolutional network
Published 2025-03-01Subjects: “…Security-constrained unit commitment…”
Get full text
Article -
962
DEVELOPMENT OF AN ECO-FRIENDLY SOLUTION FOR CHARGING POWER TOOL BATTERIES USED FOR POWER TOOLS IN MANUFACTURING
Published 2024-12-01Subjects: Get full text
Article -
963
Authentication scheme of smart home based on eUICC
Published 2018-04-01Subjects: Get full text
Article -
964
Automatic generation of AppArmor security policies based on large language models
Published 2024-06-01Subjects: Get full text
Article -
965
RELEVANT ASPECTS REGARDING THE EUROPEAN UNION INDEPENDENCE ON ENERGY IMPORTS
Published 2024-12-01Subjects: “…energy security…”
Get full text
Article -
966
-
967
CENTRAL ASIA IN SEARCH FOR ITS OWN WAY OF INTEGRATION
Published 2018-09-01Subjects: Get full text
Article -
968
Evaluation of tourism ecological security and its obstacles in semi-arid river valley urban: a case study of Lanzhou, China
Published 2025-01-01Subjects: Get full text
Article -
969
Design of a tensile-type 3-D multi-scroll chaotic system and its application in secure communication
Published 2016-12-01Subjects: Get full text
Article -
970
Fingerprint template protection by adopting random projection based on re-encryption
Published 2018-02-01Subjects: Get full text
Article -
971
Research on energy-efficient physical-layer secure transmission mechanism in decode-and-forward cooperative networks
Published 2017-01-01Subjects: Get full text
Article -
972
Machine learning for QoS and security enhancement of RPL in IoT-Enabled wireless sensors
Published 2024-01-01Subjects: Get full text
Article -
973
Prerequisites for the legal mechanisms development to combat disinformation in social media in the context of national security: problem statement
Published 2021-12-01Subjects: Get full text
Article -
974
Blockchain-enabled digital twin system for brain stroke prediction
Published 2025-01-01Subjects: “…Security and privacy…”
Get full text
Article -
975
Trustworthy component model supporting networks reconfiguration
Published 2013-03-01Subjects: Get full text
Article -
976
Analysis and Application of Security Risk Management Based on Business Process Granularity
Published 2013-11-01Subjects: “…security risk management…”
Get full text
Article -
977
Time based incremental backup scheme for mobile cloud computing
Published 2016-08-01Subjects: Get full text
Article -
978
Modeling and countermeasures of a social network-based botnet with strong destroy-resistance
Published 2017-01-01Subjects: “…network security…”
Get full text
Article -
979
Research and implementation of data security for mobile terminal based on TEE
Published 2017-03-01Subjects: Get full text
Article -
980
Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services
Published 2019-06-01Subjects: Get full text
Article