Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
981
Quantum Key Distribution Applicability to Smart Grid Cybersecurity Systems
Published 2025-01-01Subjects: “…Smart grid security…”
Get full text
Article -
982
Climate variability, population growth, and globalization impacting food security in Pakistan
Published 2025-02-01Subjects: Get full text
Article -
983
Study of Mobile Internet Security Risk and End-to-End Service Security Evaluation
Published 2013-08-01Subjects: Get full text
Article -
984
“Shoot Against the Waves”: Securitization and Militarization of Natural Disasters and Humanitarian Help in Latin America
Published 2019-05-01Subjects: Get full text
Article -
985
THE ESSENCE AND COMPONENTS OF THREATS TO THE ECONOMIC SECURITY OF HIGHER EDUCATION INSTITUTIONS
Published 2025-01-01Subjects: Get full text
Article -
986
Classified risk assessment method of Android application based on multi-factor clustering selection
Published 2021-04-01Subjects: Get full text
Article -
987
The Global Assessment of Oilseed Brassica Crop Species Yield, Yield Stability and the Underlying Genetics
Published 2022-10-01Subjects: Get full text
Article -
988
Dynamic P2P trust model based on time-window feedback mechanism
Published 2010-01-01Subjects: “…information security…”
Get full text
Article -
989
Exploring the talent training mode of“cybersecurity doctor”
Published 2019-06-01Subjects: Get full text
Article -
990
A Lightweight Mitigation Technique Against a Modified Version Number Attack in IoT Networks
Published 2025-01-01Subjects: Get full text
Article -
991
Mistaken Worlds: When “Abundance” and “Scarcity” Collide in the Colombian Amazon
Published 2016-01-01Subjects: Get full text
Article -
992
Provable secure mutual RFID authentication protocol based on QC-MDPC code
Published 2014-11-01Subjects: Get full text
Article -
993
Meta-analysis of water stress impact on rice quality in China
Published 2025-02-01Subjects: Get full text
Article -
994
Survey of data possession provability proving on cloud storage
Published 2012-11-01Subjects: Get full text
Article -
995
Research on professional learning margin of university information security teachers in China
Published 2017-07-01Subjects: “…information security…”
Get full text
Article -
996
On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory
Published 2024-03-01Subjects: Get full text
Article -
997
Analysis and improvement of sensor networks security protocol
Published 2011-01-01Subjects: Get full text
Article -
998
The New Anti-Terrorism Act of the Philippines and Its Conflict with the International Human Rights System
Published 2024-03-01Subjects: Get full text
Article -
999
Les politiques agricoles de l'Indonésie et de la Malaisie face aux impératifs de la sécurité alimentaire
Published 2014-05-01Subjects: Get full text
Article -
1000
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01Subjects: Get full text
Article