Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1541
Self-corrected coefficient smoothing method based network security situation prediction
Published 2020-05-01Subjects: “…security situation…”
Get full text
Article -
1542
Service security monitoring mechanism for application server cluster
Published 2016-06-01Subjects: Get full text
Article -
1543
Research progress on cloud data assured deletion based on cryptography
Published 2016-08-01Subjects: “…cloud data security…”
Get full text
Article -
1544
Network protocol identification based on active learning and SVM algorithm
Published 2013-10-01Subjects: “…network security…”
Get full text
Article -
1545
Construction of the ecological security pattern of Mu Us sandy land on the basis of the “Source − Resistance − Corridor” theory
Published 2025-02-01Subjects: “…Ecological Security Pattern…”
Get full text
Article -
1546
Provable security signcryption scheme based on RLWE without trapdoor
Published 2020-06-01Subjects: Get full text
Article -
1547
Research on security multi-party computing based on game theory
Published 2018-01-01Subjects: Get full text
Article -
1548
Research category and future development trend of data elements circulation and security
Published 2024-05-01Subjects: Get full text
Article -
1549
Relations on Ensuring the Rights and Freedoms of a Man and Citizen as a Component of the Subject Matter of Administrative Law
Published 2020-09-01Subjects: Get full text
Article -
1550
Urban farming: the challenges of hydroponic and vertical farming in Malaysia
Published 2025-12-01Subjects: Get full text
Article -
1551
Attribute-based bilateral access control scheme for cloud storage
Published 2024-04-01Subjects: Get full text
Article -
1552
Review of cryptographic application security evaluation techniques for new critical infrastructures
Published 2023-12-01Subjects: Get full text
Article -
1553
Effects of vegetable commercialization on household food security: a generalized propensity score matching approach
Published 2024-12-01Subjects: Get full text
Article -
1554
Enhancing Social Media User’s Trust: A Comprehensive Framework for Detecting Malicious Profiles Using Multi-Dimensional Analytics
Published 2025-01-01Subjects: Get full text
Article -
1555
Detecting DNS-based covert channel on live traffic
Published 2013-05-01Subjects: Get full text
Article -
1556
Secure topology protocol for mobile peer-to-peer networks
Published 2010-01-01Subjects: Get full text
Article -
1557
APPROACH TO ECONOMIC SECURITY ORGANIZATION BASED ON PROBLEM-SOLVING TYPE CLOSED CIRCLE
Published 2016-07-01Subjects: “…economic security of organization…”
Get full text
Article -
1558
Confirmation method for the detection of malicious encrypted traffic with data privacy protection
Published 2022-02-01Subjects: Get full text
Article -
1559
The determinants of severe food insecurity in Africa using the longitudinal generalized Poisson mixed model
Published 2024-01-01Subjects: Get full text
Article -
1560
Residential Property Value and Security Features in Gated Communities
Published 2016-12-01Subjects: “…Gated community, Lagos, Nigeria, Residential property value, Security features, Willingness to pay…”
Get full text
Article