Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1841
An IoT-Based Hydroponic Monitoring and Control System for Sustainable Food Production
Published 2023-12-01Subjects: “…Food-water nexus, global food security, hydroponics, IoT, sensors, smart farming, sustainable agriculture…”
Get full text
Article -
1842
Internet of Things (IoT) technologies: features, development prospects and potential threats
Published 2024-11-01Subjects: Get full text
Article -
1843
Escrow mechanism for personal security keys on IBE
Published 2009-01-01Subjects: Get full text
Article -
1844
Problem Solving and Personality in Security Officers
Published 2021-12-01Subjects: Get full text
Article -
1845
Private-preserving scientific computation of the rational numbers
Published 2022-06-01Subjects: “…secure multiparty computation…”
Get full text
Article -
1846
The State of the Arctic Problems of the Nenets Autonomous Okrug and Prospects of their Solution
Published 2024-08-01Subjects: “…strategy for developing the russian arctic zone and ensuring national security until 2035…”
Get full text
Article -
1847
Which dietary shifts to improve nutritional quality while reducing diet cost in the French West Indies?
Published 2025-01-01Subjects: Get full text
Article -
1848
Security Vetting of Judges and Lessons from One Albanian Case
Published 2024-07-01Subjects: “…constitution; rule of law; security vetting; right to a fair trial; european court of human rights.…”
Get full text
Article -
1849
Solution for smart government cloud based on cloud security technology
Published 2017-03-01Subjects: Get full text
Article -
1850
A Lost Opportunity : The Flawed Implementation of Assertive Multilateralism (1991-1993)
Published 2012-12-01Subjects: Get full text
Article -
1851
Method for Information Security Events Detection in a Cloud Signature Systems
Published 2024-06-01Subjects: Get full text
Article -
1852
-
1853
COMPARATIVE ANALYSIS OF INVESTMENT EXPENDITURES IN BUDGETS: REGIONAL ASPECT
Published 2020-06-01Subjects: Get full text
Article -
1854
TRANSFORMATION OF PUBLIC PROCUREMENT OF INDUSTRIAL PRODUCTS TAKING INTO ACCOUNT THE ENVIRONMENTAL FACTOR
Published 2020-09-01Subjects: Get full text
Article -
1855
Iron Brothers: The Strategic Bond between China and Pakistan
Published 2024-12-01Subjects: Get full text
Article -
1856
La construction du Maghreb au défi du partenariat euro-méditerranéen de l’Union européenne
Published 2013-10-01Subjects: Get full text
Article -
1857
Risk assessment method for network attack surface based on Bayesian attack graph
Published 2018-06-01Subjects: Get full text
Article -
1858
Secret level valuation method of BLP model based on some application properties
Published 2013-09-01Subjects: “…information security…”
Get full text
Article -
1859
Analysis of physical layer secret key capacity in the uniform scattering environment
Published 2016-09-01Subjects: “…physical layer security…”
Get full text
Article -
1860
SOME RESULTS OF REFORM OF THE SOCIAL SPHERE OF THE RUSSIAN FEDERATION
Published 2019-05-01Subjects: Get full text
Article