Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1861
THE INTERNATIONAL CONFERENCE ON SYRIA (“GENEVA-2”): DIFFICULTIES OF INTER-SYRIAN TALKS AND ROLE OF FOREIGN PLAYERS
Published 2013-10-01Subjects: Get full text
Article -
1862
New signcryption algorithm for secure communication of ad hoc networks
Published 2010-01-01Subjects: Get full text
Article -
1863
Design and application research on management information system security architecture in digital campus
Published 2014-10-01Subjects: Get full text
Article -
1864
Network security threat warning method based on qualitative differential game
Published 2018-08-01Subjects: “…network security threat…”
Get full text
Article -
1865
PCA and PSO based optimized support vector machine for efficient intrusion detection in internet of things
Published 2025-02-01Subjects: Get full text
Article -
1866
A study on the impact of accounting information security controls on the effectiveness of internal controls in Vietnamese enterprises
Published 2025-03-01Subjects: “…Accounting information security…”
Get full text
Article -
1867
Solution of secure multi-party multi-data raking problem based on El Gamal encryption
Published 2007-01-01Subjects: “…secure multi-party multi-data rank…”
Get full text
Article -
1868
Peculiarities of procedural decision-making during pre-trial investigation of high-profile offences a sexual nature committed against children
Published 2023-07-01Subjects: Get full text
Article -
1869
The Concept and Essence of Administrative and Legal Protection of Tax Relations
Published 2019-09-01Subjects: “…administrative and legal security…”
Get full text
Article -
1870
Adaptively secure key-policy ABE scheme with fast decryption
Published 2014-11-01Subjects: Get full text
Article -
1871
Graph-based two-level indicator system construction method for smart city information security risk assessment
Published 2024-08-01Subjects: Get full text
Article -
1872
Physical layer security of modify-and-forward cooperative D2D networks based on transmit antenna selection
Published 2024-04-01Subjects: Get full text
Article -
1873
SPECIFICS TAIL RISKS THAT THREATEN ECONOMIC SECURITY OF INDUSTRIAL ORGANIZATIONS
Published 2017-02-01Subjects: Get full text
Article -
1874
A Defense Approach of DAD Attack in Stateless Auto Configuration
Published 2014-04-01Subjects: “…network security…”
Get full text
Article -
1875
Assessment of the growing demographic threats to economic security in the regions of the North Caucasian Federal District
Published 2023-02-01Subjects: Get full text
Article -
1876
Automated vulnerability discovery method for 5G core network protocol
Published 2024-02-01Subjects: Get full text
Article -
1877
UK in European Security: New Opportunities or a Path to Nowhere?
Published 2015-04-01Subjects: Get full text
Article -
1878
Application protection in 5G cloud network using zero trust architecture
Published 2020-12-01Subjects: “…network security…”
Get full text
Article -
1879
Personal Identification Using Embedded Raspberry Pi-Based Face Recognition Systems
Published 2025-01-01Subjects: Get full text
Article -
1880
Introduction of the Project “Community Police Officer” as a Step towards Strengthening Local Security Infrastructure
Published 2020-02-01Subjects: Get full text
Article