Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1881
-
1882
Security communication and energy efficiency optimization strategy in UAV-aided edge computing
Published 2023-03-01Subjects: Get full text
Article -
1883
Using side-channel and quantization vulnerability to recover DNN weights
Published 2021-08-01Subjects: “…AI security…”
Get full text
Article -
1884
Research on formal security policy model specification and its formal analysis
Published 2006-01-01Subjects: “…security policy model…”
Get full text
Article -
1885
Harnessing artificial intelligence and remote sensing in climate-smart agriculture: the current strategies needed for enhancing global food security
Published 2025-12-01Subjects: “…Food security…”
Get full text
Article -
1886
Application of human-in-the-loop hybrid augmented intelligence approach in security inspection system
Published 2025-01-01Subjects: Get full text
Article -
1887
Frequent items maintaining algorithms in network traffic analysis
Published 2006-01-01Subjects: “…information security…”
Get full text
Article -
1888
Use of special technical means (polygraph) on personnel recruitment in corporate structures
Published 2024-06-01Subjects: Get full text
Article -
1889
Military and political security in the Arctic before and amidst the Ukrainian crisis
Published 2024-11-01Subjects: Get full text
Article -
1890
IoT Network Anomaly Detection in Smart Homes Using Machine Learning
Published 2023-01-01Subjects: Get full text
Article -
1891
Challenges and key technologies of new Ethernet for intelligent computing center
Published 2024-06-01Subjects: Get full text
Article -
1892
Enhancing Privacy While Preserving Context in Text Transformations by Large Language Models
Published 2025-01-01Subjects: Get full text
Article -
1893
-
1894
Enhancing Tenure Security: A Case Study of the Social Forestry Scheme in the State Forestry Corporation, Malang District, East Java
Published 2024-03-01Subjects: Get full text
Article -
1895
Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Published 2023-08-01Subjects: “…security entity correlation…”
Get full text
Article -
1896
Advancing green recovery: Integrating one health in sustainable wildlife management in the Asia-Pacific Indigenous People and Local Communities
Published 2025-06-01Subjects: Get full text
Article -
1897
-
1898
Experimental assessment of аdversarial attacks to the deep neural networks in medical image recognition
Published 2019-09-01Subjects: Get full text
Article -
1899
Optimal strategy selection method for moving target defense based on signaling game
Published 2019-06-01Subjects: “…network security…”
Get full text
Article -
1900
Dominants of economic security of Russian industrial organizations with participation of state in capital: chronicles of “Russian Helicopters” holding company
Published 2020-10-01Subjects: “…economic security…”
Get full text
Article