Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
281
SIM: a secure IP protocol for MANET
Published 2013-08-01Subjects: “…secure IP protocol for manet…”
Get full text
Article -
282
Practice on edge cloud security of telecom operators
Published 2023-04-01Subjects: Get full text
Article -
283
-
284
Social Justice as a Principle of Social Security
Published 2022-07-01Subjects: Get full text
Article -
285
VNF lifecycle security management measures in NFV
Published 2016-11-01Subjects: Get full text
Article -
286
Progress and Security Analysis of Quantum Cryptography Communication
Published 2015-06-01Subjects: Get full text
Article -
287
Research on security defense of mobile edge computing
Published 2021-02-01Subjects: Get full text
Article -
288
Western Experience in Strategic Planning for National Security
Published 2019-11-01“…The purpose of this article is to provide an overview of the best Western practices in strategic planning with the view to improve the effectiveness of the Russian Federation national security policy in the face of new challenges and threats.Having analyzed Western approaches to ensuring national security, the article concludes that the political and governance practice needs to include more of strategic planning elements, such as strategic forecasting, monitoring, and national security assessment. …”
Get full text
Article -
289
A survey of security threats in federated learning
Published 2025-01-01“…We also sort out the relationship between these methods, their advantages and disadvantages, and discuss future research directions regarding the security issues of federated learning from multiple perspectives.…”
Get full text
Article -
290
Canadian perspectives on food security and plant breeding
Published 2021-04-01“…Abstract Background The broadness of biotechnology serves to connect different types of modern plant breeding techniques with the potential to improve global food security. However, the topic goes beyond the specific example consumers’ associate with the term—genetic modification. …”
Get full text
Article -
291
Survey on decentralized security-enhanced technologies for RPKI
Published 2024-07-01Subjects: Get full text
Article -
292
Research on models of network security evaluation and analysis
Published 2018-04-01Subjects: “…network security…”
Get full text
Article -
293
Evolution of the global information society: security aspects
Published 2012-02-01Get full text
Article -
294
Big data security features and operation practices
Published 2021-05-01Subjects: Get full text
Article -
295
Secure video watermarking scheme for broadcast monitoring
Published 2009-01-01“…This new robust video watermark algorithm could also be applied in the security of broadcast monitoring. Based on the academic analysis and experimental results, the new proposed algorithm has good security and robust performance.…”
Get full text
Article -
296
-
297
Strategic Competition and its implications for international security
Published 2024-12-01Subjects: Get full text
Article -
298
Research on security of mobile payment for commercial bank
Published 2014-11-01Subjects: Get full text
Article -
299
Evolution of Theoretical Approaches to the Study of Debt Security
Published 2024-06-01Subjects: “…debt security…”
Get full text
Article -
300
Network Security Threats and Countermeasures on Cloud Computing
Published 2013-08-01Subjects: Get full text
Article