Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
461
New indifferentiability security proof of MDPH hash function
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
462
Secure and transparent data aggregation for wireless sensor networks
Published 2012-10-01Subjects: Get full text
Article -
463
Military-political Processes in the Caucasus Region and the Security of Russia
Published 2015-06-01Subjects: Get full text
Article -
464
Legal regulation of national security in Ukraine: today’s challenges
Published 2022-06-01Subjects: “…security…”
Get full text
Article -
465
Framework for Secure Wireless Communication in Wireless Sensor Networks
Published 2013-12-01“…With large-scale and rapid development in wireless sensor networks (WSNs), there is great demand to adopt security mechanisms for secure wireless communication. …”
Get full text
Article -
466
Information Security Risk Framework for Digital Transformation Technologies
Published 2025-01-01Get full text
Article -
467
Network security situation awareness technology in smart substation
Published 2015-12-01Subjects: Get full text
Article -
468
Securing Bird Feeders from Florida Black Bears
Published 2017-05-01“…This 3-page fact sheet explains how to secure bird seed from bears so that they don’t become reliant on human food sources, a condition that puts them at greater risk of being killed from vehicle collisions, illegal shooting, or euthanasia. …”
Get full text
Article -
469
The influence of moral and ethical aspects on the organisation’s economic security
Published 2022-04-01Subjects: Get full text
Article -
470
European Union (EU) Information Security Policies Türkay
Published 2013-11-01“…The importance and scope of these policies were examined based on the McCumber information security model, which is a comprehensive and multidimensional information security model. …”
Get full text
Article -
471
Development of multi-agent information security management system
Published 2022-12-01Subjects: “…information security management systems…”
Get full text
Article -
472
Survey on RDMA protocol applications and security protection technologies
Published 2024-04-01“…The security risks faced by RDMA applications in relevant scenarios were investigated, and a summary of the research progress in the RDMA security field over recent years was provided. …”
Get full text
Article -
473
INFORMATION SECURITY IN THE COUNTRIES OF CENTRAL ASIA: THE CASE OF KAZAKHSTAN
Published 2016-12-01Subjects: Get full text
Article -
474
Future of European Security Policies: Is Geopolitical Europe Possible?
Published 2024-03-01“…Since the aftermath of World War II, the pursuit of European autonomy in ensuring its security began with the 1950s French proposal for a pan-European defense force, though never realized. …”
Get full text
Article -
475
Joint security and performance improvement in multilevel shared caches
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
476
Security of the industrial Internet of things and localization of the core technology
Published 2018-06-01Subjects: Get full text
Article -
477
Study on Differentiated Security Service Based on Cloud Computing
Published 2013-03-01Subjects: Get full text
Article -
478
Information security of the region: Approaches to consideration and economic essence
Published 2023-05-01Subjects: “…information; information resources; information security; information technologies; threat; danger…”
Get full text
Article -
479
Research on Security Connotation and Response Strategies for Big Data
Published 2014-02-01Subjects: “…ig data security…”
Get full text
Article -
480
The Strategic Measures for the Industrial Security of Small and Medium Business
Published 2014-01-01“…The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. …”
Get full text
Article