Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
581
State Participation in Energy Security Provision of the People’s Republic of China
Published 2015-08-01“…The article outlines the contours of energy security of China, the role of major players, including public authorities, government energy corporations, private businesses and the population. …”
Get full text
Article -
582
Security Vetting of Judges and Lessons from One Albanian Case
Published 2024-07-01Subjects: “…constitution; rule of law; security vetting; right to a fair trial; european court of human rights.…”
Get full text
Article -
583
Real time database system data security collection scheme
Published 2016-10-01Subjects: Get full text
Article -
584
Solution for smart government cloud based on cloud security technology
Published 2017-03-01Subjects: Get full text
Article -
585
Research on 5G MEC security assessment system and method
Published 2023-08-01Subjects: Get full text
Article -
586
The evolution of the securities market and modern problems of control of its participants
Published 2022-09-01Subjects: “…securities market…”
Get full text
Article -
587
A statistical approach to the water scarcity implications on food security
Published 2024-11-01“…BACKGROUND AND OBJECTIVES: Jordan faces significant food security challenges due to population growth, climate change, and urbanization, straining limited water resources. …”
Get full text
Article -
588
FSAS: An IoT-Based Security System for Crop Field Storage
Published 2023-01-01“…In this study, we present a remote security management framework for monitoring the crop field storage house, known as the farm security alert system (FSAS). …”
Get full text
Article -
589
FWA-SVM Network Intrusion Identification Technology for Network Security
Published 2025-01-01Subjects: Get full text
Article -
590
Civil substantive and procedural legal means of securing reparations for Ukraine
Published 2023-12-01Get full text
Article -
591
Developing an advanced classifier of threat for security agent behavior models
Published 2019-11-01Get full text
Article -
592
Quantum secure communication network architecture and mobile application solution
Published 2018-09-01Subjects: Get full text
Article -
593
Precision Security: Integrating Video Surveillance with Surrounding Environment Changes
Published 2018-01-01“…Video surveillance plays a vital role in maintaining the social security although, until now, large uncertainty still exists in danger understanding and recognition, which can be partly attributed to intractable environment changes in the backgrounds. …”
Get full text
Article -
594
Research on dynamic migration of virtual machine based on security level
Published 2017-07-01Subjects: Get full text
Article -
595
Analysis and Protection for Information Security Event of Communication Industry User
Published 2013-08-01Subjects: “…information security…”
Get full text
Article -
596
ASSESSMENT OF PSYCHOLOGICAL CHARACTERISTICS OF HUMAN RIGHTS IN THE SECURITY OF ITS WORK
Published 2015-06-01“…The role of motivation for Human Security. The classification of the causes of erroneous actions of man. …”
Get full text
Article -
597
Secure communication optimization for double-IRS assisted SWIPT system
Published 2022-01-01Subjects: Get full text
Article -
598
THE RUSSIAN’S DIGITAL SOVEREIGNTY AS A TECHNICAL BASIS OF INFORMATION SECURITY
Published 2016-12-01Subjects: Get full text
Article -
599
Security mechanisms and data access protocols in innovative wireless networks
Published 2018-09-01Get full text
Article -
600
Research and implementation of data security for mobile terminal based on TEE
Published 2017-03-01Subjects: Get full text
Article