Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
881
LINEAR FILTERING OF OUTPUT DATA OF A SINGLE-POSITION SECURITY SYSTEM
Published 2017-10-01Subjects: Get full text
Article -
882
The Development of the US National Missile Defense and its Impact on the International Security
Published 2015-02-01“…The major threat to international security is the proliferation of ballistic missiles and weapons of mass destruction. …”
Get full text
Article -
883
Promoting Agricultural Research and Development to Strengthen Food Security in South Asia
Published 2014-01-01“…This study also depicts the current situation of food security in South Asia and illustrates how agricultural education and innovation hold the master key to solve the food security issues for the world's most densely populated region.…”
Get full text
Article -
884
Security Data Aggregation with Recoverable Data in Heterogeneous Wireless Sensor Network
Published 2013-11-01“…Recently, many security aggregation algorithms in wireless sensor network have high communication overhead and the usage of aggregation functions is constrained. …”
Get full text
Article -
885
Discuss on cultivating mode of information security and law inter-disciplinary talents
Published 2019-06-01Subjects: “…talents of cyber security…”
Get full text
Article -
886
CHURCH RESPONSE TO SECURITY CHALLENGES IN THE 21ST CENTURY: THE NIGERIAN EXPERIENCE
Published 2023-07-01Subjects: Get full text
Article -
887
Analysis and Application of Security Risk Management Based on Business Process Granularity
Published 2013-11-01Subjects: “…security risk management…”
Get full text
Article -
888
Artificial noise aided secure beamforming for multi-antenna relay systems
Published 2014-11-01“…,the relaxation is tight to the original problem.Simulation results demonstrate that the proposed method can improve the security performance of the system significantly.…”
Get full text
Article -
889
Embracing plant plasticity or robustness as a means of ensuring food security
Published 2025-01-01“…In doing so we address both fundamental questions regarding G×E and potential strategies to best secure yields in both current and future climate scenarios.…”
Get full text
Article -
890
Climate variability, population growth, and globalization impacting food security in Pakistan
Published 2025-02-01Subjects: Get full text
Article -
891
Efficient and provably secure attribute-based online/offline encryption schemes
Published 2014-07-01Subjects: Get full text
Article -
892
Young people’s participation in the recruitment and selection process for secure care staff
Published 2007-03-01Article -
893
Secure localization scheme against wormhole attack for wireless sensor networks
Published 2015-03-01Subjects: Get full text
Article -
894
Perception technology of virtual threat for large enterprise's information security construction
Published 2016-12-01Subjects: “…information security…”
Get full text
Article -
895
The security system of the Republic of Serbia: The character and value of knowledge in its products
Published 2024-01-01Subjects: “…security system…”
Get full text
Article -
896
AGRICULTURE AS A UNIFER OF SECURITY AND DEVELOPMENT IN THE FACE OF FREE MARKET CHALLENGES
Published 2024-12-01Subjects: “…security…”
Get full text
Article -
897
Research on professional learning margin of university information security teachers in China
Published 2017-07-01Subjects: “…information security…”
Get full text
Article -
898
New thoughts on security technologies for space-ground integration information network
Published 2017-12-01Subjects: Get full text
Article -
899
Provably secure private key protection scheme for smart mobile terminal
Published 2012-12-01Subjects: Get full text
Article -
900
Network security threat warning method based on qualitative differential game
Published 2018-08-01Subjects: “…network security threat…”
Get full text
Article