Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1761
A Novel Differentially Private Online Learning Algorithm for Group Lasso in Big Data
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1762
Private feasible solution determination
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
1763
PATS: Let Parties Have a Say in Threshold Group Key Sharing
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1764
ОРГАНИЗАЦИЯ ОБРАЗОВАТЕЛЬНОГО ПРОЦЕССА ДЛЯ ДЕТЕЙ С ОГРАНИЧЕННЫМИ ВОЗМОЖНОСТЯМИ ЗДОРОВЬЯ В ОЦЕНКАХ РОДИТЕЛЕЙ И ЗАКОННЫХ ПРЕДСТАВИТЕЛЕЙ. РЕЗУЛЬТАТЫ СОЦИОЛОГИЧЕСКОГО ИССЛЕДОВАНИЯ...
Published 2025-02-01“…Society and Security Insights…”
Get full text
Article -
1765
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
1766
On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1767
ПРАЗДНИКИ И ПРАЗДНИЧНЫЕ МЕРОПРИЯТИЯ В КОНТЕКСТЕ СОЦИАЛЬНОГО УПРАВЛЕНИЯ В СФЕРЕ КУЛЬТУРЫ: ДИЛЕММА ПРЕЕМСТВЕННОСТИ...
Published 2025-02-01“…Society and Security Insights…”
Get full text
Article -
1768
СПЕЦИФИКА ВЗАИМООБУСЛОВЛЕННОСТИ ГРАЖДАНСКОЙ ИДЕНТИФИКАЦИИ И СОЦИАЛЬНОЙ АКТИВНОСТИ НАСЕЛЕНИЯ (НА ПРИМЕРЕ ПРИГРАНИЧНЫХ РЕГИОНОВ РОССИИ)...
Published 2025-02-01“…Society and Security Insights…”
Get full text
Article -
1769
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1770
Efficient constructions for large‐state block ciphers based on AES New Instructions
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
1771
Stacking ensemble learning with heterogeneous models and selected feature subset for prediction of service trust in internet of medical things
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
1772
New attacks against reduced Rijndael‐160
Published 2022-01-01“…IET Information Security…”
Get full text
Article -
1773
Seahorse nanos3 plays essential roles in germ cell development in the absence of nanos2
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
1774
Research on design and implementation of innovative UGV modular platform in mine action programs
Published 2025-02-01“…Defense and Security Studies…”
Get full text
Article -
1775
An interpretable semi‐supervised system for detecting cyberattacks using anomaly detection in industrial scenarios
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
1776
Similarity Property and Slide Attack of Block Cipher FESH
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
1777
СМИ КАК СУБЪЕКТЫ МЕДИЙНОГО ПРОСТРАНСТВА ТЮРКСКОГО МИРА: ОЦЕНКА БАЗОВЫХ ХАРАКТЕРИСТИК
Published 2025-02-01“…Society and Security Insights…”
Get full text
Article -
1778
Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1779
Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1780
Yoyo trick on type‐II generalised Feistel networks
Published 2021-11-01“…IET Information Security…”
Get full text
Article