Suggested Topics within your search.
Suggested Topics within your search.
- English language 55
- Rhetoric 41
- History 31
- Report writing 30
- Management 25
- Grammar 23
- methods 22
- Law 21
- Moral and ethical aspects 18
- Research 18
- College readers 16
- Human anatomy 14
- Philosophy 13
- Handbooks, manuals, etc 12
- Methodology 12
- Problems, exercises, etc 12
- Social conditions 12
- Study and teaching 12
- Politics and government 11
- Academic writing 10
- Leadership 10
- Nursing 10
- Biochemistry 9
- Calculus 9
- Economic development 9
- Human physiology 9
- Mathematics 9
- Policy sciences 9
- Social aspects 9
- Anatomy 8
-
241
Automated Fog Node Audit and Certification Scheme With Multiple Attestation Certificate Authorities
Published 2025-01-01Subjects: Get full text
Article -
242
PEDAGOGIC RESEARCH IN THE CONTEXT OF A DIALOGUE BETWEEN AUTHOR (RESEARCHER) AND SCIENTIFIC COMMUNITY
Published 2016-12-01Get full text
Article -
243
Author Correction: LLM-driven multimodal target volume contouring in radiation oncology
Published 2025-01-01Get full text
Article -
244
ABOUT THE PROBLEM OF INCOMPLETE CALCULATION OF TAXES BY TAX AUTHORITIES IN THE COURSE OF TAX CONTROL
Published 2020-07-01“…An analysis of changes in legislation on taxes and fees, literature and taxation practices has pointed to the urgency of the problem of incomplete taxation by tax authorities during tax control. The purpose of the article is to study the completeness of tax calculation by tax authorities during tax control and justify the rejection of a model for compensating low tax risks for offenders by increasing the tax burden for law-abiding taxpayers. …”
Get full text
Article -
245
Author Correction: Short tandem repeats delineate gene bodies across eukaryotes
Published 2025-02-01Get full text
Article -
246
Author Correction: Normal tissue radioprotection by amifostine via Warburg-type effects
Published 2025-02-01Get full text
Article -
247
ARE MONETARY AUTHORITIES’ ACTIONS (MONEY SUPPLY) FACTORED INTO NIGERIA’S GOVERNMENT REVENUE STREAMS?
Published 2024-10-01Get full text
Article -
248
Inya: Wet Nurse and Succesful Regeneration of the Mataram Islamic Court Authorities in the Past
Published 2024-08-01Get full text
Article -
249
-
250
-
251
Author Correction: Mannose-binding lectin gene sequence data in Kelantan population
Published 2025-01-01Get full text
Article -
252
Authors' Reply to Bilateral Optic Disc Edema in a Patient with Lead Poisoning
Published 2021-07-01Get full text
Article -
253
Author Correction: Thermophilic Hadarchaeota grow on long-chain alkanes in syntrophy with methanogens
Published 2025-01-01Get full text
Article -
254
Author Correction: Prospective de novo drug design with deep interactome learning
Published 2025-01-01Get full text
Article -
255
ABOUT THE COMPOSITION AND NEUTRON ACTIVATION RADIOGRAPHY OF TOPAZ CRYSTALS FROM AN AUTHOR’S COLLECTION
Published 2024-09-01Get full text
Article -
256
FEATURES OF INFLUENCE OF PUBLIC AUTHORITIES ON CIVIL SOCIETY IN THE CONTEXT OF MANAGEMENT IN THE RUSSIAN FEDERATION
Published 2018-08-01Subjects: “…structures of public authority…”
Get full text
Article -
257
Author Correction: Automatic detection and counting of wheat spike based on DMseg-Count
Published 2025-02-01Get full text
Article -
258
Author Correction: Uncovering functional lncRNAs by scRNA-seq with ELATUS
Published 2025-01-01Get full text
Article -
259
Account hijacking threat attack detection for OAuth2.0 authorization API
Published 2019-06-01“…OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnerabilities of the OAuth2.0 protocol.A vulnerable API identification method based on differential traffic analysis and an account hijacking verification method based on authorized authentication traffic monitoring was proposed.An account hijacking attack threat detection framework OScan for OAuth2.0 authorization API was designed and implemented.Through a large-scale detection of the 3 853 authorization APIs deployed on the Alexa top 10 000 websites,360 vulnerable APIs were discovered.The further verification showed that 80 websites were found to have threat of account hijacking attack.Compared with similar tools,OScan has significant advantages in covering the number of identity provider,the number of detected relying party,as well as the integrity of risk detection.…”
Get full text
Article -
260
Author Correction: Pre-therapeutic efficacy of the CDK inhibitor dinaciclib in medulloblastoma cells
Published 2025-02-01Get full text
Article