Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1661
Artificial-Intelligence-Based Investigation on Land Use and Land Cover (LULC) Changes in Response to Population Growth in South Punjab, Pakistan
Published 2025-01-01Subjects: Get full text
Article -
1662
Quantum anonymous one-vote veto protocol based on BB84 states
Published 2022-08-01Subjects: Get full text
Article -
1663
Farmers’ Perception of the Impacts of Climate Variability and Change on Food Security in Rubanda District, South Western Uganda
Published 2019Subjects: “…Climate Variability and Change; Food security; Rubanda district; Agricultural production; Farmers’ perception…”
Get full text
Article -
1664
The Effect of Hiv/Aids Scourge on Food Security in Nyabbani Sub-County, Kitagwenda District.
Published 2023Subjects: Get full text
Thesis -
1665
Effect of Tea Growing on Food Security in Mpungu Sub-County Kanungu District Uganda.
Published 2024Subjects: Get full text
Thesis -
1666
Military-political Processes in the Caucasus Region and the Security of Russia
Published 2015-06-01Subjects: Get full text
Article -
1667
Explainable and perturbation-resilient model for cyber-threat detection in industrial control systems Networks
Published 2025-02-01Subjects: “…Cyber-security…”
Get full text
Article -
1668
THE ANALYSIS OF DAHIYA DOCTRINE IN THE CONTEXT OF ISRAEL’S FURTHER SECURITY CLAIM
Published 2018-06-01Subjects: Get full text
Article -
1669
Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
Published 2016-09-01Subjects: Get full text
Article -
1670
-
1671
PROBLEMS OF TRADE-ECONOMIC COOPERATION OF THE RUSSIAN FEDERATION AND THE KYRGYZ REPUBLIC WITHIN THE FRAMEWORK OF THE EAEU
Published 2017-03-01Subjects: Get full text
Article -
1672
ECONOMIC SANCTIONS: THE ENTITY TYPES AND THEIR IMPACT ON THE FINANCIAL SUSTAINABILITY OF RUSSIAN ENTERPRISES
Published 2018-01-01Subjects: Get full text
Article -
1673
The impact of land transfer on food security: the mediating role of environmental regulation and green technology innovation
Published 2025-02-01Subjects: Get full text
Article -
1674
On the parameter selection of randomness test
Published 2009-01-01Subjects: “…information security…”
Get full text
Article -
1675
Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach
Published 2025-03-01Subjects: “…Information security policy…”
Get full text
Article -
1676
Review of climate-resilient agriculture for ensuring food security: Sustainability opportunities and challenges of India
Published 2025-02-01Subjects: Get full text
Article -
1677
Standards of living and human potential development: Assessing risks to regions’ economic security
Published 2025-01-01Subjects: “…economic security…”
Get full text
Article -
1678
Task scheduling optimization strategy for roadside unit based on security strength
Published 2024-04-01Subjects: Get full text
Article -
1679
Enhancing concealed object detection in active THz security images with adaptation-YOLO
Published 2025-01-01Subjects: “…Active terahertz (THz) security image…”
Get full text
Article -
1680
Deep packet inspection oriented high speed packet parsing architecture
Published 2013-06-01Subjects: Get full text
Article