Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2081
CRITICAL INFRASTRUCTURE PROTECTION - STRATEGIC OPPORTUNITIES
Published 2025-03-01Subjects: Get full text
Article -
2082
Key Technology and Application of Next-Generation UICC with Remote Management Capability
Published 2015-03-01Subjects: Get full text
Article -
2083
Research on Anti-Trojan Malware Mechanism Based on Characteristic Behavior
Published 2014-11-01Subjects: Get full text
Article -
2084
Community Development in the Rural Areas through Traditional Indigenous Knowledge
Published 2019Subjects: “…Community Development, Indigenous Knowledge, Peace and Security…”
Get full text
Article -
2085
-
2086
‘We are not trained to do clinical work’: security staff providing physical restraint for NGT feeding in English paediatric wards—a qualitative multi-informant study
Published 2024-12-01“…Objective To gain insights into the experience, and impact, of using security staff to facilitate physical restraints for nasogastric tube feeding.Design A cross-sectional design using 39 individual interviews, three online focus groups and three written submissions involving young people with lived experience (PWLE), parents/carers, paediatric staff and security staff involved in nasogastric feeding under restraint in paediatric settings in England. …”
Get full text
Article -
2087
-
2088
-
2089
-
2090
Food purchase patterns, food policy recognition, and food environment satisfaction among adults in Jeju, Korea, according to food security: a cross-sectional study
Published 2024-10-01Subjects: “…food security…”
Get full text
Article -
2091
-
2092
United Nations - African Union Cooperation In Conflict Prevention, Peacekeeping and Peacebuildin
Published 2015-12-01Subjects: Get full text
Article -
2093
An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning
Published 2022-05-01Subjects: Get full text
Article -
2094
The situation in Afghanistan and its possible evolution in the context of the "factor 2014"
Published 2013-04-01Subjects: “…international security assistance force - isaf…”
Get full text
Article -
2095
Privacy-preserving federated learning framework with irregular-majority users
Published 2022-02-01Subjects: Get full text
Article -
2096
The Evaluative Process Model of Objectification: how men's evaluations of patriarchal security and women's fit with conventional beauty and sexuality norms interact to predict perpetration of sexually objectifying behaviors
Published 2025-01-01“…Among men who endorse patriarchal ideologies, perceived patriarchy threat or security is theorized to interact with evaluations of female targets to predict whether objectifying perceptions of female targets result in benevolent, derogative, or dismissive objectifying behaviors. …”
Get full text
Article -
2097
A Scalable Approach to Internet of Things and Industrial Internet of Things Security: Evaluating Adaptive Self-Adjusting Memory K-Nearest Neighbor for Zero-Day Attack Detection
Published 2025-01-01“…This study confirms the feasibility of Adaptive SAMKNN as a real-time, scalable, and memory-efficient solution for IoT and IIoT security, providing reliable anomaly detection without overwhelming computational resources. …”
Get full text
Article -
2098
Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach
Published 2022-01-01“…Second, a non-linear CPS dual security control framework that integrates active-passive attack tolerance for DoS attack and active fault tolerance for actuator fault is constructed. …”
Get full text
Article -
2099
DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article -
2100
Securitization of China in the NATO discourse in the late 2010s— early 2020s: Towards a global collective identity
Published 2024-07-01Subjects: Get full text
Article