Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2121
Review of iOS malicious application analysis
Published 2017-02-01Subjects: “…iOS security…”
Get full text
Article -
2122
Exploration and practice of data classification and grading based on DSMM
Published 2024-11-01Subjects: Get full text
Article -
2123
Application of artificial intelligence in modern weapon systems - opportunities and threats in armed conflicts
Published 2024-12-01Subjects: Get full text
Article -
2124
New Enhanced Authentication Protocol for Internet of Things
Published 2021-03-01Subjects: Get full text
Article -
2125
Research and practice of mobile application lifecycle management platform
Published 2020-12-01Subjects: Get full text
Article -
2126
-
2127
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: Get full text
Article -
2128
Russia`s Cultural Diplomacy in the Current Geopolitical Context
Published 2024-12-01Subjects: “…security…”
Get full text
Article -
2129
Machine politics: The cultural science of permissionless systems
Published 2022-12-01Subjects: Get full text
Article -
2130
Navigating the Aftermath: U.S. Policy in Afghanistan Following Troop Withdrawal
Published 2023-09-01Subjects: Get full text
Article -
2131
Le Maghreb et l’Europe face à la crise du Sahel : Coopération ou rivalités ?
Published 2013-10-01Subjects: Get full text
Article -
2132
Enhancing Industrial Cybersecurity: Insights From Analyzing Threat Groups and Strategies in Operational Technology Environments
Published 2025-01-01Subjects: Get full text
Article -
2133
The production process of chepa shutki: A traditional Bangladeshi fermented fish product
Published 2025-01-01Subjects: Get full text
Article -
2134
Certificate integration management platform based on identity key
Published 2016-10-01Subjects: Get full text
Article -
2135
STRENGTHENING RESILIENCE: THE ROLE OF INSTITUTIONS IN FACILITATING LOCAL AGRICULTURAL ADAPTATION TO THE IMPACT OF CLIMATE CHANGE IN TANZANIA
Published 2024-11-01Subjects: Get full text
Article -
2136
Research on Android malware detection based on permission and behavior
Published 2017-03-01Subjects: Get full text
Article -
2137
Inteligência Territorial e sua interface com as políticas públicas: o Painel de Segurança Hídrica (PSH)
Published 2023-10-01Subjects: Get full text
Article -
2138
Unknown presentation attack detection against rational attackers
Published 2021-09-01Subjects: Get full text
Article -
2139
Regularities of the metallurgical industry restructuring process: Content, safety and regulation
Published 2023-06-01Subjects: Get full text
Article -
2140