Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2361
Trustworthy component model supporting networks reconfiguration
Published 2013-03-01Subjects: Get full text
Article -
2362
Time based incremental backup scheme for mobile cloud computing
Published 2016-08-01Subjects: Get full text
Article -
2363
Modeling and countermeasures of a social network-based botnet with strong destroy-resistance
Published 2017-01-01Subjects: “…network security…”
Get full text
Article -
2364
Quantum Key Distribution Applicability to Smart Grid Cybersecurity Systems
Published 2025-01-01Subjects: “…Smart grid security…”
Get full text
Article -
2365
“Shoot Against the Waves”: Securitization and Militarization of Natural Disasters and Humanitarian Help in Latin America
Published 2019-05-01Subjects: Get full text
Article -
2366
Classified risk assessment method of Android application based on multi-factor clustering selection
Published 2021-04-01Subjects: Get full text
Article -
2367
The Global Assessment of Oilseed Brassica Crop Species Yield, Yield Stability and the Underlying Genetics
Published 2022-10-01Subjects: Get full text
Article -
2368
Dynamic P2P trust model based on time-window feedback mechanism
Published 2010-01-01Subjects: “…information security…”
Get full text
Article -
2369
Exploring the talent training mode of“cybersecurity doctor”
Published 2019-06-01Subjects: Get full text
Article -
2370
A Lightweight Mitigation Technique Against a Modified Version Number Attack in IoT Networks
Published 2025-01-01Subjects: Get full text
Article -
2371
Mistaken Worlds: When “Abundance” and “Scarcity” Collide in the Colombian Amazon
Published 2016-01-01Subjects: Get full text
Article -
2372
Meta-analysis of water stress impact on rice quality in China
Published 2025-02-01Subjects: Get full text
Article -
2373
Survey of data possession provability proving on cloud storage
Published 2012-11-01Subjects: Get full text
Article -
2374
The New Anti-Terrorism Act of the Philippines and Its Conflict with the International Human Rights System
Published 2024-03-01Subjects: Get full text
Article -
2375
Les politiques agricoles de l'Indonésie et de la Malaisie face aux impératifs de la sécurité alimentaire
Published 2014-05-01Subjects: Get full text
Article -
2376
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01Subjects: Get full text
Article -
2377
A comparison of several intrusion detection methods using the NSL-KDD dataset
Published 2024-06-01Subjects: “…Cyber Security…”
Get full text
Article -
2378
The EU-Azerbaijan Relations in the Gas Transporting Sector
Published 2022-11-01Subjects: Get full text
Article -
2379
Research on color QR code watermarking technology based on chaos theory
Published 2018-07-01Subjects: “…information security…”
Get full text
Article -
2380
Cloud-Based Transaction Fraud Detection: An In-depth Analysis of ML Algorithms
Published 2024-06-01Subjects: “…Cloud-Security, Fraud-Detection, Fraud-Transaction, ML, Evaluation, Performance.…”
Get full text
Article