Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2701
Research on extended access control mechanism in online social network
Published 2021-10-01Subjects: Get full text
Article -
2702
Business in Ecological Sphere: it's Role in World Politics
Published 2013-06-01Subjects: “…national security…”
Get full text
Article -
2703
Research on performance optimizations for TCM-KNN network anomaly detection algorithm
Published 2009-01-01Subjects: “…network security…”
Get full text
Article -
2704
Dynamics, vulnerabilities and prospects of the Colombian-Venezuelan border
Published 2021-05-01Subjects: Get full text
Article -
2705
Truthful incentive mechanism for “digital currency”based on privacy protection
Published 2019-04-01Subjects: Get full text
Article -
2706
Network anomaly detection based on TCM-KNN and genetic algorithm
Published 2007-01-01Subjects: “…network security…”
Get full text
Article -
2707
International Experience of Organizing Cooperation between police and Public
Published 2020-12-01Subjects: Get full text
Article -
2708
Belarus’ Sovereignty in Question: Assessing its de facto Sovereign Status in the Shadow of Russia
Published 2024-06-01Subjects: Get full text
Article -
2709
MACHINE LEARNING AS A CORPORATION'S TOOL FOR SELECTION OF SUPPLIERS
Published 2019-10-01Subjects: Get full text
Article -
2710
Tracking illegal activities using video surveillance systems: a review of the current state of research
Published 2024-03-01Subjects: Get full text
Article -
2711
Threshold ring signature for wireless sensor networks
Published 2012-03-01Subjects: Get full text
Article -
2712
Network intrusion intention analysis model based on Bayesian attack graph
Published 2020-09-01Subjects: Get full text
Article -
2713
Recent advances in organic fluorophores as anti-counterfeit agents: an up-to-date review
Published 2025-01-01Subjects: Get full text
Article -
2714
Survey of optical-based physical domain adversarial attacks and defense
Published 2024-04-01Subjects: Get full text
Article -
2715
Interestmeasurement and system construction of personal information protectionLI Meiyan
Published 2018-08-01Subjects: Get full text
Article -
2716
Modernization of the mechanism of the financial services market cybersecurity legal support
Published 2021-09-01Subjects: Get full text
Article -
2717
LEGAL ANALYSIS OF TARGETING AS A BASIS FOR THE PROVISION OF SOCIAL ASSISTANCE
Published 2024-05-01Subjects: “…poverty alleviation, targeting, social security, social benefits, inequality in society, sustainable development.…”
Get full text
Article -
2718
Synergetic Paradigm of Geopolitical Confrontation in the Postmodern Era
Published 2014-08-01Subjects: Get full text
Article -
2719
The concept of peace and victory in the domestic and foreign policy of Ukraine
Published 2023-04-01Subjects: Get full text
Article -
2720