Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1481
Effect of Tea Growing on Food Security in Mpungu Sub-County Kanungu District Uganda.
Published 2024Subjects: Get full text
Thesis -
1482
Research on data encryption system and technology for cloud storage
Published 2020-08-01Subjects: “…cloud security…”
Get full text
Article -
1483
A domain adaptive hybrid genetic algorithm and its verification in security service function chain orchestration
Published 2020-05-01Subjects: “…cloud security…”
Get full text
Article -
1484
Video surveillance legislation in the EU and Slovenia: privacy rights, security needs, and data protection challenges
Published 2023-11-01“…It distinguishes itself by offering a practical view in ensuring data protection compliance and security technologies regarding video surveillance.…”
Get full text
Article -
1485
A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform
Published 2017-01-01“…An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. …”
Get full text
Article -
1486
The impact of land transfer on food security: the mediating role of environmental regulation and green technology innovation
Published 2025-02-01Subjects: Get full text
Article -
1487
Controllability design of a memristive hyperchaotic map and the construction of optical fiber secure communication system
Published 2024-04-01Subjects: Get full text
Article -
1488
ANALYSIS OF THE RESULTS OF SIMULATIVE MODELLING OF THE INFORMATION SECURITY SYSTEM IN THE CORPORATE NETWORKS OF HIGHER EDUCATION INSTITUTIONS
Published 2024-09-01Subjects: Get full text
Article -
1489
Water security reframed using Water System Justice and Earth system boundaries, foundations, and corridor
Published 2025-01-01Subjects: “…water security…”
Get full text
Article -
1490
SAFETY AND SECURITY OF WOMEN ON TRANSPORT: A CASE OF RIDE-HAILING SERVICES IN GAUTENG, SOUTH AFRICA
Published 2023-12-01“…This study explores the safety and security of women using ride-hailing services in Gauteng. …”
Get full text
Article -
1491
-
1492
Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks
Published 2016-07-01“…To overcome these drawbacks, we propose a secure biometric-based authentication scheme in WSNs that is secure against inside adversaries and provides secure and efficient smart card revocation/reissue.…”
Get full text
Article -
1493
E-LEARNING AS AN INSTRUMENT ENSURING NATIONAL COMPETITIVE ADVANTAGES DEVELOPMENT AND THE SOURCE OF NATIONAL SECURITY THREATS
Published 2016-12-01Subjects: Get full text
Article -
1494
Synthesizing the impact of armed conflicts on food security, livelihoods and social dynamics in Amhara region, Ethiopia
Published 2025-02-01“…This resulted in severe damage to the food security, livelihoods and social dynamics of communities in the Amhara region. …”
Get full text
Article -
1495
A Remote User Security Authentication Scheme Using Smart Card and Password Protection for WSN
Published 2015-12-01Subjects: Get full text
Article -
1496
A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks
Published 2014-01-01“…The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. …”
Get full text
Article -
1497
MalAware: A tabletop exercise for malware security awareness education and incident response training
Published 2024-01-01Subjects: Get full text
Article -
1498
-
1499
The evolution of food security in Japan-Based on an indicator evaluation system including climate change indicators.
Published 2025-01-01“…As climate change intensifies, food security has received widespread attention. This study examines the development of Japan's food security index and its relationship with climate change. …”
Get full text
Article -
1500
Peculiarities of legal regulation of activities of the National Police of Ukraine in the field of ensuring information security in Ukraine
Published 2020-12-01Subjects: “…information security…”
Get full text
Article