Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1601
Climate change reflects on security of the border villages, case study: Salas Babajani border villages
Published 2020-06-01Subjects: “…security…”
Get full text
Article -
1602
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
Published 2020-03-01Subjects: Get full text
Article -
1603
Research on new energy station network security assessment method based on improved LSTM network
Published 2024-10-01Subjects: Get full text
Article -
1604
Security Enhancement Using Cache Based Reauthentication in WiMAX Based E-Learning System
Published 2015-01-01Get full text
Article -
1605
Retracted: Risk Prediction Algorithm of Social Security Fund Operation Based on RBF Neural Network
Published 2024-01-01Get full text
Article -
1606
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
Published 2014-01-01“…Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. …”
Get full text
Article -
1607
Information Security Management in Small Public Sector Organizations: Requirements and Design of a Procedural Approach
Published 2023-12-01Subjects: Get full text
Article -
1608
Study on Ecological Security Assessment of Dongjiang River Basin in Jiangxi Province Based on PSFR Model
Published 2021-01-01Subjects: Get full text
Article -
1609
A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review
Published 2024-01-01Subjects: Get full text
Article -
1610
A health security-based framework for prioritizing regions for digital learning in complex health emergencies
Published 2025-01-01Subjects: Get full text
Article -
1611
Library Material Security and Service Delivery in Uganda: A Case Study of Rwenzori International University.
Published 2023Subjects: “…Library Material Security…”
Get full text
Thesis -
1612
Perennial crop farming and food security in Kigezi: a case study of Kigezi highland tea
Published 2023Subjects: Get full text
Article -
1613
Perennial crop farming and food security in Kigezi: a case study of Kigezi highland tea
Published 2023Subjects: Get full text
Article -
1614
Security of Physical Library Materials and Utilisation: A Case Study of National Teachers College Kabale.
Published 2023“…The purpose of the study was to assess the status of the security of physical library materials and their utilization at National Teachers College Kabale. …”
Get full text
Thesis -
1615
Assessing the Influence of High Population Growth Rate on Food Security in Nyamweru Subcounty Rubanda District.
Published 2024Subjects: Get full text
Thesis -
1616
Perennial crop farming and food security in Kigezi: a case study of Kigezi highland tea
Published 2023Subjects: Get full text
Article -
1617
-
1618
Analysis on the dynamics and structure of scientific and innovation-information development indicators of the Russian federal districts
Published 2023-12-01Subjects: “…economic security…”
Get full text
Article -
1619
Banco de dados geoespaciais: padronização e avaliação como suporte à Inteligência Territorial
Published 2023-10-01Subjects: “…Water Security…”
Get full text
Article -
1620
EVALUATING THREATS OF ARMED BANDITRY ON HUMAN AND FOOD SECURITY IN SHIRORO LOCAL GOVERNMENT AREA OF NIGER STATE, NIGERIA
Published 2023-12-01Subjects: Get full text
Article