Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1821
Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment
Published 2025-01-01“…However, ensuring a high level of security in CC environments remains a significant challenge. …”
Get full text
Article -
1822
-
1823
Wireless sensor security communication and anti-leak locating technology based on region partition in power mobile inspection
Published 2016-02-01“…In order to solve the problem of low transmission efficiency and security of the grid,ensure the normal operation of power network,reduce network burden and improve the security of system access,a secure communication and private key location technology of wireless sensor based on region partition was designed by using the technology of time synchronization verification. …”
Get full text
Article -
1824
The Effect of Alcoholism on Food Security in Rural Areas: A Case Study of Bufundi Subcounty Rubanda District Uganda.
Published 2024Subjects: Get full text
Thesis -
1825
Preparing the enterprise information environment for the digital economy
Published 2022-06-01Subjects: Get full text
Article -
1826
Comment sécuriser l'accès au foncier pour assurer la sécurité alimentaire des populations africaines : éléments de réflexion
Published 2014-05-01Subjects: “…food security…”
Get full text
Article -
1827
Android application privacy protection mechanism based on virtual machine bytecode injection
Published 2021-06-01Subjects: “…Android security…”
Get full text
Article -
1828
-
1829
Partager la fonction répressive : la collaboration entre la police et une compagnie de sécurité privée dans un quartier aisé du Cap
Published 2010-09-01Subjects: Get full text
Article -
1830
International experience in mobilising mechanisms to combat organised crime
Published 2024-11-01Subjects: Get full text
Article -
1831
THE DUAL MODEL OF THE DEVELOPMENT OF GERMAN ARMED FORCES
Published 2017-11-01Subjects: Get full text
Article -
1832
Research on Safety Risks of Speech Information
Published 2022-11-01Subjects: “…security risk…”
Get full text
Article -
1833
Endogenous detection framework of malicious behavior in information network
Published 2020-10-01Subjects: Get full text
Article -
1834
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
Published 2022-05-01Subjects: “…computer network security…”
Get full text
Article -
1835
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
Published 2023-07-01Subjects: Get full text
Article -
1836
A Mobile Science Laboratory: Architectural Design For Secondary Schools In Uganda
Published 2019Subjects: “…Security, Mobile, Learning…”
Get full text
Article -
1837
INTERNET COMMUNICATION: NEW CHALLENGES FOR THE YOUTH
Published 2013-10-01Subjects: Get full text
Article -
1838
Prawo do wolności słowa a bezpieczeństwo narodowe w Polsce i Rosji ? analiza porównawcza
Published 2023-07-01Subjects: “…national security…”
Get full text
Article -
1839
Safeguarding Mobile Users from Violation by Third-party Apps
Published 2025-01-01Subjects: Get full text
Article -
1840
The System for Improving the State Financial Control
Published 2019-06-01Subjects: “…national security…”
Get full text
Article