Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1941
Risk Assessment Maturity Level of Academic Information System Using ISO 27001 System Security Engineering-Capability Maturity Model
Published 2024-06-01“…This research aims to determine the current level of Academic Information System (AIS) service by measuring maturity and security risks. Three clauses measure the maturity level of information security controls with the ISO 27001 System Security Engineering-Capability Maturity Model (SSE-CMM). …”
Get full text
Article -
1942
Threats and Challenges to The International Legal Order: Legal Problems Of Ensuring International Security in Modern Conditions (Some Conceptual Conclusions and Conclusions)
Published 2024-01-01“…This study is aimed at considering topical international legal problems of ensuring international security in the modern environment of environmental and nuclear law. …”
Get full text
Article -
1943
RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks
Published 2025-01-01Subjects: “…Secure channel…”
Get full text
Article -
1944
APPLICATION OF ARTIFICIAL INTELLIGENCE FOR IMPROVING SITUATIONAL TRAINING OF CYBERSECURITY SPECIALISTS
Published 2023-10-01Subjects: Get full text
Article -
1945
Survey of capacity limits and implementation techniques in wireless covert communication
Published 2022-08-01Subjects: Get full text
Article -
1946
Human Security in Asia: Interrogating State, Society, and Policy, edited by Debasish Nandy, and Debtanu Majee....
Published 2024-12-01Subjects: Get full text
Article -
1947
Regionalismo y Seguridad Sudamericana: ¿son relevantes el Mercosur y la Unasur?
Published 2010-09-01Subjects: Get full text
Article -
1948
Brexit and the Future of the Special Relationship between the United States and the United Kingdom
Published 2020-11-01Subjects: Get full text
Article -
1949
Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach
Published 2025-03-01Subjects: “…Information security policy…”
Get full text
Article -
1950
-
1951
MANAGING FRAUD IN CONTEMPORARY BUSINESS ENVIRONMENT, THE ROLE OF INFORMATION SECURITY MANAGEMENT: A STUDY OF QUOTED DEPOSIT MONEY BANKS (DMBs) IN NIGERIA
Published 2024-05-01Subjects: “…information security management…”
Article -
1952
Performance of RIS-Secured Short-Packet NOMA Systems With Discrete Phase-Shifter to Protect Digital Content and Copyright Against Untrusted User
Published 2025-01-01Subjects: “…Content security…”
Get full text
Article -
1953
An Extended Interval Type-2 Fuzzy VIKOR Technique with Equitable Linguistic Scales and Z-Numbers for Solving Water Security Problems in Malaysia
Published 2023-01-01“…The obtained solutions would help decision makers (DMs) identify the best solution to enhance water security projects in terms of finding the best strategies for water supply security in Malaysia.…”
Get full text
Article -
1954
Three Mediating Pathways of Anxiety and Security in the Relationship between Coping Style and Disordered Eating Behaviors among Chinese Female College Students
Published 2021-01-01“…According to previous studies, eating disorders and disordered eating behaviors are associated with coping style, anxiety, and sense of security. However, the specific mechanism between them has not been elucidated. …”
Get full text
Article -
1955
-
1956
-
1957
A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques
Published 2015-04-01“…User authentication in wireless sensor networks (WSNs) is a critical security issue due to their unattended and hostile deployment in the field. …”
Get full text
Article -
1958
Digital health data security practices among health professionals in low-resource settings: cross-sectional study in Amhara Region, Ethiopia
Published 2025-02-01Subjects: Get full text
Article -
1959
Early life stress, kangaroo care, parenting behavior and secure attachment predict executive functioning in 2 year olds born preterm
Published 2025-01-01“…Kangaroo care, non-intrusive maternal parenting behavior and secure attachment were associated with higher executive function scores. …”
Get full text
Article -
1960