Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 5
- Computer networks 4
- Management 3
- Prevention 3
- Data protection 2
- Handbooks, manuals, etc 2
- National security 2
- Security, International 2
- Biotechnology 1
- Bioterrorism 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Credit 1
- Crime prevention 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Information technology 1
- Intellectual property infringement 1
- Internal security 1
- Laboratories 1
- Law 1
- Law and legislation 1
- Life sciences 1
- Loans 1
- Medical care, Cost of 1
-
1
Characterization of Some Claw-Free Graphs in Co-Secure Domination Number
Published 2025-07-01Subjects: “…co-secure dominating set…”
Get full text
Article -
2
Book review: Fulcher, L, and Moran, A. (2003). Sisters of pain: An ethnography of young women living in secure care. Cape Town: CYC-Net Press, 262 pp., ISBN 978-1- 928212-01-0
Published 2015-12-01Subjects: “…secure facilities…”
Article -
3
Method of Secure Domain Creation for Multiple Points in Home Networking
Published 2015-11-01Subjects: “…home networking;secure network;secure domain…”
Get full text
Article -
4
Sensing-Assisted Secure Communications over Correlated Rayleigh Fading Channels
Published 2025-02-01Subjects: Get full text
Article -
5
Verifiable secure image retrieval for cloud-assisted IoT environments
Published 2025-03-01Subjects: “…secure image retrieval…”
Get full text
Article -
6
Securing the IoT Landscape: A Comprehensive Review of Secure Systems in the Digital Era
Published 2024-12-01Subjects: Get full text
Article -
7
Practical Implementation of Unconditionally Secure File Transfer Application with QKD and OTP
Published 2025-03-01Subjects: Get full text
Article -
8
Survey of research on efficient secure inference for deep learning
Published 2025-05-01Subjects: Get full text
Article -
9
Blockchain-Secure Gaming Environments: A Comprehensive Survey
Published 2024-01-01Subjects: Get full text
Article -
10
PoSW:novel secure deduplication scheme for collaborative cloud applications
Published 2017-07-01Subjects: Get full text
Article -
11
A secure end-to-end communication framework for cooperative IoT networks using hybrid blockchain system
Published 2025-04-01Subjects: Get full text
Article -
12
A Comprehensive Review of Cryptographic Techniques in Federated Learning for Secure Data Sharing and Applications
Published 2025-01-01Subjects: “…Secure data sharing…”
Get full text
Article -
13
Adjusting the volume: reflections on engagement with autistic young people living in secure care
Published 2024-11-01Subjects: “…secure care…”
Article -
14
An authorizable and preprocessable data transmission scheme based on elliptic curves
Published 2025-07-01Subjects: “…Secure transmission…”
Get full text
Article -
15
SECURE VERTEX-EDGE DOMINATION IN HYPERCUBE AND GRID GRAPHS: APPLICATIONS OF CYBERSECURITY IN BANKING FOR SECURE TRANSACTIONS
Published 2025-06-01Subjects: “…secure vertex-edge domination…”
Get full text
Article -
16
Delegation-Based Agile Secure Software Development Approach for Small and Medium-Sized Businesses
Published 2024-01-01Subjects: “…Software security…”
Get full text
Article -
17
Systematic Literature Review on Security Risks and its Practices in Secure Software Development
Published 2022-01-01Subjects: “…Software security…”
Get full text
Article -
18
Research on the anti-synchronization chaos system group &large scale distributed system security communication
Published 2017-07-01Subjects: “…secure communication;chaotic;anti-synchronization;carrier…”
Get full text
Article -
19
Hubungan Secure Attachment Orang Tua dengan Penyesuaian Diri pada Siswa SMP Islamic Boarding School
Published 2022-10-01Subjects: Get full text
Article -
20
Integrasi Audit dan Teknik Clustering untuk Segmentasi dan Kategorisasi Aktivitas Log
Published 2024-02-01Subjects: Get full text
Article