Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
561
CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD
Published 2022-10-01Subjects: “…IoT security, sniffing IoT attacks, ThingSpeak, IoT, IoT attacks…”
Get full text
Article -
562
JAPANESE DIPLOMACY WITHIN ASEAN REGIONAL FORUM (ARF): SOME ASPECTS OF THE REGIONAL SECURITY
Published 2013-08-01Subjects: Get full text
Article -
563
Optimal distribution modeling and multifractal analysis of wind speed in the complex terrain of Sichuan Province, China
Published 2025-02-01Subjects: Get full text
Article -
564
Integrating microplastic research in sustainable agriculture: Challenges and future directions for food production
Published 2025-06-01Subjects: Get full text
Article -
565
A STEGENOGRAPHY IN 3D MESH BY REARRANGING THE ORDER OF VERTEX PRESENTATION
Published 2013-06-01Subjects: Get full text
Article -
566
Covid-19 Implications to Transatlantic Security
Published 2024-04-01Subjects: Get full text
Article -
567
A tecnologia a serviço da segurança pública: caso PMSC mobile
Get full text
Article -
568
THE UN SECURITY COUNCIL ACTING ON SYRIA IN THE CONTEXT OF EMERGING MULTIPOLARITY OF INTERNATIONAL RELATIONS
Published 2018-02-01Subjects: Get full text
Article -
569
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01Subjects: “…Cloud Computing Security…”
Get full text
Article -
570
Strategies to Assess and Enhance the Community Food Environment
Published 2023-06-01Subjects: Get full text
Article -
571
Cyber security laws and safety in e-commerce in India
Published 2023-06-01Subjects: Get full text
Article -
572
Separate Aspects of Saving the Confidentiality of People Collaboration With Law Enforcement Bodies
Published 2019-05-01Subjects: Get full text
Article -
573
Implementation of a Smart Home Intruder Detection System using a Vibrometer and ESP 32 CAM
Published 2025-01-01Subjects: Get full text
Article -
574
İç Savaştan Devlet Başkanlığı Seçimine: Liberya’da Kalıcı Barış ve İstikrar Ne Derece Mümkün?
Published 2020-06-01Subjects: Get full text
Article -
575
Notes to Reflect on a Political Ecology of Borderland Territories
Published 2018-09-01Subjects: Get full text
Article -
576
Underutilized and neglected crop species and their role in enhancing household food security amid climate change, Wolaita Zone, Ethiopia
Published 2025-02-01Subjects: Get full text
Article -
577
Designing and explaining the political behavior model of managers in government organizations
Published 2024-09-01Subjects: Get full text
Article -
578
Impact of Climate Change on Food Security in Kashare Sub-County, Mbarara District.
Published 2024Subjects: Get full text
Thesis -
579
Impact of Climate Change on Food Security in Kashare Sub-County Mbarara District.
Published 2024Subjects: Get full text
Thesis -
580
U.S. – RUSSIA RELATIONS AND ARMS CONTROL: BREATING THE CLINCH
Published 2017-11-01Subjects: Get full text
Article