Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
421
Climate variability, population growth, and globalization impacting food security in Pakistan
Published 2025-02-01Subjects: Get full text
Article -
422
Young people’s participation in the recruitment and selection process for secure care staff
Published 2007-03-01Article -
423
AGRICULTURE AS A UNIFER OF SECURITY AND DEVELOPMENT IN THE FACE OF FREE MARKET CHALLENGES
Published 2024-12-01Subjects: “…security…”
Get full text
Article -
424
Political Framework and Legal Basis of the EU-Russia Security Co-Operation
Published 2012-04-01Get full text
Article -
425
Secure Pesticide Storage: Using and Managing a Pesticide Storage Facility
Published 2004-10-01“…Revised: November 2004. PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
Get full text
Article -
426
A certificateless aggregate signature scheme for security and privacy protection in VANET
Published 2022-05-01“…Unfortunately, some of them still have some security and privacy issues under specific existing attacks. …”
Get full text
Article -
427
Methodology for determining actual threats to information security in medical information system
Published 2021-11-01“…Its use also makes it possible to assess the relevance of information security threats for MIS that do not have qualified specialists in the field of information security in the staff of a medical institution, which is relevant for a large number of medical institutions. …”
Get full text
Article -
428
Theoretical and methodological approaches to the study of interregional interactions in ensuring economic security
Published 2022-07-01Subjects: Get full text
Article -
429
Quantum Algorithms for the Physical Layer: Potential Applications to Physical Layer Security
Published 2025-01-01Subjects: Get full text
Article -
430
The Threat from European Missile Defence System to Russian National Security
Published 2014-02-01Get full text
Article -
431
A Novel Computer Virus Propagation Model under Security Classification
Published 2017-01-01“…In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. …”
Get full text
Article -
432
Strategic Nuclear and Non-Nuclear Deterrence in Russia’s National Security Policy
Published 2025-02-01Subjects: Get full text
Article -
433
Factors of geography and security in the integration construction: the case of East- Asian integration
Published 2012-12-01“…The paper analyzes the impact of geography and security threats on the dynamics and forms of integration cooperation in the area of East Asia. …”
Get full text
Article -
434
Secure Pesticide Storage: Workspace Features of a Pesticide Storage Facility
Published 2004-10-01“… This document identifies and discusses three key features of a pesticide storage facility's interior that, in combination, promote both worker safety and pesticide container security. This document is Fact Sheet PI-31, part of a series from the Pesticide Information Office, Food Science and Human Nutrition Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
435
End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things
Published 2025-01-01Subjects: Get full text
Article -
436
Editorial: Artificial Intelligence-based Security Applications and Services for Smart Cities
Published 2024-08-01Get full text
Article -
437
CLIMATE CHANGE AND LAND-BASED CONFLICT: THE IMPACT ON FOOD SECURITY IN NIGERIA
Published 2022-05-01Subjects: Get full text
Article -
438
Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)
Published 2016-01-01Get full text
Article -
439
Privacy and Security in Digital Health Contact-Tracing: A Narrative Review
Published 2025-01-01“…Such acceptance depends on public perceptions and are likely influenced by privacy and security concerns. Therefore, this review evaluates public perceptions towards the privacy and security of contact-tracing apps used during the recent COVID-19 pandemic, with a focus on identifying factors that influence acceptance. (2) Methods: A systematic literature review was performed. …”
Get full text
Article -
440
Navigating the Challenges and Opportunities of Securing Internet of Autonomous Vehicles With Lightweight Authentication
Published 2025-01-01“…We also highlight the fast lightweight security protocols implemented on heterogeneous embedded, low-power, high-performance computing platforms as a viable solution to address these challenges.…”
Get full text
Article