-
1
Network Security Threats and Countermeasures on Cloud Computing
Published 2013-08-01Subjects: Get full text
Article -
2
A Comprehensive Approach for Detecting and Handling MitM-ARP Spoofing Attacks
Published 2025-01-01Subjects: “…IPv4 security issue…”
Get full text
Article -
3
A framework for the formulation of security issues in the field of e-learning using Meta-Synthesis method
Published 2014-09-01Subjects: Get full text
Article -
4
Rape in the metropolis: the geography of crime in Delhi
Published 2014-11-01Subjects: Get full text
Article -
5
On large language models safety, security, and privacy: A survey
Published 2025-03-01Subjects: Get full text
Article -
6
Security protocol of wireless sensor networks localization: analysis and performance
Published 2025-04-01Subjects: Get full text
Article -
7
JAPANESE DIPLOMACY WITHIN ASEAN REGIONAL FORUM (ARF): SOME ASPECTS OF THE REGIONAL SECURITY
Published 2013-08-01Subjects: Get full text
Article -
8
Assessment of Exchange Options for Attracting External Financing by Small and Medium Businesses
Published 2021-09-01Subjects: Get full text
Article -
9
Blockchain-powered wireless sensor networks: enhancing security and privacy in the IoT era
Published 2023-06-01Subjects: Get full text
Article -
10
European Aid to Foreign Countries in Emergencies – Are ECHO and the EU Large-Donor Countries on the Same Track?
Published 2014-09-01Subjects: Get full text
Article -
11
Online fashion consumerism among women: The interplay of digital experiences and decision-making – a mediated moderated analysis
Published 2024-12-01Subjects: Get full text
Article -
12
Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers
Published 2025-06-01Subjects: Get full text
Article -
13
India’s African Policy as Viewed by a German Researcher
Published 2024-12-01Subjects: Get full text
Article