Current Search:  security (x)

View All Items

  • CSV Spreadsheet
(41 - 60 of 63)

Pages

Three Studies of Stakeholder Influence in the Formation and Management of Tax Policies
Federal, State and Local Law Enforcement Agency Interoperability Capabilities and Cyber Vulnerabilities
Pervasive Secure Content Delivery Networks Implementation
Microgrid Control and Protection: Stability and Security
An Evaluation Study of the Implementation of Webcam Proctoring for Secure Testing in a K-12 Virtual School
Evaluation of a secure laptop based testing program in an undergraduate nursing program
HEALTHCARE COMMUNICATION NETWORKS: THE DISSEMINATION OF EMPLOYEE INFORMATION FOR HOSPITAL SECURITY
CENTRAL ASIAN SECURITY: WITH A FOCUS ON KAZAKHSTAN
A COMPARATIVE ANALYSIS OF THE USA PATRIOT ACT OF 2001 TO THE USA FREEDOM ACT OF 2015: BALANCING SECURITY WITH LIBERTY
Appropriate Adjective: Executive Authority and the Classification of Enemy Combatants
Security of Autonomous Systems under Physical Attacks: With application to Self-Driving Cars
Masquerading Techniques in IEEE 802.11 Wireless Local Area Networks
Energy Efficient and Secure Wireless Sensor Networks Design
Managing Effective Collaboration among Law Enforcement, Intelligence Services, and Military Forces in Fight against Terrorism and Organized Crime
Principals' Perceptions and Self-efficacy in Relation to School Security
SAUDI ARABIA AND EXPANSIONIST WAHHABISM
Networking and security solutions for VANET initial deployment stage
ARCHITECTURAL SUPPORT FOR IMPROVING COMPUTER SECURITY
Effects of Signal Probability on Multitasking-Based Distraction in Driving, Cyberattack (&) Battlefield Simulation
Quantifying Trust and Reputation for Defense against Adversaries in Multi-Channel Dynamic Spectrum Access Networks

Pages