SciMatic
Journals
Thesis Rep
Docs
Products
SciMatic.net
Journament
Journal Manager
Subjects
Thesis
ImProofer
Research Groups
Letter Pad
Conferences
Services
About
SciMatic
Team
Earn With Us
Join Us
Contact Us
EN
English
Türkçe
Español
Português
Pусский
Filipino
Tiếng Việt
हिन्दी
العربية
বাংলা
Deutsch
中文
Login
Keyword Connections
security
Journals
30
1
Nature communications
2
PloS one
3
Physical chemistry chemical physics : PCCP
4
Sensors (Basel, Switzerland)
5
Journal of medical Internet research
6
Journal of medical systems
7
Data in brief
8
BMC medical informatics and decision making
9
forensic science international
10
Lancet (London, England)
11
International journal of medical informatics
12
canadian medical education journal
13
physical review letters
14
Journal of the American Medical Informatics Association : JAMIA
15
Nature
16
Prehospital and disaster medicine
17
chaos (woodbury, ny)
18
international journal of health policy and management
19
pacific symposium on biocomputing pacific symposium on biocomputing
20
ieee transactions on bio-medical engineering
21
perspectives in health information management
22
acs synthetic biology
23
journal of the royal society of medicine
24
Annals of emergency medicine
25
medicine, conflict, and survival
26
Journal of personalized medicine
27
pharmacological reviews
28
ieee access : practical innovations, open solutions
29
acta historica leopoldina
30
Information systems frontiers : a journal of research and innovation
Research Groups
0
No Research Group Connected
Bibliographies
1134
1
James Bond and Global Health Diplomacy.
2
Climate change, conflict and health.
3
IFHDS: Intelligent Framework for Securing Healthcare BigData.
4
Semantic workflows for benchmark challenges: Enhancing comparability, reusability and reproducibility.
5
Cyber-Analytics: Identifying Discriminants of Data Breaches.
6
A Systematic Review for Enabling of Develop a Blockchain Technology in Healthcare Application: Taxonomy, Substantially Analysis, Motivations, Challenges, Recommendations and Future Direction.
7
Using genetic genealogy databases in missing persons cases and to develop suspect leads in violent crimes.
8
An interprofessional urban health elective focused on the social determinants of health.
9
Legal framework for health cloud: A systematic review.
10
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks.
11
Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules.
12
False Data Detection for Fog and Internet of Things Networks.
13
A Trust-Based Predictive Model for Mobile Ad Hoc Network in Internet of Things.
14
A Novel Framework for Estimating Time-Varying Multivariate Autoregressive Models and Application to Cardiovascular Responses to Acute Exercise.
15
Inhomogeneous membrane receptor diffusion explained by a fractional heteroscedastic time series model.
16
Tackling Faults in the Industry 4.0 Era-A Survey of Machine-Learning Solutions and Key Aspects.
17
Environmental Monitoring with Distributed Mesh Networks: An Overview and Practical Implementation Perspective for Urban Scenario.
18
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
19
The Psychopharmacology of Obsessive-Compulsive Disorder: A Preclinical Roadmap.
20
Rationale for Military Involvement in Humanitarian Assistance and Disaster Relief.
21
Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET.
22
Towards Security Joint Trust and Game Theory for Maximizing Utility: Challenges and Countermeasures.
23
Smartphone-Based Platform for Secure Multi-Hop Message Dissemination in VANETs.
24
Datasets of RT spoofing attacks on MIL-STD-1553 communication traffic.
25
Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things.
26
A Secure and Portable Multi-Sensor Module for Distributed Air Pollution Monitoring.
27
Secure and Blockchain-Based Emergency Driven Message Protocol for 5G Enabled Vehicular Edge Computing.
28
A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments.
29
DNA origami cryptography for secure communication.
30
Cross-predicting the dynamics of an optically injected single-mode semiconductor laser using reservoir computing.
31
ChaosNet: A chaos based artificial neural network architecture for classification.
32
General-Purpose Quantum Circuit Simulator with Projected Entangled-Pair States and the Quantum Supremacy Frontier.
33
Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems.
34
Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
35
Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions.
36
Cyprus's new National Health Service and future European health.
37
Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems.
38
Proof of Concept of Scalable Integration of Internet of Things and Blockchain in Healthcare.
39
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.
40
Blockchain distributed ledger technologies for biomedical and health care applications.
41
Food supply: Blockchain could boost food security.
42
Worldwide nuclear disarmament. Policy statement.
43
From nuclear weapons acquisition to nuclear disarmament - the Swedish case.
44
[Carl Friedrich von Weizsäcker: nuclear disarmament and the search for freedom].
45
[Weizsäcker, Bethe and the Nobel Prize].
46
Blockchain for the Internet of Vehicles: A Decentralized IoT Solution for Vehicles Communication Using Ethereum
47
Security in IoMT Communications: A Survey
48
Autonomous Ship – Responsibility Issues
49
Security in IoMT Communications: A Survey
50
Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework.
51
Detection of Potentially Compromised Computer Nodes and Clusters Connected on a Smart Grid, Using Power Consumption Data.
52
An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu.
53
FDIPP: False Data Injection Prevention Protocol for Smart Grid Distribution Systems.
54
Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems.
55
Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid.
56
practical attacks on mobile cellular networks and possible countermeasures
57
internet of things security: layered classification of attacks and possible countermeasures
58
sources, forms and carriers of endangering intangible assets of the countries in transition
59
the role of resources in strategic management of enterprise Роль ресурсов в стратегическом управлении предприятиями
60
a real-time performance analysis model for cryptographic protocols
61
environmental dimensions of the global world
62
decision assistance in risk assessment – monte carlo simulations
63
review of privacy vs security
64
Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines.
65
Enabling SDN in VANETs: What is the Impact on Security?
66
Supporting Regularized Logistic Regression Privately and Efficiently.
67
energy efficient improvement geocast forwarding in manet based on a clustered structure
68
an authenticated key agreement scheme for wireless sensor networks
69
physical unclonable functions in the internet of things: state of the art and open challenges
70
Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology.
71
MAKE-IT-A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things.
72
Securing the Exchange of Synthetic Genetic Constructs Using Digital Signatures.
73
Federated Learning: A Survey on Enabling Technologies, Protocols, and Applications.
74
inmigración y seguridad en europa tras los atentados de madrid
75
"defesa" ou "segurança"?: reflexões em torno de conceitos e ideologias "defense" or "security"?: reflections on concepts and ideologies
76
aspects concerning the optimization of authentication process for distributed applications
77
an improved protocol for the password authenticated association of ieee 802.15.6 standard that alleviates computational burden on the node
78
problems and prospects of nuclear power plants construction
79
information security risks on a university campus
80
security awareness of the digital natives
81
towards an integrated framework for sdgs: ultimate and enabling goals for the case of energy
82
probabilistic three-party sharing of operation on a remote qubit
83
security situation in secondary schools in tuzla canton
84
security mechanism for manets
85
threats and dangers in activity of the tourism sector enterprises
86
migrazioni e discorso sicuritario. la tutela dei diritti dei minori stranieri non accompagnati in italia e spagna
87
innovative secure mobile banking services
88
obiectul juridic al infracŢiunilor prevĂzute la art.290 Şi 291 cp rm
89
dialektika cigánské férovky. příspěvek ke kritické antropologii bezpečnosti
90
transnational terrorism and his implications to nation states from the global south
91
geoinformation-cartographic modeling of water availability for water security and sustainable development of territories
92
the project of forming the «welfare state»
93
main issues in big data security
94
ecosecent:: essence, subject and structure
95
data content protection for virtual libraries heritage
96
latvija v territorial'noj sisteme evropejskoj bezopasnosti: vzgljad iznutri i izvne
97
an improvement on remote user authentication schemes using smart cards
98
information security risk management: an intelligence-driven approach
99
the european union as a comprehensive police actor
100
decision support model in projects of complex objects protection potential danger
101
battling for the rights to privacy and data protection in the irish courts