| Journal | Issue | Title | |
| International Journal of Scientific and Technological Research | Vol 5, No 5 (2019) | Secure Transmission of 3D-QRMW Quantum Images via Quantum Fourier Transform in Blind Cloud | Abstract PDF |
| Omer Dogan, Ihsan Yilmaz | |||
| Innovative Systems Design and Engineering | Vol 2, No 3 (2011) | Secured Overlapping Technique for Digital Watermarking | Abstract PDF |
| Muhammad Sharif | |||
| Research on Humanities and Social Sciences | Vol 4, No 1 (2014) | Securing Land Title/Ownership Rights: A Survey of the level of Compliance with Land Registration in Akwa Ibom State, Nigeria | Abstract PDF |
| Uwem Ituen, Imoh Johnson | |||
| Research Journal of Finance and Accounting | Vol 7, No 10 (2016) | Securitization and the Subprime Mortgage Crisis of 2007-2008 | Abstract PDF |
| Job Omagwa, Robert Odunga | |||
| International Affairs and Global Strategy | Vol 36 (2015) | Securitization of Politics and Insecurity in Nigeria: The Boko Haram Experience | Abstract PDF |
| Aloysius-Michaels Okolie, Michael Ikechukwu Ugwueze | |||
| Journal of Education and Practice | Vol 9, No 6 (2018) | Security Management in a Terrorized Nigeria: The Task for Educators | Abstract PDF |
| Igbinedion, Doye Angela | |||
| Journal of Education and Practice | Vol 13, No 23 (2022) | Security Challenges and Students’ Academic Achievement in English Language in the Senior Secondary Schools in Ebonyi State | Abstract PDF |
| Adaobi F. Okonkwo | |||
| Computer Engineering and Intelligent Systems | Vol 4, No 6 (2013) | Security Schemes for Hack Resilient Applications Using “SNHA” (Securing Network, Host, and Application) Service | Abstract PDF |
| Kamal Kulshreshtha, Ajay Sharma | |||
| Computer Engineering and Intelligent Systems | Vol 5, No 2 (2014) | Security with Evidence Using Zigbee | Abstract PDF |
| Mahesh Raj Urs, Badrinath K, Sharath P V | |||
| Journal of Economics and Sustainable Development | Vol 4, No 2 (2013) | Security Challenges in Nigeria and the Implications for Business Activities and Sustainable Development | Abstract PDF |
| I.C. Achumba, O. S. Ighomereho, M. O. M. Akpor-Robaro | |||
| Journal of Economics and Sustainable Development | Vol 6, No 4 (2015) | Security Challenges and Implications to National Stability | Abstract PDF |
| Paul Iregbenu, Chinecherem Uzonwanne | |||
| Journal of Law, Policy and Globalization | Vol 45 (2016) | Security of Investors’ Interest under Winding up Proceedings The Nigerian Experience | Abstract PDF |
| Iteshi Chioma V. | |||
| Journal of Law, Policy and Globalization | Vol 60 (2017) | Security and Crime Prevention in Under-Policed Societies: The Experiment of Community Vigilantism in Anambra State of Nigeria, West Africa | Abstract PDF |
| Sunday K.M. Anadi | |||
| Public Policy and Administration Research | Vol 5, No 7 (2015) | Security Votes in Nigeria: A Desideratum for Security or Recipe for Corruption* | Abstract PDF |
| JACOB ABIODUN DADA | |||
| International Affairs and Global Strategy | Vol 14 (2013) | Security Challenges as Threats to National Unity in Nigeria: Causes, Prevention and Treatment | Abstract PDF |
| CHARLES OKECHUKWU IWUNDU, BLESSING E.N. THOM-OTUYA | |||
| International Affairs and Global Strategy | Vol 20 (2014) | Security Consolidation in the Gulf of Guinea: The Need to Engage AFRICOM Better Through the SECLOMTS Model | Abstract PDF |
| Nicholas Okai | |||
| International Affairs and Global Strategy | Vol 40 (2016) | Security in European Union | Abstract PDF |
| Aleksandar Kitanovski, Marija Veljovska Kondovska, Katerina Danilova | |||
| International Affairs and Global Strategy | Vol 63 (2018) | Security Challenges of Cameroon and the Effects on France-African Relations | Abstract PDF |
| Agberndifor Evaristus, Filiz Katman | |||
| International Affairs and Global Strategy | Vol 85 (2020) | Security and Stability of the Gulf Region in Light of Iranian Threats | Abstract PDF |
| Hani Mefleh O. Hamdon, Barjas Habbas Alkumeet, Sayel F. Alserhan | |||
| Information and Knowledge Management | Vol 3, No 10 (2013) | Security Architecture for Tanzania Higher Learning Institutions’ Data Warehouse | Abstract PDF |
| Chande Kasita, Loserian .S. Laizer | |||
| Information and Knowledge Management | Vol 4, No 6 (2014) | Security of Multifactor Authentication Model to Improve Authentication Systems | Abstract PDF |
| Tamara Saad Mohamed | |||
| Research on Humanities and Social Sciences | Vol 13, No 8 (2023) | Security Implications of Refugees on Host Communities: Perspectives from Buduburam in the Central Region of Ghana | Abstract PDF |
| Joe Daah, Linus D. Nangwele, Chrispin Mwinkyogtaa Kuupiel | |||
| Control Theory and Informatics | Vol 5, No 5 (2015) | Security Analysis of WPA2 | Abstract PDF |
| Joseph Mwangi, Wilson Cheruiyot, Michael Kimwel | |||
| Control Theory and Informatics | Vol 10 (2021) | SECURITY AND PRIVACY METHODS IN DISTRIBUTED SYSTEMS. | Abstract PDF |
| Irida Gjermeni, Dudina Hoxha | |||
| Control Theory and Informatics | Vol 11 (2022) | Security of Wireless Networks | Abstract PDF |
| Irida Gjermeni, Jehona Hoxha | |||
| 47026 - 47050 of 62200 Items | << < 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 > >> | ||