Results 151 to 160 of about 1,407,610 (219)
Comprehensive framework for optimizing ecological security and infrastructure in the Guangdong, Hong Kong, Macao Greater Bay Area. [PDF]
Yang M, He J, Shi L.
europepmc +1 more source
Safeguarding patient privacy in eHealth systems: Bridging theory and practice through a scoping review and healthcare survey. [PDF]
Winter M +5 more
europepmc +1 more source
Smart Agriculture Development: How Can Rural Digital Transformation Enhance the Resilience of Food Security? [PDF]
Song Y, Song Y, Wang Q.
europepmc +1 more source
Identifying hub functions and collaboration patterns in hikikomori support networks: A nationwide cross-sectional study. [PDF]
Usami M +8 more
europepmc +1 more source
Scalable privacy-preserving data analytics for IoMT via FHE and zk-SNARK-enabled edge aggregation. [PDF]
Ben Othman S, Mihret N.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2019
Unlike the EAEU and the CIS, the Shanghai Cooperation Organization includes two key actors—Russia and China. The chapter reviews the specifics of the organization and the functioning of the SCO, and also develops an argument about how SCO could contribute to the longevity of autocratic rulers.
Anastassia V. Obydenkova +1 more
openaire +1 more source
Unlike the EAEU and the CIS, the Shanghai Cooperation Organization includes two key actors—Russia and China. The chapter reviews the specifics of the organization and the functioning of the SCO, and also develops an argument about how SCO could contribute to the longevity of autocratic rulers.
Anastassia V. Obydenkova +1 more
openaire +1 more source
Regional Organizations and Regional Security
Security Studies, 1992(1992). Regional Organizations and Regional Security. Security Studies: Vol. 2, No. 1, pp. 6-37.
S. Neil MacFarlane, Thomas G. Weiss
openaire +1 more source
Region, Security, Regional Security: “Whose Middle East?” Revisited
2015Critical security studies teaches its students that security is derivative of one’s philosophical stance (Booth, 1997, 2007; Walker, 1997), thereby rejecting the presumption that “threats” exist “out there” independent of our behaviour — including our attempts to know them (Burgess, 2011).
openaire +1 more source

