Full Text Available
Access Full Text at Repository
Search Results - (severity OR security)
-
Phenotypic scoring of canola blackleg severity using machine learning image analysis
Published in Plant Phenome Journal (2026)Get full text
Online Article RSS Article -
Forests and national security in Nigeria: an evaluation of the symboisis and challenges
Published 2017-06Subjects: “…National security,…”
Conference ProceedingFull Text AvailableAccess Repository -
Chaotic Secure Communication Schemes employing Chua's Circuit
Published 2010Conference ProceedingFull Text AvailableAccess Repository -
Chaotic secure communication schemes employing Chua's Circuit
Published 2010Conference ProceedingFull Text AvailableAccess Repository -
Chaotic Behaviours in Dynamical Systems with Application to Secure Communication
Published 2012ArticleFull Text AvailableAccess Repository -
Community partnership approach to internal security and crime management
Published 2015ArticleFull Text AvailableAccess Repository -
Survey of security challenges in university libraries in Southwest Nigeria
Published 2013ArticleFull Text AvailableAccess Repository -
The Investment and Securities Act 1999 as an Instrument for Investment Protection
Published 2006ArticleFull Text AvailableAccess Repository -
Jailbreak recurrence as a new security threat in Nigeria
Published 2019-07Subjects: “…National Security…”
ArticleFull Text AvailableAccess Repository -
School security in the context of increasing national insecurity in Nigeria
Published 2013BookFull Text AvailableAccess Repository -
The armed forces and security management in Nigeria, 1999 – 2014
Published 2016BookFull Text AvailableAccess Repository -
Cattle rustling, herdsmen violence and national security in Nigeria
Published 2017BookFull Text AvailableAccess Repository -
Democratic security sector governance and military reform in Nigeria
Published 2015BookFull Text AvailableAccess Repository -
Generalized Secure Superchannels: A Signal Encryption Framework
Published in IEEE Access (2026)Get full text
-
The Need for Cloud Security in a Modern Business Environment
Published in Linux Journal (2026)Get full text