Search

Your search keyword '"threat"' showing total 902 results

Search Constraints

Start Over You searched for: Descriptor "threat" Remove constraint Descriptor: "threat" Topic business.industry Remove constraint Topic: business.industry
902 results on '"threat"'

Search Results

1. A predictive model for phishing detection

2. Threat and fear: Pragmatic purposes of emotionalisation in media discourse

3. Identificación de amenazas informáticas aplicando arquitecturas de Big Data

4. An IoT based Machine Learning Technique for Efficient Online Load Forecasting

5. Perceptions of Masalembu Island Communites on Importance and Threat Values of Small Island Resources

6. Scenario Modeling in Health System Management Perm Region (Part 1)

7. Methodological approach to mutually agreed corporate image management and economic security of enterprise

8. The Role of Mu-Opioids for Reward and Threat Processing in Humans: Bridging the Gap from Preclinical to Clinical Opioid Drug Studies

9. Addiction in the age of Internet the case of e-drugs

10. Exploring Sybil and Double-Spending Risks in Blockchain Systems

11. The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning

12. Comparative Analysis of the Threat to National Security and the Dangers of Coronaviruses

13. National Security and Coronavirus Disease (COVID-19) Pandemic: Challenges to the Economic System of the State and Prospects for Ensuring its Security

14. Artificial intelligence in data storage systems

15. Impact of digital economic liberalization and capitalization in the era of industrial revolution 4.0: case study in Indonesia

16. Educational and pedagogical role of the family in shaping the security culture and sense of security in cyberspace

17. Investigating the specificity of the neurologic pain signature against breathlessness and finger opposition

18. Systematic Review on Food Safety and Supply Chain Risk Assessment Post Pandemic: Malaysian Perspective

19. Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats

20. Exposure to workplace violence and threats and risk of depression: a prospective study

21. Stigmatization of Chinese and Asian-looking people during the COVID-19 pandemic in Germany

22. Emotional Modulation of Frontal Alpha Asymmetry - a Novel Biomarker of Mild Traumatic Brain Injury

23. Perspectives of Threat Modeling of a Secure Cloud Picture Archiving and Communication System

24. Japanese Experience in Ensuring Social and Economic Security in the National Security System of the Country

25. Identity Work, Loss and Preferred Identities: A Study of UK Business School Deans

26. TO THE QUESTION OF THE PROBABILITY OF THE ATTACKMENT OF DAMAGE AS A RESULT OF ATTACK ON THE INFORMATION RESOURCE OF INFORMATION AND TECHNICAL SYSTEMS OF INTERNAL AFFAIRS TYPE 'REFUSAL IN SERVICE'

27. The basic health care system in a crisis situation after the use of weapons of mass destruction

28. Threat and Security Production at Václav Havel Airport Prague

29. ORGANIZATION RISKS: THREAT OR OPPORTUNITY?

30. Social networks of educational purpose as a subject of protection in the preparation of specialists of information security

31. Facing the mobile revolution: A Romanian insight

32. THE CONCEPT OF FINANCIAL SECURITY AS A SCIENTIFIC AND MANAGEMENT CATEGORY RELATING TO THE DEFINITIONS OF THE CHALLENGE, DANGER, THREAT AND RISKS

33. Cybersecurity and Protection of Accounting Data under Conditions of Modern Information Technology

34. Association of Perceived Threat, Negative Emotions, and Self-Efficacy With Mental Health and Personal Protective Behavior Among Chinese Pregnant Women During the COVID-19 Pandemic: Cross-sectional Survey Study

35. Do Experimental Manipulations of Pathogen Avoidance Motivations Influence Conformity?

36. How Threatened Is Scincella huanrenensis? An Update on Threats and Trends

37. The challenges of volunteering during the COVID-19 pandemic

38. Dusky Grouper Epinephelus marginatus Growth and Survival When Exposed to Different Photoperiods

39. Vulnerability assessment to projectiles: Approach definition and application to helicopter platforms

40. Defects of consent in consumer e-commerce from the Polish law perspective

41. Global Plant Virus Disease Pandemics and Epidemics

42. Countering Cyberattacks During Information Operations

43. A DDoS Attack Detection System: Applying A Hybrid Genetic Algorithm to Optimal Feature Subset Selection

44. Disease Pandemics and Major Epidemics Arising from New Encounters between Indigenous Viruses and Introduced Crops

45. In Times of Trouble: A Framework for Understanding Consumers’ Responses to Threats

46. Low analysis of community interest maintenance in Central Health Center Sukmajaya Kota Depok Provinsi Jawa Barat

47. Human-Computer Threats Classification in Intelligent Transportation Systems

48. Security of IoT Application Layer Protocols: Challenges and Findings

49. Malware Detection Framework Using PCA Based ANN

50. Risk, security, and assurance

Catalog

Books, media, physical & digital resources