Search

Your search keyword '"CVE"' showing total 501 results

Search Constraints

Start Over You searched for: Descriptor "CVE" Remove constraint Descriptor: "CVE"
501 results on '"CVE"'

Search Results

2. Insider perspectives: insights from formers on their role as subject-participants in P/CVE research.

3. Trust-building in countering violent extremism programs: a Muslim youth perspective.

4. A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies.

5. A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies

6. Nonperturbative suppression of chiral effects in hot QGP for Λ∕Λ̄-hyperons spin polarization in heavy-ion collisions.

7. Practitioners' perspectives on the challenges of dealing with the interaction between mental illness and violent extremism in Countering Violent Extremism (CVE).

8. Helping CNAs Generate CVSS Scores Faster and More Confidently Using XAI.

9. The Evolution of Estimated Time of Arrival: The City of Toronto’s CVE Program

10. Behind the Code: Identifying Zero-Day Exploits in WordPress.

11. SMET: Semantic mapping of CTI reports and CVE to ATT&CK for advanced threat intelligence.

12. Terrorism and Education.

14. Mapping and Analysis of Common Vulnerabilities in Popular Web Servers

15. Analysis of Cryptographic CVEs: Lessons Learned and Perspectives

16. Bl0ck: Paralyzing 802.11 Connections Through Block Ack Frames

17. On the Usage of NLP on CVE Descriptions for Calculating Risk

19. Endothelial dysfunction and cardiovascular risk in non-alcoholic fatty liver disease – a systematic review and meta-analysis

20. Endothelial dysfunction and cardiovascular risk in non-alcoholic fatty liver disease – a systematic review and meta-analysis.

21. Towards cyber awareness among smart device users: an interactive, educational display of IoT device vendors compromise history.

22. Does Dependence on External Resources Affect Community-Based organizations' Efforts in Countering Violent Extremism? An Explorative Study of the Northeast Nigeria Experience.

23. Secondary school teachers' and 'Prevent' practitioners' conceptualisations of radicalisation : the impact on teachers' professionalism

24. Helping CNAs Generate CVSS Scores Faster and More Confidently Using XAI

26. Understanding UK university academic staff attitudes towards recognising and responding to student radicalisation.

27. Generic Error SDP and Generic Error CVE

29. Comparative Analysis of Machine Learning Methods in Vulnerability Metrics Transformation

30. Prevention of Cyber-Attacks and Privacy Breaches in Healthcare Sector

32. Context-Based Vulnerability Risk Scoring and Prioritization

33. Attributes of a Mobile App as Perceived by Field Veterinarians: Case of Pig Master.

34. Unveiling the Landscape of Operating System Vulnerabilities.

35. Threat Detection and Mitigation with Honeypots: A Modular Approach for IoT

38. Heuristic Network Security Risk Assessment Based on Attack Graph

40. Is This IoT Device Likely to Be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines

41. Sampling and the Curse of the Case Study

42. An application for collecting and mining reports referring vulnerabilities and exposures in physical systems: A comparative study of selected clustering methods.

43. Incentivizing P/CVE Research, Evaluation, & Program Participants

44. Research Methods Brief: Anatomy of Process Evaluations for P/CVE

45. Counter Extremism in Ireland: An Overview of the Landscape.

46. Vulnerability Forecasting: Theory and Practice.

47. Radicalisation, counter-radicalisation and countering violent extremism in the Western Balkans and the South Caucasus: the cases of Kosovo and Georgia.

49. White feminism and the governance of violent extremism.

50. Prospettive di genere nel contrasto e prevenzione della radicalizzazione e dell’estremismo violento in Europa

Catalog

Books, media, physical & digital resources