Search

Your search keyword '"ics"' showing total 1,287 results

Search Constraints

Start Over You searched for: Descriptor "ics" Remove constraint Descriptor: "ics"
1,287 results on '"ics"'

Search Results

5. Using machine learning to detect network intrusions in industrial control systems: a survey.

6. Towards Net Zero Resilience: A Futuristic Architectural Strategy for Cyber-Attack Defence in Industrial Control Systems (ICS) and Operational Technology (OT).

7. SECURITY MANAGEMENT THROUGH THE (NEXT GENERATION) INCIDENT COMMAND SYSTEM MODEL

8. Association of moderate-to-vigorous physical activity with reduction of acute exacerbation in COPD patients using a dual ultra-long-acting bronchodilators

9. An improved autoencoder-based approach for anomaly detection in industrial control systems.

10. Association of moderate-to-vigorous physical activity with reduction of acute exacerbation in COPD patients using a dual ultra-long-acting bronchodilators.

11. Deciphering the evolutionary development of the “Chinese lantern” within Solanaceae.

12. ICS

13. The Problem of Integrating Digital Twins into Electro-Energetic Control Systems

14. An Automated Disruption-Tolerant Key Management Framework for Critical Systems

15. Design and optimisation of high-energy inverse Compton scattering sources driven by multi-pass energy recovery linacs

16. Exploiting user-centred design to secure industrial control systems.

17. Radiographic and echocardiographic evaluation in rescued Korean raccoon dogs (Nyctereutes procyonoides koreensis).

18. Urine metabolomics signature reveals novel determinants of adrenal suppression in children taking inhaled corticosteroids to control asthma symptoms.

19. 4:2 Compressor Design for Low Leakage Applications in FinFET Technology.

20. StructuredFuzzer: Fuzzing Structured Text-Based Control Logic Applications.

23. Decoding the Human Element in APT Attacks: Unveiling Attention Diversion Techniques in Cyber-Physical System Security

24. A Survey on SCADA’s Security, Concerns and Attacks

25. From Power to Water: Dissecting SCADA Networks Across Different Critical Infrastructures

26. Process Mining with Programmable Logic Controller Memory States

27. AE-LSTM Based Anomaly Detection System for Communication Over DNP 3.0

28. One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection

29. An improved autoencoder-based approach for anomaly detection in industrial control systems

30. Survey on industrial control protocol security research

31. Comparison of Infection Risks Between Various Inhaled and Intranasal Corticosteroids: A Pharmacovigilance Analysis Based on the FAERS Database

33. Association between Increased Risk of Pneumonia with ICS in COPD: A Continuous Variable Analysis of Patient Factors from the IMPACT Study.

34. The mRNA Vaccine Expressing Single and Fused Structural Proteins of Porcine Reproductive and Respiratory Syndrome Induces Strong Cellular and Humoral Immune Responses in BalB/C Mice.

35. A Survey on Life-Cycle-Oriented Certificate Management in Industrial Networking Environments.

36. Exploiting user-centred design to secure industrial control systems

37. Hospital admission rates and related outcomes among adult Aboriginal australians with bronchiectasis – a ten-year retrospective cohort study

38. Evaluation and Prioritization of Factors Affecting the Effectiveness of Incident Command System using AHP and DEMATEL Methods in Iranian Process Industries

39. Hospital admission rates and related outcomes among adult Aboriginal australians with bronchiectasis – a ten-year retrospective cohort study.

40. A comparative study of IUCD insertion in postpartum and intracearean.

41. In-depth characterization of T cell responses with a combined Activation-Induced Marker (AIM) and Intracellular Cytokine Staining (ICS) assay.

43. Discussion

44. Online Survey to Investigate Asthma Medication Prescription and Adherence from the Perspective of Patients and Healthcare Practitioners in England

45. Capability-based access control for cyber physical systems

46. An Automated Disruption-Tolerant Key Management Framework for Critical Systems

47. Expression levels of key immune indicators and immune checkpoints in manganese-exposed rats

48. ارزیابی و اولوی تبندی عوامل تأثیرگذار بر اثربخشی و موفقی ت سیست م فرماندهی حادثه د ر صنا ی ع DEMATEL و AHP فرایندی ا یران با استفاده از روشهای

49. A model for measuring multi‐concern assurance of critical infrastructure control systems.

50. Cyber threat intelligence for critical infrastructure security.

Catalog

Books, media, physical & digital resources