Search

Your search keyword '"security threat"' showing total 484 results

Search Constraints

Start Over You searched for: Descriptor "security threat" Remove constraint Descriptor: "security threat"
484 results on '"security threat"'

Search Results

2. A framework for dynamic monitoring of distributed systems featuring adaptive security.

3. IWTW: A Framework for IoWT Cyber Threat Analysis.

4. The Kremlin's Dilemma in the Syrian Civil War: Russia-Israel Relations in the Context of Security Threat and Trade Partnership.

5. Validación de la Escala de Percepción de Amenaza Exogrupal (EPAE) para inmigrantes venezolanos en Colombia.

6. Incentives and constraints in the system of ensuring anti-corruption security (overview of the 7th Siberian Anti-Corruption Forum)

7. Same religion, different treatment. The role of origin country characteristics in employers’ decisions to hire Muslims.

10. Survey of optical-based physical domain adversarial attacks and defense

11. 基于光学的物理域对抗攻防综述.

12. Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications.

13. 基于攻击意图的工业网络抗毁性评价研究.

14. 음성 데이터를 이용한 보안 위협 및 대응 전략.

16. ADVFilter: Adversarial Example Generated by Perturbing Optical Path

17. The Changing Role of Information Technology Management in the Era of Artificial Intelligence

18. Cybersecurity and the scope of designing information security systems in the organization

19. Hidden target recognition method for high-speed network security threats based on attack graph theory.

20. Analyzing Miners' Dynamic Equilibrium in Blockchain Networks under DDoS Attacks.

21. ILLEGAL MIGRATION AS A SECURITY THREAT AND CHALLENGE.

22. Threat Conceptions in Global Security Discourse: Analyzing the Speech Records of the United Nations Security Council, 1990–2019.

23. Performance of Multi-Service Telecommunication Systems Using the Architectural Concept of Future Networks

24. Phishing or Not Phishing? A Survey on the Detection of Phishing Websites

25. A Review on Cybersecurity Analysis, Attack Detection, and Attack Defense Methods in Cyber-physical Power Systems

27. Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications

28. Security Amplification of IoT: Blockchain

29. الدور االستشرا يف للذكاء االصطناع ي يف إ دارة األزمات األمنية.

30. Protection Schemes for DDoS, ARP Spoofing, and IP Fragmentation Attacks in Smart Factory.

31. CYBERSECURITY AND THE SCOPE OF DESIGNING INFORMATION SECURITY SYSTEMS IN THE ORGANIZATION.

32. BlockEdge: A Privacy-Aware Secured Edge Computing Framework Using Blockchain for Industry 4.0.

33. DDSG-GAN: Generative Adversarial Network with Dual Discriminators and Single Generator for Black-Box Attacks.

34. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era

35. Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects

36. Performance of Multi-Service Telecommunication Systems Using the Architectural Concept of Future Networks.

38. Threat Model for Trusted Sensory Information Collection and Processing Platform

40. Captcha-Based Defense Mechanism to Prevent DoS Attacks

43. Considered effective? How policy evaluations and threat perceptions affect support for surveillance in the context of terrorism.

44. Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends.

45. Shared Traumatic Reality: Coping among Educational Counselors Living and Working in Israeli Communities on the Gaza Border.

46. State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems.

48. Comparative Analysis of DoS and DDoS Attacks in Internet of Things Environment

49. Research on Core Data Protection Based on Cloud Computing

50. AI Empowers Security Threats and Strategies for Cyber Attacks.

Catalog

Books, media, physical & digital resources