-
21
Emotion Recognition Using PPG Signals of Smartwatch on Purpose of Threat Detection
Published 2024-12-01Subjects: “…threat detection…”
Get full text
Article -
22
Fastly match threat response policies based on interval decision diagram
Published 2021-05-01Subjects: “…threat response…”
Get full text
Article -
23
Isolation and Identification of Aspergillus sp. in Tilapia (Oreochromis sp.) Sold for Consumption in Bogor
Published 2024-04-01Subjects: Get full text
Article -
24
Research and practice of network security threat intelligence management system for power enterprise
Published 2022-07-01Subjects: Get full text
Article -
25
Research on structure and defense of adversarial example in deep learning
Published 2020-04-01Subjects: Get full text
Article -
26
The Study of Verbal Impoliteness in the Users’ Comments of Sahamyab Stock Market Website According to Culpeper’s Theory
Published 2024-05-01Subjects: Get full text
Article -
27
PECULIARITIES OF THE COURSE OF PREGNANCY AND DELIVERY IN WOMEN WITH IN VITRO FERTILIZATION AT HIGH RISK OF PRETERM BIRTH
Published 2021-12-01Subjects: “…in vitro fertilization, the threat of premature birth, treatment, perinatal consequences.…”
Get full text
Article -
28
Perception technology of virtual threat for large enterprise's information security construction
Published 2016-12-01Subjects: Get full text
Article -
29
Multi-Granularity User Anomalous Behavior Detection
Published 2024-12-01Subjects: “…insider threat detection…”
Get full text
Article -
30
Security risk analysis and evaluation techniques in power information system cloud
Published 2018-02-01Subjects: Get full text
Article -
31
Business process mining based insider threat detection system
Published 2016-10-01Subjects: “…insider threat…”
Get full text
Article -
32
Method for router online security risk assessment quantification
Published 2013-11-01Subjects: Get full text
Article -
33
Société du risque, environnement et potentialisation des menaces : un défi pour les sciences sociales
Published 2019-12-01Subjects: Get full text
Article -
34
Fusion of Focal Loss’s cyber threat intelligence entity extraction
Published 2022-07-01Subjects: Get full text
Article -
35
From natural threat to disaster: A historical construction of the earthquake and tsunami of 1960 in Saavedra
Published 2020-01-01Subjects: “…threat…”
Get full text
Article -
36
Collection policy refining method for threat monitoring in complex network environment
Published 2019-04-01Subjects: Get full text
Article -
37
Survey on key technologies for protective DNS service
Published 2024-10-01Subjects: Get full text
Article -
38
Study on user behavior profiling in insider threat detection
Published 2018-12-01Subjects: Get full text
Article -
39
-
40
On the issue of criminal law protection of cyber security of Ukraine in modern conditions
Published 2024-06-01Subjects: Get full text
Article