-
41
Knowledge graph based ubiquitous power IoT security visualization technology
Published 2019-11-01Subjects: Get full text
Article -
42
Security Cballenges Facing Our Country and Countermeasure Recommendations Under New Network Security Tbreats
Published 2014-07-01Subjects: “…advanced persistent threat…”
Get full text
Article -
43
THE ESSENCE AND COMPONENTS OF THREATS TO THE ECONOMIC SECURITY OF HIGHER EDUCATION INSTITUTIONS
Published 2025-01-01Subjects: Get full text
Article -
44
Classified risk assessment method of Android application based on multi-factor clustering selection
Published 2021-04-01Subjects: Get full text
Article -
45
Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World
Published 2025-01-01Subjects: Get full text
Article -
46
Counterterrorism Planning in the Shipping Industry Leveraging Competitive Intelligence
Published 2025-01-01Subjects: Get full text
Article -
47
A multi-source threat intelligence confidence value evaluation method based on machine learning
Published 2020-01-01Subjects: Get full text
Article -
48
Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
Published 2024-11-01Subjects: Get full text
Article -
49
Insider threat detection based on operational attention and data augmentation
Published 2023-06-01Subjects: “…Insider threat detection…”
Get full text
Article -
50
Research on safety methods of airborne embedded software
Published 2015-11-01Subjects: Get full text
Article -
51
Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
Published 2024-01-01Subjects: “…Cyber threat detection…”
Get full text
Article -
52
Method of dynamic real-time authentication
Published 2016-03-01Subjects: “…insider threat…”
Get full text
Article -
53
Self-similarity analysis of network threat time series
Published 2008-01-01Subjects: “…network threat time series…”
Get full text
Article -
54
Information security of the region: Approaches to consideration and economic essence
Published 2023-05-01Subjects: “…information; information resources; information security; information technologies; threat; danger…”
Get full text
Article -
55
Privacy leakage risk assessment for reversible neural network
Published 2023-08-01Subjects: Get full text
Article -
56
Network security situational awareness model based on threat intelligence
Published 2021-06-01Subjects: “…threat intelligence…”
Get full text
Article -
57
Threat perception and behavioral reactivity in response to an acute stressor in infant rhesus macaques
Published 2025-02-01Subjects: Get full text
Article -
58
Basic psychological needs satisfaction, coping functions, and emotional experiences in competitive athletes: a multi-states theory perspective
Published 2025-01-01Subjects: Get full text
Article -
59
Democracy, Threat Reconfiguration, and South American Peace
Published 2015-01-01Subjects: Get full text
Article -
60
Research and application exploration of threat intelligence system of telecom operators
Published 2022-12-01Subjects: “…threat intelligence…”
Get full text
Article