-
61
Study on user’s identification system in insider threats
Published 2009-01-01Subjects: “…insider threat…”
Get full text
Article -
62
THE MAIN DIRECTIONS OF THE DEFINITION OF REGIONAL DEVELOPMENT BENEFITS (FOR EXAMPLE, NIZHEGORODSKIY REGION)
Published 2017-02-01Subjects: Get full text
Article -
63
How Does Air Pollution Threaten Basic Human Rights? The Case Study of Bulgaria
Published 2016-07-01Subjects: Get full text
Article -
64
Evaluation of mimic defense strategy based on M-FlipIt game model
Published 2020-07-01Subjects: Get full text
Article -
65
Research on knowledge graph construction technology for cyber threat intelligence based on large language models
Published 2024-11-01Subjects: Get full text
Article -
66
A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture
Published 2025-01-01Subjects: Get full text
Article -
67
Dynamics of perceived threat and media exposure during the COVID-19 pandemic
Published 2025-06-01Subjects: Get full text
Article -
68
Fear extinction retention in children, adolescents, and adults
Published 2025-01-01Subjects: Get full text
Article -
69
A Critique on “Economic Threats and Resistance Economy”
Published 2017-07-01Subjects: Get full text
Article -
70
Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
Published 2016-02-01Subjects: Get full text
Article -
71
Through attraction to the deterrence: Issues and possibilities of the Western Balkan countries
Published 2023-01-01Subjects: Get full text
Article -
72
Setting the tone: crossmodal emotional face-voice combinations in continuous flash suppression
Published 2025-01-01Subjects: Get full text
Article -
73
From threat to response: Cybersecurity evolution in Albania
Published 2025-01-01Subjects: “…threat models…”
Get full text
Article -
74
ARTIFICIAL INTELLIGENCE AS AN OBJECT OF MANAGEMENT: A BENEFIT FOR CIVILISATION OR A THREAT TO MANKIND?
Published 2023-12-01Subjects: Get full text
Article -
75
-
76
Optimization of cyber security through the implementation of AI technologies
Published 2025-02-01Subjects: Get full text
Article -
77
Analysis of software defined security model and architecture
Published 2017-06-01Subjects: Get full text
Article -
78
Quantitative threat situational assessment method for higher secure attribute value device
Published 2020-10-01Subjects: Get full text
Article -
79
The relationship between bats and human coronavirus: An exploratory review
Published 2020-07-01Subjects: Get full text
Article -
80
Survey of optical-based physical domain adversarial attacks and defense
Published 2024-04-01Subjects: Get full text
Article