-
141
Research on structure and defense of adversarial example in deep learning
Published 2020-04-01Subjects: Get full text
Article -
142
The Study of Verbal Impoliteness in the Users’ Comments of Sahamyab Stock Market Website According to Culpeper’s Theory
Published 2024-05-01Subjects: Get full text
Article -
143
PECULIARITIES OF THE COURSE OF PREGNANCY AND DELIVERY IN WOMEN WITH IN VITRO FERTILIZATION AT HIGH RISK OF PRETERM BIRTH
Published 2021-12-01Subjects: “…in vitro fertilization, the threat of premature birth, treatment, perinatal consequences.…”
Get full text
Article -
144
Perception technology of virtual threat for large enterprise's information security construction
Published 2016-12-01Subjects: Get full text
Article -
145
Multi-Granularity User Anomalous Behavior Detection
Published 2024-12-01Subjects: “…insider threat detection…”
Get full text
Article -
146
Security risk analysis and evaluation techniques in power information system cloud
Published 2018-02-01Subjects: Get full text
Article -
147
Business process mining based insider threat detection system
Published 2016-10-01Subjects: “…insider threat…”
Get full text
Article -
148
Method for router online security risk assessment quantification
Published 2013-11-01Subjects: Get full text
Article -
149
Société du risque, environnement et potentialisation des menaces : un défi pour les sciences sociales
Published 2019-12-01Subjects: Get full text
Article -
150
Fusion of Focal Loss’s cyber threat intelligence entity extraction
Published 2022-07-01Subjects: Get full text
Article -
151
From natural threat to disaster: A historical construction of the earthquake and tsunami of 1960 in Saavedra
Published 2020-01-01Subjects: “…threat…”
Get full text
Article -
152
Collection policy refining method for threat monitoring in complex network environment
Published 2019-04-01Subjects: Get full text
Article -
153
Strategies of China and India in the Indo-Pacific region
Published 2024-06-01Subjects: Get full text
Article -
154
Survey on key technologies for protective DNS service
Published 2024-10-01Subjects: Get full text
Article -
155
Study on user behavior profiling in insider threat detection
Published 2018-12-01Subjects: Get full text
Article -
156
-
157
On the issue of criminal law protection of cyber security of Ukraine in modern conditions
Published 2024-06-01Subjects: Get full text
Article -
158
Knowledge graph based ubiquitous power IoT security visualization technology
Published 2019-11-01Subjects: Get full text
Article -
159
Security Cballenges Facing Our Country and Countermeasure Recommendations Under New Network Security Tbreats
Published 2014-07-01Subjects: “…advanced persistent threat…”
Get full text
Article -
160
THE ESSENCE AND COMPONENTS OF THREATS TO THE ECONOMIC SECURITY OF HIGHER EDUCATION INSTITUTIONS
Published 2025-01-01Subjects: Get full text
Article