-
161
Classified risk assessment method of Android application based on multi-factor clustering selection
Published 2021-04-01Subjects: Get full text
Article -
162
Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World
Published 2025-01-01Subjects: Get full text
Article -
163
Counterterrorism Planning in the Shipping Industry Leveraging Competitive Intelligence
Published 2025-01-01Subjects: Get full text
Article -
164
A multi-source threat intelligence confidence value evaluation method based on machine learning
Published 2020-01-01Subjects: Get full text
Article -
165
Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
Published 2024-11-01Subjects: Get full text
Article -
166
Insider threat detection based on operational attention and data augmentation
Published 2023-06-01Subjects: “…Insider threat detection…”
Get full text
Article -
167
Research on safety methods of airborne embedded software
Published 2015-11-01Subjects: Get full text
Article -
168
Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
Published 2024-01-01Subjects: “…Cyber threat detection…”
Get full text
Article -
169
Method of dynamic real-time authentication
Published 2016-03-01Subjects: “…insider threat…”
Get full text
Article -
170
Self-similarity analysis of network threat time series
Published 2008-01-01Subjects: “…network threat time series…”
Get full text
Article -
171
Information security of the region: Approaches to consideration and economic essence
Published 2023-05-01Subjects: “…information; information resources; information security; information technologies; threat; danger…”
Get full text
Article -
172
The Russian Federation subjects budgets as a financial basis for their economic security
Published 2022-11-01Subjects: Get full text
Article -
173
Privacy leakage risk assessment for reversible neural network
Published 2023-08-01Subjects: Get full text
Article -
174
Network security situational awareness model based on threat intelligence
Published 2021-06-01Subjects: “…threat intelligence…”
Get full text
Article -
175
Threat perception and behavioral reactivity in response to an acute stressor in infant rhesus macaques
Published 2025-02-01Subjects: Get full text
Article -
176
Basic psychological needs satisfaction, coping functions, and emotional experiences in competitive athletes: a multi-states theory perspective
Published 2025-01-01Subjects: Get full text
Article -
177
Democracy, Threat Reconfiguration, and South American Peace
Published 2015-01-01Subjects: Get full text
Article -
178
Research and application exploration of threat intelligence system of telecom operators
Published 2022-12-01Subjects: “…threat intelligence…”
Get full text
Article -
179
Study on user’s identification system in insider threats
Published 2009-01-01Subjects: “…insider threat…”
Get full text
Article -
180
THE MAIN DIRECTIONS OF THE DEFINITION OF REGIONAL DEVELOPMENT BENEFITS (FOR EXAMPLE, NIZHEGORODSKIY REGION)
Published 2017-02-01Subjects: Get full text
Article