-
261
Justice climatique et démocratie environnementale - Les inégalités d’accès au droit des populations vulnérables aux risques littoraux – quelques éléments de comparaison
Published 2019-03-01Subjects: “…vulnerability…”
Get full text
Article -
262
Application of Cloud Model in Evaluation of Urban Vulnerability to Floods Based on Improved Game Theory and Combined Weight
Published 2020-01-01Subjects: “…vulnerability to floods…”
Get full text
Article -
263
Vulnerabilità e disabilità. Tra cautele protettive, rischi di stigmatizzazione e giusto processo
Published 2024-12-01Subjects: “…vulnerability…”
Get full text
Article -
264
ClimaWATCH: A new interactive tool for community heat-health vulnerability assessments
Published 2025-01-01Subjects: Get full text
Article -
265
Variabilité socio-écologique, crise du pastoralisme et résilience des Peuls pasteurs du Gourma rural (Burkina Faso)
Published 2016-05-01Subjects: Get full text
Article -
266
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
Published 2025-01-01Subjects: Get full text
Article -
267
-
268
Vulnerability analysis on random matrix theory for power grid with flexible impact loads
Published 2025-01-01Subjects: “…Power system vulnerability…”
Get full text
Article -
269
Tra locale e globale. Sostenibilità ed empowerment nelle retoriche delle esperienze di microcredito
Published 2014-04-01Subjects: Get full text
Article -
270
Container escape detection method based on heterogeneous observation chain
Published 2023-01-01Subjects: Get full text
Article -
271
IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit
Published 2025-01-01Subjects: Get full text
Article -
272
-
273
-
274
SDN security prediction method based on bayesian attack graph
Published 2021-11-01Subjects: Get full text
Article -
275
Patterns and implications of spatial covariation in herbivore functions on resilience of coral reefs
Published 2025-01-01Subjects: Get full text
Article -
276
Firmware vulnerability analysis based on formal verification of software and hardware
Published 2016-07-01Subjects: Get full text
Article -
277
Financial inclusion of vulnerable sectors with a gender perspective: risk analysis model with artificial intelligence based on complex thinking
Published 2025-01-01Subjects: Get full text
Article -
278
HyQ2: A Hybrid Quantum Neural Network for NextG Vulnerability Detection
Published 2024-01-01Subjects: “…NextG vulnerability detection…”
Get full text
Article -
279
Divine aseity and the paradox of divine self-limitation
Published 2025-01-01Subjects: Get full text
Article -
280
Le parc national de l’Ichkeul (Tunisie) : une zone humide rétrolittorale aux paysages vulnérabilisés
Published 2019-06-01Subjects: “…socio-environmental vulnerability…”
Get full text
Article