-
341
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
Published 2024-12-01Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
Get full text
Article -
342
Childhood vulnerabilities in South Africa: Some ethical perspectives
Published 2021-12-01Subjects: Get full text
Article -
343
Dynamic Evaluation of Regional Agricultural Drought Vulnerability Based on Triangular Fuzzy Number and Connection Number Coupling
Published 2021-01-01Subjects: Get full text
Article -
344
Research on network attack analysis method based on attack graph of absorbing Markov chain
Published 2023-02-01Subjects: Get full text
Article -
345
Load-to-store: exploit the time leakage of store buffer transient window
Published 2023-04-01Subjects: “…microarchitectural side-channel vulnerability…”
Get full text
Article -
346
PCA and PSO based optimized support vector machine for efficient intrusion detection in internet of things
Published 2025-02-01Subjects: Get full text
Article -
347
L’immigration clandestine à Mayotte : un phénomène révélateur de l'incidence des changements climatiques sur la sécurité humaine?
Published 2015-02-01Subjects: Get full text
Article -
348
Automated vulnerability discovery method for 5G core network protocol
Published 2024-02-01Subjects: Get full text
Article -
349
Paiements pour services environnementaux et vulnérabilité des populations locales dans les pays du Sud – Études de cas costaricien et congolais
Published 2016-04-01Subjects: Get full text
Article -
350
Using side-channel and quantization vulnerability to recover DNN weights
Published 2021-08-01Subjects: Get full text
Article -
351
End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT
Published 2025-01-01Subjects: Get full text
Article -
352
Small rural tourism businesses’ experience of the COVID-19 Tourism Relief Fund: A case of Coffee Bay
Published 2024-08-01Subjects: Get full text
Article -
353
Desertification risk assessment and management program
Published 2016-12-01Subjects: Get full text
Article -
354
Exploit detection based on illegal control flow transfers identification
Published 2014-09-01Subjects: “…software vulnerability…”
Get full text
Article -
355
Assessment of Ecosystem Vulnerability in the Tropic of Cancer (Yunnan Section)
Published 2025-01-01Subjects: “…ecosystem vulnerability…”
Get full text
Article -
356
GLOBALISATION AND THE PERPETUITY OF POVERTY IN THE CONTEMPORARY SECURITY ENVIRONMENT
Published 2024-12-01Subjects: Get full text
Article -
357
Small islands: living laboratories revealing global climate and sustainable development challenges
Published 2025-01-01Subjects: Get full text
Article -
358
Language – a vital pill missing in patients’ treatment: language barriers during cancer care through the eyes of patients and families
Published 2025-12-01Subjects: Get full text
Article -
359
Des archipels en péril ? Les Maldives et les Kiribati face au changement climatique
Published 2010-12-01Subjects: “…vulnerability…”
Get full text
Article -
360
REVIEW OF IDENTIFIED SHORTCOMINGS IN AQUIFER VULNERABILITY ASSESSMENTS
Published 2023-03-01Subjects: “…groundwater vulnerability assessment…”
Get full text
Article