-
61
-
62
-
63
-
64
When LLMs meet cybersecurity: a systematic literature review
Published 2025-02-01Get full text
Article -
65
-
66
-
67
-
68
-
69
Verification of color characteristics of document images captured in uncontrolled conditions
Published 2024-08-01Get full text
Article -
70
Optimizing Solid Oxide Fuel Cell Performance Using Advanced Meta-Heuristic Algorithms
Published 2024-06-01Get full text
Article -
71
Double layer federated security learning architecture for artificial intelligence of things
Published 2024-12-01Get full text
Article -
72
-
73
Respon Beberapa Varietas Padi Terhadap Serangan Fusarium fujikuroi Penyebab Penyakit Bakanae
Published 2018-03-01Get full text
Article -
74
Implementasi Algoritme Clefia 128-Bit untuk Pengamanan Modul Komunikasi Lora
Published 2022-12-01Get full text
Article -
75
-
76
Aksi Penyerangan Non-Player Character (NPC) Menggunakan Metode Naive Bayes pada Shooter Game
Published 2021-11-01Get full text
Article -
77
The Environmentally IPM Package for Controlling Fall Armyworm (Spodoptera frugiperda) in Maize Field
Published 2023-07-01Get full text
Article -
78
Common Risk Factors of Myocardial Infarction and Some Socio Demographic Characteristics in Sulaimani City
Published 2022-01-01Get full text
Article -
79
SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL
Published 2024-08-01Get full text
Article -
80