-
21
Democracy, Threat Reconfiguration, and South American Peace
Published 2015-01-01Subjects: Get full text
Article -
22
THE MAIN DIRECTIONS OF THE DEFINITION OF REGIONAL DEVELOPMENT BENEFITS (FOR EXAMPLE, NIZHEGORODSKIY REGION)
Published 2017-02-01Subjects: Get full text
Article -
23
How Does Air Pollution Threaten Basic Human Rights? The Case Study of Bulgaria
Published 2016-07-01Subjects: Get full text
Article -
24
A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture
Published 2025-01-01Subjects: Get full text
Article -
25
Dynamics of perceived threat and media exposure during the COVID-19 pandemic
Published 2025-06-01Subjects: Get full text
Article -
26
Fear extinction retention in children, adolescents, and adults
Published 2025-01-01Subjects: Get full text
Article -
27
From threat to response: Cybersecurity evolution in Albania
Published 2025-01-01Subjects: “…threat models…”
Get full text
Article -
28
-
29
Optimization of cyber security through the implementation of AI technologies
Published 2025-02-01Subjects: Get full text
Article -
30
The relationship between bats and human coronavirus: An exploratory review
Published 2020-07-01Subjects: Get full text
Article -
31
Prediction of Network Threats and Attacks by Mathematical Simulation
Published 2024-11-01Subjects: Get full text
Article -
32
AI-Based Holistic Framework for Cyber Threat Intelligence Management
Published 2025-01-01Subjects: Get full text
Article -
33
Resilience, Confidence-Building, and Performance:
Published 2024-12-01Subjects: Get full text
Article -
34
Linking workplace digitalization to work engagement: evidence from China public sector organizations
Published 2025-01-01Subjects: Get full text
Article -
35
Securing Urban Landscape: Cybersecurity Mechanisms for Resilient Smart Cities
Published 2025-01-01Subjects: Get full text
Article -
36
Understanding Distrust of thePublic Sector Leading to Covid-19 Dissidence in Indonesia
Published 2023-03-01Subjects: Get full text
Article -
37
Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
Published 2025-01-01Subjects: Get full text
Article -
38
Machine Learning-Based Detection of Anomalies, Intrusions, and Threats in Industrial Control Systems
Published 2025-01-01Subjects: Get full text
Article -
39
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
Published 2024-12-01Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
Get full text
Article -
40
Strategic planning of urban transportation system based on sustainable development dimensions using an integrated SWOT and fuzzy COPRAS approach
Published 2018-01-01Subjects: “…Strength, weakness, opportunity, threat (SWOT)…”
Get full text
Article