-
1
COMPUTER TARGET AND STRATEGY FORMATION OF THE INFORMATION SYSTEM SAFETY VIOLATOR
Published 2016-05-01Subjects: Get full text
Article -
2
Analysis of Agricultural Water Security Based on Network Invulnerability: A Case Study in China's Virtual Water Trade Networks
Published 2024-09-01Subjects: Get full text
Article -
3
Importance Evaluation of Power Grid Transmission Lines Based on Multidimensional Information Feature Mapping
Published 2024-11-01Subjects: Get full text
Article -
4
Impact of Digital Marketing Strategies on the Entrepreneurial Orientations of Jordan's Commercial Banks
Published 2024-10-01Subjects: “…attack strategy; banks sector;potential development; proactive risk tolerance; proactive strategy; targeting strategy…”
Get full text
Article -
5
GEAAD: generating evasive adversarial attacks against android malware defense
Published 2025-04-01Subjects: Get full text
Article -
6
Reading Lips: An Analytical Framework for Adversarial Passive Detection of Wireless Traffic in IoT Ecosystems
Published 2025-01-01Subjects: Get full text
Article -
7
Resilience and competitiveness analysis of the crude oil shipping network: identification of crucial nodes and impact of disruptions
Published 2025-07-01Subjects: Get full text
Article