-
21
Аналіз функціонування систем управління державними інформаційними ресурсами
Published 2019-04-01Subjects: “…state information resources, information and telecommunication systems, cyberspace, vulnerabilities of information systems, security of state information resources.…”
Get full text
Article -
22
Russian business in the context of the growth of cybercrime: changes in economic behavior and protective mechanisms
Published 2024-09-01Subjects: “…cyber threats and vulnerabilities…”
Get full text
Article -
23
Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging
Published 2025-01-01Subjects: Get full text
Article -
24
Synergistically complex social well-being: The trust factor
Published 2024-12-01Subjects: Get full text
Article -
25
Research on key technology of vulnerability threat classification
Published 2012-09-01Subjects: Get full text
Article -
26
THE PROBLEM OF THE NEW VULNERABILITIES OF THE RUSSIAN SOCIETY
Published 2013-08-01Subjects: Get full text
Article -
27
Design and implementation of national security vulnerability database
Published 2011-01-01Subjects: Get full text
Article -
28
DEVELOPMENT OF COMPLEX SOCIUM: A HUMANISTIC TURN
Published 2013-12-01Subjects: Get full text
Article -
29
Research on OLE object vulnerability analysis for RTF file
Published 2016-01-01Subjects: Get full text
Article -
30
A general attack model based on Android system vulnerability
Published 2016-10-01Subjects: Get full text
Article -
31
Vulnerability Testing and Analysis on Websites and Web-Based Applications in the XYZ Faculty Environment Using Acunetix Vulnerability
Published 2024-12-01Subjects: “…Vulnerability, Website, Application, FK UNAND, Acunetix Web Vulnerability Scanner…”
Get full text
Article -
32
Design and implementation of OSPF vulnerability analysis and detection system
Published 2013-09-01Subjects: Get full text
Article -
33
Assessment of vulnerability to fluvial floods: Case of municipalities of the Gidra River Basin, Slovakia
Published 2024-08-01Subjects: Get full text
Article -
34
Desenvolvimento de um índice de vulnerabilidade em saúde nos municípios do Ceará
Published 2023-12-01Subjects: “…Ceará; health; vulnerability…”
Get full text
Article -
35
Survey on industrial control protocol security research
Published 2024-06-01Subjects: Get full text
Article -
36
Survey on static software vulnerability detection for source code
Published 2019-02-01Subjects: “…software vulnerability…”
Get full text
Article -
37
Java deserialization vulnerability defense technologybased on run-time detection
Published 2024-04-01Subjects: “…deserialization vulnerability…”
Get full text
Article -
38
Urbaniser les zones inondables, est-ce concevable ?
Published 2008-11-01Subjects: Get full text
Article -
39
CONSTRUCCIÓN TERRITORIAL, VULNERABILIDAD SOCIAL Y CALIDAD AMBIENTAL EN EL EJIDO DE VILLA PEHUENIA, PROVINCIA DEL NEUQUÉN, ARGENTINA
Published 2014-12-01Subjects: Get full text
Article -
40
L’éruption du Tajogaite (Cumbre Vieja) à La Palma, Canaries : de l’éruption volcanique à la crise territoriale
Published 2023-06-01Subjects: “…vulnerability…”
Get full text
Article