-
421
A New Climate vulnerability Index Sistan and Baluchistan province
Published 2015-06-01Subjects: “…climate vulnerability index…”
Get full text
Article -
422
-
423
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
Published 2024-12-01Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
Get full text
Article -
424
Village Savings and loan associations and socio-economic empowerment of vulnerable people in Kamuganguzi Sub-County Kabale, District, Uganda.
Published 2020Subjects: “…Village Saving and Loan associations, Social Economic Empowerment, Vulnerable People, Kamuganguzi Sub-County.…”
Get full text
Article -
425
Village Savings and Loan Associations and Socio-Economic Empowerment of Vulnerable People in Kamuganguzi Sub-County Kabale, District, Uganda
Published 2022Subjects: “…Village Saving and Loan associations, Social Economic Empowerment, Vulnerable People, Kamuganguzi Sub-County.…”
Get full text
Article -
426
Dynamic Evaluation of Regional Agricultural Drought Vulnerability Based on Triangular Fuzzy Number and Connection Number Coupling
Published 2021-01-01Subjects: Get full text
Article -
427
Research on network attack analysis method based on attack graph of absorbing Markov chain
Published 2023-02-01Subjects: Get full text
Article -
428
Theoretical and Practical Aspects of Using Anatomically Detailed Puppets while Interrogating Extremely Vulnerable Persons
Published 2020-06-01Subjects: “…extremely vulnerable persons…”
Get full text
Article -
429
Load-to-store: exploit the time leakage of store buffer transient window
Published 2023-04-01Subjects: “…microarchitectural side-channel vulnerability…”
Get full text
Article -
430
PCA and PSO based optimized support vector machine for efficient intrusion detection in internet of things
Published 2025-02-01Subjects: Get full text
Article -
431
L’immigration clandestine à Mayotte : un phénomène révélateur de l'incidence des changements climatiques sur la sécurité humaine?
Published 2015-02-01Subjects: Get full text
Article -
432
Automated vulnerability discovery method for 5G core network protocol
Published 2024-02-01Subjects: Get full text
Article -
433
Paiements pour services environnementaux et vulnérabilité des populations locales dans les pays du Sud – Études de cas costaricien et congolais
Published 2016-04-01Subjects: Get full text
Article -
434
Using side-channel and quantization vulnerability to recover DNN weights
Published 2021-08-01Subjects: Get full text
Article -
435
Increasing Safety of Vulnerable Road Users in Scenarios With Occlusion: A Collaborative Approach for Smart Infrastructures and Automated Vehicles
Published 2025-01-01Subjects: Get full text
Article -
436
End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT
Published 2025-01-01Subjects: Get full text
Article -
437
Small rural tourism businesses’ experience of the COVID-19 Tourism Relief Fund: A case of Coffee Bay
Published 2024-08-01Subjects: Get full text
Article -
438
Desertification risk assessment and management program
Published 2016-12-01Subjects: Get full text
Article -
439
Caracterización de conducta sexual inadecuada hacia niños y adolescentes
Published 2014-04-01Subjects: Get full text
Article -
440
Exploit detection based on illegal control flow transfers identification
Published 2014-09-01Subjects: “…software vulnerability…”
Get full text
Article