Search

Your search keyword '"vulnerabilities"' showing total 232 results

Search Constraints

Start Over You searched for: Descriptor "vulnerabilities" Remove constraint Descriptor: "vulnerabilities" Database Directory of Open Access Journals Remove constraint Database: Directory of Open Access Journals
232 results on '"vulnerabilities"'

Search Results

1. Rural livelihoods sustainability in South Asia and Africa: a systematic review with bibliometric analysis

2. IoT Security in a Connected World: Analyzing Threats, Vulnerabilities, and Mitigation Strategies

3. The Importance of a Comprehensive Disaster Preparedness Strategy Focused on the Interplay of Individual and Community Elements: An Exploratory Study

4. An Analysis of the Great Disruption of COVID-19 Pandemic

6. Privacy and security of advanced metering infrastructure (AMI) data and network: a comprehensive review

7. Power System Resiliency: A Comprehensive Overview from Implementation Aspects and Innovative Concepts

8. Navigating Integration and Emotional Distress During Vulnerable Stages of Life: The Case of Slovenian Repatriates From Venezuela

9. Fatores que influenciam a perspectiva de permanência na pecuária leiteira no Rio Grande do Sul

10. ASSESSING NIGERIAN GOVERNMENT’S EFFORTS IN SAFEGUARDING CITIZENS, UTILITIES, AND INFRASTRUCTURE FROM TERRORIST ATTACKS

11. Trends and Analyzes regarding Vulnerabilities in the Agricultural Sector. A Bibliometric Study

12. On the Impact of Refactorings on Software Attack Surface

13. The Cyber Competences Act - a Vital EU Regulation Concerning Mandatory Certification of Critical Network and Information Systems’ Operators across the European Union

14. Analisis tingkat risiko bencana tanah longsor di wilayah Kabupaten Blitar, Jawa Timur

15. Dynamic Security Analysis on Android: A Systematic Literature Review

16. A Novel Approach Based on Machine Learning, Blockchain, and Decision Process for Securing Smart Grid

17. Investigating the Security of OpenPLC: Vulnerabilities, Attacks, and Mitigation Solutions

18. Vulnerability and Attack Repository for IoT: Addressing Challenges and Opportunities in Internet of Things Vulnerability Databases

19. A Review of Large Language Models in Healthcare: Taxonomy, Threats, Vulnerabilities, and Framework

20. Challenges and opportunities during the COVID-19 pandemic: A layered vulnerabilities perspective

21. Vulnerabilities of Smart Cities Development in a Context of Uncertainty at European Level

22. Cybersecurity risk analysis of multifunctional UAV fleet systems: a conceptual model and IMECA-based technique

23. Sanitary conditions of the third largest informal settlement in Brazil

24. ROMANIA’S VULNERABILITIES REGARDING RADICALIZATION AND OBSERVED TRENDS OF THE PHENOMENON

25. A review of cyber attacks on sensors and perception systems in autonomous vehicle

26. Admitting the heterogeneity of social inequalities: intersectionality as a (self-)critical framework and tool within mental health care

27. RSA Keys Quality in a Real-world Organizational Certificate Dataset: a Practical Outlook

28. Exploitation Techniques of IoST Vulnerabilities in Air-Gapped Networks and Security Measures—A Systematic Review

29. THE ROLE OF GENDER-BASED ANALYSIS IN ENHANCING SOCIETAL SECURITY. A CASE STUDY OF ROMANIA’S APPROACH TO COVID-19 PANDEMIC AND ITS IMPACT ON A SELECT NUMBER OF GENDER CATEGORIES

30. Labour Migration and Human Trafficking in Andhra Pradesh, India: A ‘Determinants of Migrant Vulnerability’ Perspective

31. Resilience and Vulnerabilities Related to Russia’s Invasion of Ukraine: The Emergence of a New Club of Nato and EU Members

32. Face Detection Performance Using CNNs and Bug Bonuty Program (BBP)

33. Nexus between heat wave, food security and human health (HFH): Developing a framework for livelihood resilience in Bangladesh

34. Invulnerable – Informed about Vulnerabilities!

35. A CNN-based automatic vulnerability detection

36. A Survey of Adversarial Attacks: An Open Issue for Deep Learning Sentiment Analysis Models

37. An Analysis of Blockchain-Based IoT Sensor Network Distributed Denial of Service Attacks

38. VTT-LLM: Advancing Vulnerability-to-Tactic-and-Technique Mapping through Fine-Tuning of Large Language Model

39. A qualitative study on the unresolved problem of female genital mutilations, socio-cultural reasons, and policy issues in the Afar regions of Ethiopia

40. COVID-19, SDGs and public health systems: Linkages in Brazil

41. Mapping out the vulnerabilities of migrant women in the informal sector: A qualitative investigation in Dhaka city

42. Post-conflict Rehabilitation: Understanding the Role of Civil-Military Cooperation in Supporting Child Protection Units (CPUs) in Newly Merged Districts (NMDs), Pakistan

43. Security of Programmable Logic Controllers and Related Systems: Today and Tomorrow

44. Enhancing vulnerability scoring for information security in intelligent computers

45. Air traffic modernization and control: ADS-B system implementation update 2022: A review

46. A Methodological Framework for AI-Assisted Security Assessments of Active Directory Environments

47. Putting on Intersectional Glasses: Listening to the Voice of the Vulnerable

48. PROSPECTS FOR ACHIEVING ROMANIA'S EXTERNAL EQUILIBRIUM

49. Challenges and Threats of the Digital Economy to the Sustainability of the National Banking System

50. Reflecting on COVID-19 for integrated perspectives on local and regional food systems vulnerabilities

Catalog

Books, media, physical & digital resources