Search

Your search keyword '"Countermeasures"' showing total 114 results

Search Constraints

Start Over You searched for: Descriptor "Countermeasures" Remove constraint Descriptor: "Countermeasures" Publisher mdpi Remove constraint Publisher: mdpi
114 results on '"Countermeasures"'

Search Results

1. Shift-Invariance Robustness of Convolutional Neural Networks in Side-Channel Analysis.

2. Analysis of Mechanical Properties of Steep Surrounding Rock and Failure Process with Countermeasures for Tunnel Bottom Structures.

3. A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords.

4. Application and Challenges of the Technology Acceptance Model in Elderly Healthcare: Insights from ChatGPT.

5. Protecting FPGA-Based Cryptohardware Implementations from Fault Attacks Using ADCs.

6. How to Counteract Driver Fatigue during Conditional Automated Driving—A Systematic Review.

7. Stability Assessment of Tunnels Excavated in Loess with the Presence of Groundwater—A Case Study.

8. A Study on the High-Quality Development Path and Implementation Countermeasures of China's Construction Industry toward the Carbon Peaking and Carbon Neutralization Goals.

9. A Comprehensive Approach to Capturing the Impact and Identifying Countermeasures of the COVID-19 Pandemic at Construction Sites in the Republic of Korea.

10. Evaluating the Robustness of Deep Learning Models against Adversarial Attacks: An Analysis with FGSM, PGD and CW.

11. Insights from Farmers' Rice Culture Practices under Integrated Rice–Crayfish Farming System in the Hongze Lake District of China.

12. China's Future Countryside Model Construction and Development Level Evaluation.

13. Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions.

14. Evaluation of Immune Nanoparticles for Rapid and Non-Specific Activation of Antiviral and Antibacterial Immune Responses in Cattle, Swine, and Poultry.

15. Computer Simulation of Anti-Drone System †.

16. Guidance Framework for Developing IoT-Enabled Systems' Cybersecurity.

17. Elderly Pedestrians and Road Safety: Findings from the Slovenian Accident Database and Measures for Improving Their Safety.

18. A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking.

19. Living in the Dark : MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control.

20. Generalized Replay Spoofing Countermeasure Based on Combining Local Subclassification Models.

21. Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions.

22. Evaluation of Virulence in Cynomolgus Macaques Using a Virus Preparation Enriched for the Extracellular Form of Monkeypox Virus.

23. Mechanism Analysis and Potential Solutions for Casing Deformation of Shale GAS Fracturing Wells in Sichuan Basin.

24. The Effect of COVID-19 Countermeasures on Korean Air Passenger Confidence.

25. Effect of Monkeypox Virus Preparation on the Lethality of the Intravenous Cynomolgus Macaque Model.

26. Evaluating the Robustness of Deep Learning Models against Adversarial Attacks: An Analysis with FGSM, PGD and CW

27. Protecting FPGA-Based Cryptohardware Implementations from Fault Attacks Using ADCs

28. Threats from and Countermeasures for Unmanned Aerial and Underwater Vehicles.

29. Understanding Current and Future Transport Needs of Older Australian Drivers to Guide Development of Sustainable and Smart Initiatives to Support Safe Mobility of Older Adults.

30. The Influence of Collusive Information Dissemination on Bidder's Collusive Willingness in Urban Construction Projects.

31. Recent Developments in Botulinum Neurotoxins Detection.

32. Security Threats in Intelligent Transportation Systems and Their Risk Levels.

33. Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera's Video Stream.

34. Water Inrush Hazard in Shijingshan Tunnel during Construction, Zhuhai, Guangdong, China.

35. On Simulating the Propagation and Countermeasures of Hate Speech in Social Networks.

36. Analysis of Security Issues and Countermeasures for the Industrial Internet of Things.

37. Quantification of the Benefits for Power System of Resilience Boosting Measures.

38. Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources.

39. Power-Balancing Software Implementation to Mitigate Side-Channel Attacks without Using Look-Up Tables.

40. Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments.

41. Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment.

42. Gulf of Mexico Seafood Harvesters: Part 3. Potential Occupational Risk Reduction Measures.

43. Treatments for Pulmonary Ricin Intoxication: Current Aspects and Future Prospects.

44. A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing.

45. Microgravity-Related Changes in Bone Density and Treatment Options: A Systematic Review.

46. Electromyographic evaluation of countermeasures during the terrestrial simulation of interplanetary spaceflight in Mars500 project.

47. Beyond the List: Bioagent-Agnostic Signatures Could Enable a More Flexible and Resilient Biodefense Posture Than an Approach Based on Priority Agent Lists Alone

48. Cardiovascular, Lymphatic, and Ocular Health in Space.

49. Proposal for Handling of Medicine Shortages Based on a Comparison of Retrospective Risk Analysis.

50. Beyond the List: Bioagent-Agnostic Signatures Could Enable a More Flexible and Resilient Biodefense Posture Than an Approach Based on Priority Agent Lists Alone.

Catalog

Books, media, physical & digital resources