140 results on '"vulnerabilities"'
Search Results
2. Statistical Modeling for Forecasting Pipeline Reliability: Postwar Reconstruction Strategies for Heating Networks in Ukraine
3. Security and Privacy
4. Rural livelihoods sustainability in South Asia and Africa: a systematic review with bibliometric analysis
5. Integration of Occupational Exposure into the Exposome
6. Rising Expectations: How Digital Democracy Don’t Mean More Participation for Vulnerable Groups
7. An Analysis Study of Security Threats, Vulnerabilities Challenges of Cyber-Physical Systems
8. The Justice System and FASD
9. Security Verification
10. Introduction: Assembling COVID/COVID Assemblages
11. Cyber Safe Data Repositories
12. IoT Network Attack Types by Application Domains
13. Security Approaches for Smart Campus
14. Reproducing Vulnerabilities Through Forced Displacement: A Case Study of Flood Victims in Galle District, Sri Lanka
15. What Drives Generation Z to Behave Security Compliant? An Extended Analysis Using the Theory of Planned Behaviour
16. Web Scanner: An Innovative Prototype for Checking Web Vulnerability
17. Postpandemic Technopolitical Democracy: Algorithmic Nations, Data Sovereignty, Digital Rights, and Data Cooperatives
18. Attack Detection by Using Deep Learning for Cyber-Physical System
19. Security and Privacy of IoT Devices for Aging in Place
20. Unsupervised Anomaly Detection for MIL-STD-1553 Avionic Platforms Using CUSUM
21. A Collection of Datasets for Intrusion Detection in MIL-STD-1553 Platforms
22. Introduction
23. Improving Android Application Quality Through Extendable, Automated Security Testing
24. Ransomware Identification Through Sandbox Environment
25. Removing Adversarial Noise in X-ray Images via Total Variation Minimization and Patch-Based Regularization for Robust Deep Learning-based Diagnosis
26. Potential vulnerabilities associated with emerging technologies: insights from a systematic literature review
27. Vulnerabilities
28. Dissociative Identity Disorder and Social Media
29. A study of synergy between programming practices evolution and information disclosure-causing vulnerabilities
30. Implementing the Pillars: Towards Shared Sustainable Prosperity
31. Public Procurement Overview : What is Public Procurement?
32. Attack Detection in SS7
33. Urban Resilience in Latin America: Questions, Themes and Debates
34. Vulnerabilities and Ethical Issues in Machine Learning for Smart City Applications
35. The Pandemic and the Penal System
36. Courts and Sentencing
37. Cybersecurity: Ensuring Confidentiality, Integrity, and Availability of Information
38. Who Watches the Birdwatchers? Sociotechnical Vulnerabilities in Twitter’s Content Contextualisation
39. Vulnerabilities and Secure Coding for Serverless Applications on Cloud Computing
40. Analyzing Interrelationships Among Software Vulnerabilities Using Fuzzy DEMATEL Approach
41. Analysis of Vulnerabilities Associated with Social Engineering Attacks Based on User Behavior
42. Insecure Firmware and Wireless Technologies as 'Achilles’ Heel' in Cybersecurity of Cyber-Physical Systems
43. Enhancing the Quality and Security of IoT Software Systems Using Cloud-Based Vulnerability Detector
44. New Waves of Cyber Attacks in the Time of COVID19
45. Investigation on Vulnerabilities Location in Solidity Smart Contracts
46. Assessment of Disaster Risk Reduction Practices in Mauritius
47. Vulnerabilities Experienced by Trans Couples in Times of COVID-19
48. Smart Lighting Systems for Smart Cities
49. Juvenile Delinquency in Brazil: Development of Adolescents in Adverse Contexts
50. Origin Information Assisted Hybrid Analysis to Detect APT Malware
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.