Search

Your search keyword '"defense strategies"' showing total 123 results

Search Constraints

Start Over You searched for: Descriptor "defense strategies" Remove constraint Descriptor: "defense strategies"
123 results on '"defense strategies"'

Search Results

1. Insider Threat Defense Strategies: Survey and Knowledge Integration

2. A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models

3. Ensuring Cybersecurity in the Era of Artificial Intelligence: Analysis of Technological Approaches and Strategies for Information Protection

4. Music as aposematic signal: predator defense strategies in early human evolution.

5. Securing Against Advanced Cyber Threats: A Comprehensive Guide to Phishing, XSS, and SQL Injection Defense.

6. Multi-omics reveals phenol-based coordinated defense of Sparganium stoloniferum rhizoma

7. Detection and Hardening Strategies to Secure an Enterprise Network

8. Music as aposematic signal: predator defense strategies in early human evolution

9. Nectar robbing by bees affects the reproductive fitness of the distylous plant Tirpitzia sinensis (Linaceae).

10. Defense Strategies of Rice in Response to the Attack of the Herbivorous Insect, Chilo suppressalis.

11. El ejercicio del derecho de defensa en el proceso de contestación al trámite de aprobación.

12. Nectar robbing by bees affects the reproductive fitness of the distylous plant Tirpitzia sinensis (Linaceae)

13. Factors inducing morphological transition in harmful algal bloom-forming species Phaeocystis globosa with emphasis on predator chemical cue.

14. Secure Gait Recognition-Based Smart Surveillance Systems Against Universal Adversarial Attacks.

15. Cybersecurity in Cyber–Physical Power Systems.

16. Response mechanisms to heat stress in bees.

17. Security Issues on Industrial Internet of Things: Overview and Challenges

18. International Law Issues of Cyber Defense

19. Dealing With the COVID-19 Pandemic: How Defense Strategies Relate to Empathic Reactions During Lockdowns.

21. Protecting Power Transmission Systems against Intelligent Physical Attacks: A Critical Systematic Review.

22. Bacterial Metabolic Fitness During Pathogenesis

23. A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs).

24. Regulation of host metabolism and defense strategies to survive neonatal infection.

25. Resilient Dynamic Channel Access via Robust Deep Reinforcement Learning

26. A Survey of Network Attacks on Cyber-Physical Systems

27. LA DESHONESTIDAD ACADÉMICA ESTUDIANTIL EN CURSOS EN LÍNEA Y ESTRATEGIAS DE DEFENSA, DETECCIÓN Y PREVENCIÓN.

28. Response mechanisms to heat stress in bees.

29. Piracy defense strategies for shipping companies and ships: A mixed empirical approach

30. Between Conspiracy Beliefs, Ingroup Bias, and System Justification: How People Use Defense Strategies to Cope With the Threat of COVID-19

31. Defense decision-making method based on incomplete information stochastic game

32. Between Conspiracy Beliefs, Ingroup Bias, and System Justification: How People Use Defense Strategies to Cope With the Threat of COVID-19.

33. Ontogenetic changes in the targets of natural selection in three plant defenses.

34. Security Issues on Industrial Internet of Things: Overview and Challenges.

35. Estratégias de defesa elaboradas por trabalhadores na intervenção em crises suicidas

36. Određivanje ekonomske štete u organizaciji u ovisnosti od načina obrane

37. Ancestral state, phylogenetic signal and convergence among anuran distress calls.

38. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

39. Psychological Functioning, Defense Strategies and the Contribution of Perceived Family Collaboration in Adolescents Who Experienced Multiple Motor Vehicle Crashes: A Descriptive Study

40. Cascading failure analysis of power flow on wind power based on complex network theory

42. Sofrimento e defesa: análise psicodinâmica do trabalho de monitoramento aéreo de trânsito.

43. Inexperienced preys know when to flee or to freeze in front of a threat.

44. A Survey of Network Attacks on Cyber-Physical Systems

45. Protecting Power Transmission Systems against Intelligent Physical Attacks: A Critical Systematic Review

46. French Defense at a Crossroads

47. Seoul’s Bolstered Defense Ambitions

48. THE FRAMEWORK STRATEGY RELATED TO SECURITY IN SOUTH-EASTERN EUROPE

49. La defensa de presos políticos a comienzos de los ´70: ejercicio profesional, derecho y política A defesa dos presos políticos no início dos anos 70: a prática profissional, o direito ea política The defense of political prisoners in the early '70s: professional practice, law and politics

50. Observable placement of phasor measurement units for defense against data integrity attacks in real time power markets.

Catalog

Books, media, physical & digital resources