Search

Your search keyword '"threats"' showing total 22,446 results

Search Constraints

Start Over You searched for: Descriptor "threats" Remove constraint Descriptor: "threats"
22,446 results on '"threats"'

Search Results

2. Visualization of Community Safety Threats with Time Series Evaluation

4. A comprehensive analysis of threat vectors in software-defined networking.

5. ПИТАННЯ ЗАХИСТУ ПРОВІДНИХ ГАЛУЗЕЙ ВИРОБНИЦТВА УКРАЇНИ: НАЦІОНАЛЬНІ ПРІОРИТЕТИ.

6. A taxon under siege from multiple threats: results of analysis of chytrid fungi on the Calabrian Alpine newt.

7. Threat assessment for Pacific sand lance (Ammodytes personatus) in the Salish Sea.

8. The first record the Limnia unguicornis (Diptera, Sciomyzidae) parasites on a vulnerable pulmonate land snail, Vertigo moulinsiana (Gastropoda: Eupulmonata: Vertiginidae) and a literature review on Limnia species.

9. Acts of offensive behaviour and risk of disability pension in Danish female eldercare workers: prospective cohort with 11-year register follow-up.

10. Addressing the Significance of the Union List with a Focus on Marine Invasive Alien Species Impacts.

11. Non‐Native Invasive Fish Species (NIFS) in Inland Waters of India: Management Issues, Strategies and Suggestions.

12. Taxonomic diversity, distribution, and ecology of the freshwater fishes of the Zambezian Lowveld Ecoregion in southern Africa: A systematic review.

13. POVERTY ALLEVIATION STRATEGY FROM PUBLIC POLICY PERSPECTIVE WITH PENTAHELIX APPROACH IN WEST SERAM DISTRICT.

14. Benefits over threats associated with host-country nationals' acculturation preferences: Examining a stereotype content and threat benefit model.

15. Global review of anticoagulant rodenticide exposure in wild mammalian carnivores.

16. Harassed for Their Job: Exploring Factors That Render Journalists Prone to Harassment and Intimidation.

17. EVOLUTION OF BALTIC SECURITY: ANALYSIS OF THREATS AND STRATEGIC RESPONSES.

18. A model proposal for enhancing cyber security in industrial IoT environments.

19. The Negative Relationship Between Threats and Endorsement of Freedom.

20. Systematic Analysis of threats, Machine Learning solutions and Challenges for Securing IoT environment.

21. Immigrant Security in a Culturally Different Environment. The Polish Experience after the Arab Spring.

22. Enemy of My Enemy? An Examination of Potential Religious Group Threat Effects on Racial Attitudes.

23. Divergent Importance and Geographic Patterns in Threats to Birds and Mammals in China.

24. A novel measure indicating that a management strategy reduces the likelihood of human-made threats to Cultural World Heritage Sites.

25. Ethnobotanical Study of Medicinal Plants in Tehuledere District, Northwest Ethiopia.

26. Mitigating the extinction risk of globally threatened and endemic mountainous Orthoptera species: Parnassiana parnassica and Oropodisma parnassica.

27. Securing Federated Learning: Approaches, Mechanisms and Opportunities.

28. Traditionally used medicinal plants for human ailments and their threats in Guraferda District, Benchi-Sheko zone, Southwest Ethiopia.

29. Multiple borders in one war: Constructing mental maps of Syrian refugees as threats.

30. POPULATION THREAT ASSESSMENT OF INCARVILLEA EMODI (BIGNONIACEAE) FROM THE SHIWALIK HILLS OF JAMMU REGION, INDIA.

31. Diatom communities of high-altitude creeks in Bosnia and Herzegovina.

32. How Income and Discrimination Shape the Acceptance of Newcomers in Europe: A Comparative Analysis of Native-Born and Immigrant Populations.

33. Current species protection does not serve its porpoise—Knowledge gaps on the impact of pressures on the Critically Endangered Baltic Proper harbour porpoise population, and future recommendations for its protection.

34. Survey on Video Security: Examining Threats, Challenges, and Future Trends.

35. The Impact of Artificial Intelligence on Cyber Security.

36. NATIONAL POLICY ON SAFE AND VIOLENCE-FREE SECONDARY SCHOOL IMPLEMENTATION: PARENTS-TEACHERS' ASSOCIATION'S ROLES' AWARENESS AND COMPLIANCE IN KATSINA STATE.

37. Resilience-Based Assessment of Shallow Water Patchy Reefs in Palk Bay of South East Coast of India.

38. Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology

39. IoT Security in a Connected World: Analyzing Threats, Vulnerabilities, and Mitigation Strategies

40. Evolution of Baltic Security: Analysis of Threats and Strategic Responses

41. GEOPOLITICAL „DANCE' OF THE AGGRESSIVE DICTATORS

42. The Concept of a Method for Predicting the Cascade Effect Under Conditions of Hybrid Warfare

43. Traditionally used medicinal plants for human ailments and their threats in Guraferda District, Benchi-Sheko zone, Southwest Ethiopia

45. Effects of organisational factors and employee characteristics on employers' reporting of client violence in non‐institutional social services in Sweden.

46. Unraveling the two unknown storm-petrels of South America: a review about the white-vented storm-petrel (oceanites gracilis) and pincoya storm-petrel (Oceanites pincoyae)

47. Threats of nursing productivity in the digital era: investigating the interplay between smartphones addiction and procrastination behavior among nurses

48. Diversity pattern of ichthyofaunal assemblage in South-central coastal region of Bangladesh

49. CREATIVITY IN THE SYSTEM OF ENSURING HUMAN SOCIAL SECURITY AT THE ENTERPRISE DURING TIMES OF WAR AND ECONOMIC RECOVERY IN UKRAINE

50. Evaluating the effectiveness of protected area management in Indonesia

Catalog

Books, media, physical & digital resources