Search

Your search keyword '"vulnerabilities"' showing total 2,999 results

Search Constraints

Start Over You searched for: Descriptor "vulnerabilities" Remove constraint Descriptor: "vulnerabilities"
2,999 results on '"vulnerabilities"'

Search Results

1. Semi-automated and Easily Interpretable Side-Channel Analysis for Modern JavaScript

2. The Technological and Societal Landscape

3. The politics of social policies in Portugal: Different responses in times of crises.

4. Vulnerability and Attack Repository for IoT: Addressing Challenges and Opportunities in Internet of Things Vulnerability Databases.

5. Rural livelihoods sustainability in South Asia and Africa: a systematic review with bibliometric analysis.

6. Unmasked and Exposed: The Impact of COVID-19 on the Youth Custodial Estate. A Compelling Case for Ideological Change.

7. A Review of Large Language Models in Healthcare: Taxonomy, Threats, Vulnerabilities, and Framework.

8. Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems.

9. Trends in brain MRI and CP association using deep learning.

10. Social constructions of disabled women and their implications for their wellbeing in Lagos, Nigeria.

11. How Gender-Sensitive Are Environmental Institutions, Climate Adaptation, and Mitigation Actions? A Narrative from the Global South.

12. Cyber-Securing Medical Devices Using Machine Learning: A Case Study of Pacemaker.

13. Comprehensive Risk Analysis of Emergency Medical Response Systems in Serbian Healthcare: Assessing Systemic Vulnerabilities in Disaster Preparedness and Response.

14. Rural livelihoods sustainability in South Asia and Africa: a systematic review with bibliometric analysis

15. IoT Security in a Connected World: Analyzing Threats, Vulnerabilities, and Mitigation Strategies

17. The Challenge of Adversarial Attacks on AI-Driven Cybersecurity Systems.

18. The Importance of a Comprehensive Disaster Preparedness Strategy Focused on the Interplay of Individual and Community Elements: An Exploratory Study

19. Modelling to identify direct risks for New Zealand agriculture due to climate change.

20. Labour Migration and Human Trafficking in Andhra Pradesh, India: A 'Determinants of Migrant Vulnerability' Perspective.

21. Tactics of invisibility: How people in vulnerable positions make datafied everyday life livable.

22. The Psychological, Social, and Economic Impacts of COVID-19 on Nepali Migrant Workers.

23. Software Vulnerability Fuzz Testing: A Mutation-Selection Optimization Systematic Review.

24. User behaviour's contribution to better Cyber Security Management.

25. Rôle des métaphores verbales et gestuelles dans le développement de la prudence lors d'activités de dialogue philosophique.

26. OPERELE DE ARHITECTURĂ - DEFINIRE, TRĂSĂTURI, DREPTURI -.

27. NAVIGATING INTEGRATION AND EMOTIONAL DISTRESS DURING VULNERABLE STAGES OF LIFE: THE CASE OF SLOVENIAN REPATRIATES FROM VENEZUELA.

28. Evaluación de vulnerabilidades informáticas en códigos QR de la aplicación de Banca Móvil "Wallink".

29. Методи аналізу вразливостей та забезпечення кібербезпеки при виборі VPN-продуктів.

30. A Proposal for Model‐Based Systems Engineering Method for Creating Secure Cyber‐Physical Systems.

31. Gender Dimensions of Vulnerabilities, Adaptations and Alternative Livelihoods of the Closed Season in Elmina – Ghana: A Qualitative Study.

32. Cybersecurity Challenges in the Global Aviation Network

35. Securing Asymmetric Key Cryptography in 6G Wireless and Mobile Environments: A Comprehensive Review and Proposed Hybrid Cryptosystem

36. Cyber Security Terrain and Thwarting Cyber Attacks Using Artificial Intelligence

39. Enhancing Cybersecurity Through Blockchain: An Analysis of Solutions for Threats and Vulnerabilities – An Agency Theory Perspective

40. Transforming the Existing Households as a Disaster Safehold through Cost-Efficient Architectural Execution Techniques: A Case Study of Assasuni, Shatkhira

42. Identification of Social, Economic and Building Density Vulnerability To Earthquake and Tsunami Hazards In Bantul District

43. AI-Assisted Pentesting Using ChatGPT-4

44. Software Bill of Materials (SBOM) Approach to IoT Security Vulnerability Assessment

45. ClipSecure: Addressing Privacy and Security Concerns in Android Clipboard

48. Attacks and Countermeasures in Wireless Sensor Networks

49. Analysis of Cryptographic CVEs: Lessons Learned and Perspectives

50. Bl0ck: Paralyzing 802.11 Connections Through Block Ack Frames

Catalog

Books, media, physical & digital resources