-
321
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
Published 2025-01-01Subjects: Get full text
Article -
322
-
323
Vulnerability analysis on random matrix theory for power grid with flexible impact loads
Published 2025-01-01Subjects: “…Power system vulnerability…”
Get full text
Article -
324
Tra locale e globale. Sostenibilità ed empowerment nelle retoriche delle esperienze di microcredito
Published 2014-04-01Subjects: Get full text
Article -
325
Artificial intelligence: a useful tool in active tuberculosis screening among vulnerable groups in Romania - advantages and limitations
Published 2025-02-01Subjects: Get full text
Article -
326
Environmental injustice and human rights violations in Jalisco, Mexico
Published 2023-09-01Subjects: “…vulnerable communities…”
Get full text
Article -
327
Container escape detection method based on heterogeneous observation chain
Published 2023-01-01Subjects: Get full text
Article -
328
IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit
Published 2025-01-01Subjects: Get full text
Article -
329
-
330
-
331
SDN security prediction method based on bayesian attack graph
Published 2021-11-01Subjects: Get full text
Article -
332
Patterns and implications of spatial covariation in herbivore functions on resilience of coral reefs
Published 2025-01-01Subjects: Get full text
Article -
333
The use of screening, identification, assessment and support policy to support vulnerable learners
Published 2024-12-01Subjects: Get full text
Article -
334
Experiences and Perspectives of Medication Information and Use Among Arabic-Speaking Migrant Women in Sweden: A Multistage Focus Group Study
Published 2025-02-01Subjects: Get full text
Article -
335
Firmware vulnerability analysis based on formal verification of software and hardware
Published 2016-07-01Subjects: Get full text
Article -
336
Financial inclusion of vulnerable sectors with a gender perspective: risk analysis model with artificial intelligence based on complex thinking
Published 2025-01-01Subjects: Get full text
Article -
337
Identificación y caracterización de modos de discriminación hacia grupos con riesgo de enfermedades de transmisión sexual
Published 2013-12-01Subjects: Get full text
Article -
338
HyQ2: A Hybrid Quantum Neural Network for NextG Vulnerability Detection
Published 2024-01-01Subjects: “…NextG vulnerability detection…”
Get full text
Article -
339
Divine aseity and the paradox of divine self-limitation
Published 2025-01-01Subjects: Get full text
Article -
340
Workers’ compensation claims for precariously employed workers in Ontario: employer resistance and workers’ limited voice
Published 2021-08-01Subjects: Get full text
Article