-
1
Childhood vulnerabilities in South Africa: Some ethical perspectives
Published 2021-12-01Subjects: Get full text
Article -
2
Análise integrada da vulnerabilidade à diarreia aguda em Curitiba
Published 2017-12-01Subjects: Get full text
Article -
3
Socioeconomic and socioecological issues of the pandemic crisis in the Amazon
Published 2021-07-01Subjects: Get full text
Article -
4
La double invisibilisation du care réalisé par les femmes en situation de post-catastrophe climatique : l’exemple de la vallée de la Roya.
Published 2024-04-01Subjects: Get full text
Article -
5
PyFuzzer:automatic in-memory fuzz testing method
Published 2013-09-01Subjects: Get full text
Article -
6
-
7
WEB VULNERABILITIES DETECTION USING A HYBRID MODEL OF CNN, GRU AND ATTENTION MECHANISM
Published 2025-01-01Subjects: Get full text
Article -
8
Design and implementation ofserver security alarm system in campus network
Published 2014-10-01Subjects: Get full text
Article -
9
Task-Oriented Adversarial Attacks for Aspect-Based Sentiment Analysis Models
Published 2025-01-01Subjects: Get full text
Article -
10
Le Paysage comme ressource dans les projets de développement territorial
Published 2020-07-01Subjects: Get full text
Article -
11
A Novel Approach Based on Machine Learning, Blockchain, and Decision Process for Securing Smart Grid
Published 2024-01-01Subjects: Get full text
Article -
12
Research on context-aware Android application vulnerability detection
Published 2021-11-01Subjects: “…Android vulnerability detection…”
Get full text
Article -
13
Le Paysage comme ressource dans les projets de développement territorial
Published 2010-01-01Subjects: Get full text
Article -
14
Rôle des métaphores verbales et gestuelles dans le développement de la prudence lors d’activités de dialogue philosophique
Published 2024-09-01Subjects: Get full text
Article -
15
Security capability analysis of software-based heterogeneous redundant execution system
Published 2021-09-01Subjects: Get full text
Article -
16
Inter-agency collaboration in building urban fire resilience in Indonesia: how do metropolitan cities address it?
Published 2025-02-01Subjects: Get full text
Article -
17
Bayesian-network-approximate-reasoning-based method for network vulnerabilities evaluation
Published 2008-01-01Subjects: Get full text
Article -
18
Secure software development: leveraging application call graphs to detect security vulnerabilities
Published 2025-01-01Subjects: Get full text
Article -
19
mVulSniffer: a multi-type source code vulnerability sniffer method
Published 2023-09-01Subjects: “…multi-type vulnerabilities sniffer…”
Get full text
Article -
20
Distinguishing Reality from AI: Approaches for Detecting Synthetic Content
Published 2024-12-01Subjects: Get full text
Article