-
441
Spatiotemporal analysis and influencing factors of ecological vulnerability in the Tuojiang River Basin, China
Published 2025-12-01Subjects: “…Ecological vulnerability…”
Get full text
Article -
442
A New Climate vulnerability Index Sistan and Baluchistan province
Published 2015-06-01Subjects: “…climate vulnerability index…”
Get full text
Article -
443
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
Published 2024-12-01Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
Get full text
Article -
444
Dynamic Evaluation of Regional Agricultural Drought Vulnerability Based on Triangular Fuzzy Number and Connection Number Coupling
Published 2021-01-01Subjects: Get full text
Article -
445
Research on network attack analysis method based on attack graph of absorbing Markov chain
Published 2023-02-01Subjects: Get full text
Article -
446
Load-to-store: exploit the time leakage of store buffer transient window
Published 2023-04-01Subjects: “…microarchitectural side-channel vulnerability…”
Get full text
Article -
447
PCA and PSO based optimized support vector machine for efficient intrusion detection in internet of things
Published 2025-02-01Subjects: Get full text
Article -
448
L’immigration clandestine à Mayotte : un phénomène révélateur de l'incidence des changements climatiques sur la sécurité humaine?
Published 2015-02-01Subjects: Get full text
Article -
449
Automated vulnerability discovery method for 5G core network protocol
Published 2024-02-01Subjects: Get full text
Article -
450
Paiements pour services environnementaux et vulnérabilité des populations locales dans les pays du Sud – Études de cas costaricien et congolais
Published 2016-04-01Subjects: Get full text
Article -
451
Using side-channel and quantization vulnerability to recover DNN weights
Published 2021-08-01Subjects: Get full text
Article -
452
End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT
Published 2025-01-01Subjects: Get full text
Article -
453
Small rural tourism businesses’ experience of the COVID-19 Tourism Relief Fund: A case of Coffee Bay
Published 2024-08-01Subjects: Get full text
Article -
454
Desertification risk assessment and management program
Published 2016-12-01Subjects: Get full text
Article -
455
Distinguishing Reality from AI: Approaches for Detecting Synthetic Content
Published 2024-12-01Subjects: Get full text
Article -
456
Caracterización de conducta sexual inadecuada hacia niños y adolescentes
Published 2014-04-01Subjects: Get full text
Article -
457
Exploit detection based on illegal control flow transfers identification
Published 2014-09-01Subjects: “…software vulnerability…”
Get full text
Article -
458
Assessment of Ecosystem Vulnerability in the Tropic of Cancer (Yunnan Section)
Published 2025-01-01Subjects: “…ecosystem vulnerability…”
Get full text
Article -
459
GLOBALISATION AND THE PERPETUITY OF POVERTY IN THE CONTEMPORARY SECURITY ENVIRONMENT
Published 2024-12-01Subjects: Get full text
Article -
460
Language – a vital pill missing in patients’ treatment: language barriers during cancer care through the eyes of patients and families
Published 2025-12-01Subjects: Get full text
Article