Search results

  • CSV Spreadsheet
(1 - 20 of 356)

Pages

 IDENTIFICATION OF BEHAVIORAL INDICATORS IN MALICIOUS INSIDERS' THREATS IN CYBERSECURITY. A SURVEY QUANTITATIVE STUDY
2001
60 Years of Conflict Communication
Agent-based Modeling of Commissural Axon Guidance along the Midline
Agent-Based Modeling to Determine the Risk to a Swarm of Unmanned Aerial Vehicles Under an Adversarial Artificial Intelligence Attack
Algorithm to Fight Infection
AN ANALYSIS OF BIOMETRIC ATM ADOPTION USING GAME THEORY
ANALYZING COVID-19 ERA CYBER THREATS ON THE ELDERLY: TOWARD REALIZING N-OF-1 COUNTERMEASURES TO ENHANCE CYBER SITUATIONAL AWARENESS OF SOCIAL ENGINEERING ATTACKS
ANALYZING GENERATIONAL DATA ON LABOR FORCE PARTICIPATION IN THE STATE OF ALABAMA AS TO THE SIGNIFICANCE OF WORKER MOTIVATION AND WORKPLACE CULTURE
Anticipation (1982)
APPLIED QUASI-EXPERIMENTATION: ATTACKING NON-CONNECTED & CONNECTED VEHICLE SYSTEMS VIA REMOTE COMMERCIAL OFF-THE-SHELF ATTACK IMPLANT

Pages