Results 101 to 110 of about 230,799 (122)
A STUDY ON THE DEVELOPMENT OF LARGE MORTAR MIXER FOR INTRUSION MORTAR
Keinosuke TAKEGAWA
openalex +2 more sources
The significance of the kakortokite in the evolution of the Ilímaussaq intrusion, South Greenland
J. B. Ferguson
openalex +2 more sources
Serpentine mineralogy of ultrabasic intrusions in Canada and on the mid-Atlantic Ridge
F. Aumento
openalex +1 more source
National Accident Sampling System; special studies development: steering column, side intrusion and roof intrusion. Final report [PDF]
P. Cooley
openalex
The Influx of Ph.D.s into Librarianship: Intrusion of Transfusion?
Rush Miller
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Internet of Things Journal, 2021
There has been significant research in incorporating both blockchain and intrusion detection to improve data privacy and detect existing and emerging cyberattacks, respectively.
Osama Alkadi+3 more
semanticscholar +1 more source
There has been significant research in incorporating both blockchain and intrusion detection to improve data privacy and detect existing and emerging cyberattacks, respectively.
Osama Alkadi+3 more
semanticscholar +1 more source
IEEE Internet of Things Journal, 2022
Industrial Internet of Things (IIoT) is a high-value cyber target due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the ...
Muna Al-Hawawreh+2 more
semanticscholar +1 more source
Industrial Internet of Things (IIoT) is a high-value cyber target due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the ...
Muna Al-Hawawreh+2 more
semanticscholar +1 more source
Military Communications and Information Systems Conference, 2015
One of the major research challenges in this field is the unavailability of a comprehensive network based data set which can reflect modern network traffic scenarios, vast varieties of low footprint intrusions and depth structured information about the ...
Nour Moustafa, J. Slay
semanticscholar +1 more source
One of the major research challenges in this field is the unavailability of a comprehensive network based data set which can reflect modern network traffic scenarios, vast varieties of low footprint intrusions and depth structured information about the ...
Nour Moustafa, J. Slay
semanticscholar +1 more source