1. RISK CENTRIC THREAT MODELING: PROCESS FOR ATTACK SIMULATION AND THREAT ANALYSIS

    RISK CENTRIC THREAT MODELING: PROCESS FOR ATTACK SIMULATION AND THREAT ANALYSIS

    6,652

    博客來

  2. THREAT MODELING: DESIGNING FOR SECURITY

    THREAT MODELING: DESIGNING FOR SECURITY

    1,870

    博客來

  3. THREAT MODELING: DESIGNING FOR SECURITY

    THREAT MODELING: DESIGNING FOR SECURITY

    3,575

    博客來

  4. SECOND CHANCES FOR THE TRIPLE THREAT

    SECOND CHANCES FOR THE TRIPLE THREAT

    600

    博客來

  5. THE THREAT OF AND PLANNING FOR PANDEMIC FLU

    THE THREAT OF AND PLANNING FOR PANDEMIC FLU

    769

    博客來

  6. SCLEROTINIA SCLEROTIORUM, AN EMERGING THREAT FOR BANGLADESH

    SCLEROTINIA SCLEROTIORUM, AN EMERGING THREAT FOR BANGLADESH

    3,261

    博客來

  7. THE CLIMATE THREAT. CRISIS FOR DEMOCRACY?

    THE CLIMATE THREAT. CRISIS FOR DEMOCRACY?

    1,710

    博客來

  8. CYBER THREAT INTELLIGENCE FOR THE INTERNET OF THINGS

    CYBER THREAT INTELLIGENCE FOR THE INTERNET OF THINGS

    9,599

    博客來

  9. LEVERAGE AI AND NLP FOR ENHANCED THREAT INTELLIGENCE

    LEVERAGE AI AND NLP FOR ENHANCED THREAT INTELLIGENCE

    3,960

    博客來

  10. THREAT ASSESSMENT PROGRAM FOR DOMESTIC VIOLENCE: PREDICTIONS FOR SAFETY PLANNING

    THREAT ASSESSMENT PROGRAM FOR DOMESTIC VIOLENCE: PREDICTIONS FOR SAFETY PLANNING

    1,210

    博客來

  11. THREAT ASSESSMENTS: FOR CLOSE PROTECTION & SECURITY MANAGEMENT

    THREAT ASSESSMENTS: FOR CLOSE PROTECTION & SECURITY MANAGEMENT

    728

    博客來

  12. DESIGN & DEVELOPMENT OF DATA MODEL FOR CYBER THREAT

    DESIGN & DEVELOPMENT OF DATA MODEL FOR CYBER THREAT

    3,261

    博客來

  13. CYBER THREAT: INTERNET SECURITY FOR HOME AND BUSINESS

    CYBER THREAT: INTERNET SECURITY FOR HOME AND BUSINESS

    872

    博客來

  14. DEVELOPING NEXT-GENERATION COUNTERMEASURES FOR HOMELAND SECURITY THREAT PREVENTION

    DEVELOPING NEXT-GENERATION COUNTERMEASURES FOR HOMELAND SECURITY THREAT PREVENTION

    12,600

    博客來

  15. STEREOTYPE THREAT IS NO MATCH FOR A REGULATORY FIT

    STEREOTYPE THREAT IS NO MATCH FOR A REGULATORY FIT

    2,911

    博客來

  16. THREAT FORECASTING: LEVERAGING BIG DATA FOR PREDICTIVE ANALYSIS

    THREAT FORECASTING: LEVERAGING BIG DATA FOR PREDICTIVE ANALYSIS

    2,997

    博客來

  17. AI FOR CYBERSECURITY: ROBUST MODELS FOR AUTHENTICATION, THREAT AND ANOMALY DETECTION

    AI FOR CYBERSECURITY: ROBUST MODELS FOR AUTHENTICATION, THREAT AND ANOMALY DETECTION

    3,291

    博客來

  18. AI-ENABLED THREAT DETECTION AND SECURITY ANALYSIS FOR INDUSTRIAL IOT

    AI-ENABLED THREAT DETECTION AND SECURITY ANALYSIS FOR INDUSTRIAL IOT

    10,799

    博客來

  19. GROUND PENETRATING RADAR: SIGNAL PROCESSING FOR BURIED THREAT DETECTION

    GROUND PENETRATING RADAR: SIGNAL PROCESSING FOR BURIED THREAT DETECTION

    11,397

    博客來

  20. BIG DATA ANALYTICS AND INTELLIGENT SYSTEMS FOR CYBER THREAT INTELLIGENCE

    BIG DATA ANALYTICS AND INTELLIGENT SYSTEMS FOR CYBER THREAT INTELLIGENCE

    5,499

    博客來