ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Agronomy and forestry
Social Sciences
Technology
Biology
Computing
Education
Architecture and Urbanism
Computing
Research
Religion
all records (73)

Languages
English
Spanish
Portuguese
German

Countries
Indonesia
USA
Brazil
Romania
South Africa
Ukraine
Spain
Germany
Denmark
India
all records (71)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
5.163  Articles
1 of 517 pages  |  10  records  |  more records»
With the advent of agent technology, the need for security of applications becomes a concern that is beyond classical data security capability and considerations. Without proper security protection especially against a malicious host attack, the widesprea... see more

This article aims to analyze the regulation of the use of underwater drones in international law from the perspective of Indonesian law. This article concludes that the regulation regarding the use of underwater drones that cross national borders has not ... see more

This article aims to analyze the regulation of the use of underwater drones in international law from the perspective of Indonesian law. This article concludes that the regulation regarding the use of underwater drones that cross national borders has not ... see more

Detection of anomaly and attack identification is some of the major concern in IoT domain inrecent days. With the exponential use of IoT based infrastructure in every domain, threats andanomalies are amplifying adequately. Attacks such as malicious operat... see more

The Extradition of Waldemar Pötzsch: A Micro-Study in Danish Neutrality and Refugee Policy 1939-1940During Germany’s occupation of Denmark, 1940-1945, Danish authorities turned over 155 German emigrants and refugees, including a score of Jews, to the Gest... see more

The requirement for a computer that is physically connected to a computer network to be able to access existing resources on a computer network in the form of an IP address obtained statically or dynamically. On a static IP address, there are not many pro... see more

This study examined potential verbal attacks in questioning delivered by a host of a political talk show in Indonesia. It aims at describing a realization of the potential verbal attacks in questioning and identifying the patterns which provides the resou... see more

Caterpillars are insects that eat oil palm leaves. As a herbivore, its presence and feeding activity will be affected by the growth phase of the host plant. This study aims to determine the percentage and intensity of caterpillar attacks on oil palm (Elae... see more

1 of 517 pages  |  10  records  |  more records»