ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Biology
Technology
Public health
Social Sciences
Computing
Research
Pure sciences
Education
Medicine / Sub specialtie
Computing
all records (74)

Languages
English
Spanish
German
Portuguese

Countries
Indonesia
USA
Ukraine
Brazil
India
South Africa
Poland
Italy
Pakistan
Germany
all records (80)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
22.439  Articles
1 of 2.245 pages  |  10  records  |  more records»
Insider threat is a severe problem of many computer department since they have an authorized to do some assigned tasks. They can easily seek for any organizational computer security vulnerability. Protocol “Insider threat detection and prevention Protocol... see more

In an era like today's global, Internet-based information system security is a must to be considered, because of the public nature of the internet network and global is not safe. Basically the threat is coming from someone who wishes mempuyai gain illegal... see more

Typical organization and establishment procedures of open source monitoring by special units of Ukrainian Armed Forces for information threats detection and evaluation purposes are considered in this article. Analysis of existing approaches for informatio... see more

Background: Increasing problem of sexually transmitted diseases needs a well-organized effort allowing preserving and strengthening sexual health. Proper knowledge about sexually transmitted diseases (STD) allows not only to protect oneself against contag... see more

Among the cancer diseases, breast cancer is considered one of the most prevalent threats requiring early detection for a higher recovery rate. Meanwhile, the manual evaluation of malignant tissue regions in histopathology images is a critical and challeng... see more

Among the cancer diseases, breast cancer is considered one of the most prevalent threats requiring early detection for a higher recovery rate. Meanwhile, the manual evaluation of malignant tissue regions in histopathology images is a critical and challeng... see more

The purpose of this study is to examine whether deception influences unethical behavior, employee perceptions of threat, and their coping appraisal processes. It also examines the role of deception in influencing employees' threat appraisal and coping app... see more

Nowadays, Biomedical technology plays a vital role in diagnosis and treatment of small to dangerous life threatening diseases and one of the most life threatening disease is Brain Tumor, which is the mass growth of abnormal cells in brain. Early detection... see more

Sleepiness during driving is a dangerous problem faced by all countries. Many studies have been conducted and stated that sleepiness threatens the driver himself and other peoples. The victim not only suffered minor injuries but also many of them ended in... see more

1 of 2.245 pages  |  10  records  |  more records»