Search Results - Design Keywords Code Injection Attacks*
-
1
Authors:
Source: Sensors (14248220); Jul2023, Vol. 23 Issue 13, p6067, 53p
-
2
Authors: et al.
Source: Applied Sciences (2076-3417); Feb2023, Vol. 13 Issue 4, p2478, 13p
Subject Terms: ALGORITHMS, MAP design, PROBLEM solving, IMAGE reconstruction algorithms, FORENSIC genetics
-
3
Authors: et al.
Subject Terms: FOS: Computer and information sciences, Artificial Intelligence (cs.AI), Cryptography and Security, Artificial Intelligence, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2407.09164
-
4
Authors: et al.
Source: Animal Diseases. 8/15/2025, Vol. 5 Issue 1, p1-21. 21p.
Subjects: Structural optimization, Vaccine development, Vaccination, Pandemic preparedness, Vaccine manufacturing, Vaccines, Emerging infectious diseases
HTML Full Text PDF Full Text -
5
Authors:
Source: Technical Journal / Tehnički Glasnik; Dec2025, Vol. 19 Issue 4, p560-574, 15p
-
6
Authors: Thang, Nguyen Manh
Source: Programming & Computer Software; Sep2020, Vol. 46 Issue 5, p351-361, 11p
-
7
Authors: et al.
Source: SCIENCE CHINA Information Sciences; Aug2025, Vol. 68 Issue 8, p1-90, 90p
-
8
Authors: et al.
Source: Electronics (2079-9292); Sep2024, Vol. 13 Issue 17, p3569, 21p
Subject Terms: COMPUTER viruses, USB flash drives, COMPUTER systems, MALWARE, TWENTIETH century
-
9
Authors:
Source: Journal of Clinical Medicine; Jun2025, Vol. 14 Issue 12, p4342, 11p
Subject Terms: MENIERE'S disease, VERTIGO, GENTAMICIN, INJECTIONS, MEDICAL centers
-
10
A MACHINE LEARNING BASED CIDS MODEL FOR INTRUSION DETECTION TO ENSURE SECURITY WITHIN CLOUD NETWORK.
Authors: et al.
Source: Yugoslav Journal of Operations Research; 2025, Vol. 35 Issue 3, p619-632, 14p
-
11
Alternate Title: SOURCE CODE SECURITY IN C PROGRAMMING LANGUAGE: SECUREC. (English)
Authors: et al.
Source: SDU Journal of Engineering Sciences & Design / Mühendislik Bilimleri ve Tasarım Dergisi; 2022, Vol. 10 Issue 2, p561-573, 13p
-
12
Authors: ŢĂLU, Mircea
Source: Acta Technica Corviniensis - Bulletin of Engineering; Oct-Dec2024, Vol. 17 Issue 4, p13-22, 10p
Subject Terms: WEB browsers, EDGE computing, INTERNET of things, INTERNET security, MEMORY
-
13
Authors: Nair, Sunil Sukumaran
Source: Journal of Computer Science & Technology Studies; Jan-Mar2024, Vol. 6 Issue 1, p76-93, 18p
Subject Terms: INTERNET security, PHISHING, EMPLOYEE training, RISK management in business, SQL
-
14
Authors:
Source: Journal of Aligner Orthodontics; 2025, Vol. 9 Issue 3, p217-230, 14p
-
15
Authors:
Source: ISeCure; Jan2024, Vol. 16 Issue 1, p1-16, 16p
-
16
Authors:
Source: IEEE Technology & Society Magazine; Sep2025, Vol. 44 Issue 3, p98-108, 11p
Subject Terms: GENERATIVE artificial intelligence, LANGUAGE models, EMPIRICAL research, ETHICS
-
17
Authors: et al.
Source: International Journal of Healthcare Management; Nov2025, Vol. 18 Issue 4, p724-732, 9p
Subject Terms: COVID-19, HEALTH policy, TECHNICAL specifications, TECHNOLOGICAL innovations, MANUFACTURING industries, DECISION making, CLINICAL trials, PEPTIDE vaccines
Geographic Terms: IRAN
-
18
Authors:
Source: Cuestiones de Fisioterapia; 2025, Vol. 54 Issue 4, p259-272, 14p
Subject Terms: COMPUTER networks, INTERNET security, MACHINE learning, WIRELESS Internet, SECURITY systems
-
19
Authors: Kim, Dong-won
Source: International Journal of Online & Biomedical Engineering; 2025, Vol. 21 Issue 13, p16-30, 15p
-
20
Authors: et al.
Source: Information Management & Computer Security; 2011, Vol. 19 Issue 3, p177-194, 18p
Full Text Finder
Nájsť tento článok vo Web of Science