Статті в журналах з теми "Cyborg landscapes"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Cyborg landscapes".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Lokman, Kees. "Cyborg landscapes: Choreographing resilient interactions between infrastructure, ecology, and society." Journal of Landscape Architecture 12, no. 1 (January 2, 2017): 60–73. http://dx.doi.org/10.1080/18626033.2017.1301289.
Повний текст джерелаPurnomo, Arif D., Charles Lim, and Burman Noviansyah. "Threat Hunting Early Experiment through Event Correlation and Memory Forensic." ACMIT Proceedings 6, no. 1 (July 6, 2021): 56–63. http://dx.doi.org/10.33555/acmit.v6i1.98.
Повний текст джерелаHeise, Ursula K. "The Android and the Animal." PMLA/Publications of the Modern Language Association of America 124, no. 2 (March 2009): 503–10. http://dx.doi.org/10.1632/pmla.2009.124.2.503.
Повний текст джерелаJimenez-Zepeda, Victor, Donna E. Reece, McCurdy R. Arleigh, Esther Masih-Khan, Eshetu G. Atenafu, Michael Sebag, Julie Stakiw, et al. "Real-World Outcomes with Bortezomib-Containing Regimens and Lenalidomide Plus Dexamethasone for the Treatment of Transplant Ineligible MM Patients: A Multi-Institutional Report from the National Myeloma Canada Research Network (MCRN) Database." Blood 132, Supplement 1 (November 29, 2018): 2008. http://dx.doi.org/10.1182/blood-2018-99-117363.
Повний текст джерелаRamsdale, Andrew, Stavros Shiaeles, and Nicholas Kolokotronis. "A Comparative Analysis of Cyber-Threat Intelligence Sources, Formats and Languages." Electronics 9, no. 5 (May 16, 2020): 824. http://dx.doi.org/10.3390/electronics9050824.
Повний текст джерелаAlhajjar, Elie, and Kevin Lee. "The U.S. Cyber Threat Landscape." European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 18–24. http://dx.doi.org/10.34190/eccws.21.1.197.
Повний текст джерелаFurnell, Steven, and Samantha Dowling. "Cyber crime: a portrait of the landscape." Journal of Criminological Research, Policy and Practice 5, no. 1 (February 28, 2019): 13–26. http://dx.doi.org/10.1108/jcrpp-07-2018-0021.
Повний текст джерелаDeakin, Mark. "From The City Of Bits to E-Topia." International Journal of E-Adoption 6, no. 1 (January 2014): 16–33. http://dx.doi.org/10.4018/ijea.2014010102.
Повний текст джерелаKaloudi, Nektaria, and Jingyue Li. "The AI-Based Cyber Threat Landscape." ACM Computing Surveys 53, no. 1 (May 29, 2020): 1–34. http://dx.doi.org/10.1145/3372823.
Повний текст джерелаCivitarese, Giuseppe. "Do cyborgs dream? Post‐human landscapes in Shinya Tsukamoto’s Nightmare Detective (2006)." International Journal of Psychoanalysis 91, no. 4 (August 2010): 1005–16. http://dx.doi.org/10.1111/j.1745-8315.2010.00305.x.
Повний текст джерелаRahardi, Kunjana. "LANSKAP KONTEKS EKSTRALINGUISTIK VIRTUAL DALAM PRAGMATIK SIBER." Linguistik Indonesia 40, no. 1 (February 3, 2022): 39–48. http://dx.doi.org/10.26499/li.v40i1.287.
Повний текст джерелаMuhammad Riaz Shad. "Cyber Threat Landscape and Readiness Challenge of Pakistan." Strategic Studies 39, no. 1 (April 24, 2019): 1–19. http://dx.doi.org/10.53532/ss.039.01.00115.
Повний текст джерелаChatzis, Petros, and Eliana Stavrou. "Cyber-threat landscape of border control infrastructures." International Journal of Critical Infrastructure Protection 36 (March 2022): 100503. http://dx.doi.org/10.1016/j.ijcip.2021.100503.
Повний текст джерелаScheiber, Laura L., and Judson Byrd Finley. "Domestic campsites and cyber landscapes in the Rocky Mountains." Antiquity 84, no. 323 (March 1, 2010): 114–30. http://dx.doi.org/10.1017/s0003598x00099804.
Повний текст джерелаZajko, Mike. "Canada’s cyber security and the changing threat landscape." Critical Studies on Security 3, no. 2 (May 4, 2015): 147–61. http://dx.doi.org/10.1080/21624887.2015.1071165.
Повний текст джерелаSahrom Abu, Md, Siti Rahayu Selamat, Aswami Ariffin, and Robiah Yusof. "Cyber Threat Intelligence – Issue and Challenges." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 1 (April 1, 2018): 371. http://dx.doi.org/10.11591/ijeecs.v10.i1.pp371-379.
Повний текст джерелаAli, Rashid. "Looking to the future of the cyber security landscape." Network Security 2021, no. 3 (March 2021): 8–10. http://dx.doi.org/10.1016/s1353-4858(21)00029-5.
Повний текст джерелаHoran, Cecelia, and Hossein Saiedian. "Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions." Journal of Cybersecurity and Privacy 1, no. 4 (September 30, 2021): 580–96. http://dx.doi.org/10.3390/jcp1040029.
Повний текст джерелаChoo, Kim-Kwang Raymond. "The cyber threat landscape: Challenges and future research directions." Computers & Security 30, no. 8 (November 2011): 719–31. http://dx.doi.org/10.1016/j.cose.2011.08.004.
Повний текст джерелаBhangoo, Har Sandeep Kaur. "Book review: Ramnath Reghunadhan, 2022. Cyber Technological Paradigms and Threat Landscape in India." Millennial Asia 13, no. 3 (November 11, 2022): 532–35. http://dx.doi.org/10.1177/09763996221128209.
Повний текст джерелаSparke, Matthew. "Situated Cyborg Knowledge in Not so Borderless Online Global Education: Mapping the Geosocial Landscape of a MOOC." Geopolitics 22, no. 1 (July 11, 2016): 51–72. http://dx.doi.org/10.1080/14650045.2016.1204601.
Повний текст джерелаWang, Shi Ying, and Xiu Li Jia. "Effect of Landscape Architecture in the Campus Construction." Applied Mechanics and Materials 584-586 (July 2014): 717–20. http://dx.doi.org/10.4028/www.scientific.net/amm.584-586.717.
Повний текст джерелаDhirani, Lubna Luxmi, Eddie Armstrong, and Thomas Newe. "Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap." Sensors 21, no. 11 (June 5, 2021): 3901. http://dx.doi.org/10.3390/s21113901.
Повний текст джерелаClair, Allison, and Jim Mandler. "Building relationships with the new media in a cyber landscape." Journal of Business Strategy 40, no. 6 (November 18, 2019): 49–54. http://dx.doi.org/10.1108/jbs-08-2019-0154.
Повний текст джерелаRodofile, Nicholas R., Kenneth Radke, and Ernest Foo. "Extending the cyber-attack landscape for SCADA-based critical infrastructure." International Journal of Critical Infrastructure Protection 25 (June 2019): 14–35. http://dx.doi.org/10.1016/j.ijcip.2019.01.002.
Повний текст джерелаLanzendorfer, Quinn E. "Information Sharing Challenges in Government Cybersecurity Organizations." International Journal of Cyber Research and Education 2, no. 1 (January 2020): 32–39. http://dx.doi.org/10.4018/ijcre.2020010103.
Повний текст джерелаMcIntosh, Jacqueline, Bruno Marques, Madeleine Palmer, and Verarisa Ujung. "The Outside In." Enquiry A Journal for Architectural Research 16, no. 1 (July 29, 2019): 1–14. http://dx.doi.org/10.17831/enq:arcc.v16i1.445.
Повний текст джерелаLambi, Amit, Rashmi Agarwal, and Sandeep Vijayaraghvan. "Cross-Domain Deterrence in the Cyber World." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 387–91. http://dx.doi.org/10.22214/ijraset.2022.46645.
Повний текст джерелаMuhammad Shairoze Malik, Muhammad Shairoze Malik. "Cyber Security - Incident Response and Management." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 6. http://dx.doi.org/10.54692/ijeci.2019.030337.
Повний текст джерелаMuhammad Shairoze Malik, Muhammad Shairoze Malik. "Cyber Security - Incident Response and Management." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 6. http://dx.doi.org/10.54692/ijeci.2020.030337.
Повний текст джерелаLopatova, Natalia. "Cybersecurity as a driver of business growth." Science and Innovations 3, no. 217 (March 2021): 38–41. http://dx.doi.org/10.29235/1818-9857-2021-3-38-41.
Повний текст джерелаBoyko, Taras, and Mariya Ruda. "Cyber-physical system for assessing the impact of wind farms on environmental elements." Ukrainian Metrological Journal, no. 1 (March 31, 2021): 60–66. http://dx.doi.org/10.24027/2306-7039.1.2021.228245.
Повний текст джерелаMittel, Michael. "Navigating the cyber-insurance landscape to protect MSPs and their clients." Computer Fraud & Security 2020, no. 1 (January 2020): 12–14. http://dx.doi.org/10.1016/s1361-3723(20)30008-7.
Повний текст джерелаVogel, Elisabeth, Zoya Dyka, Dan Klann, and Peter Langendörfer. "Resilience in the Cyberworld: Definitions, Features and Models." Future Internet 13, no. 11 (November 19, 2021): 293. http://dx.doi.org/10.3390/fi13110293.
Повний текст джерелаRashid, Asma, Anum Yar Khan, and Syed Wasif Azim. "Cyber hegemony and information warfare: A case of Russia." Liberal Arts and Social Sciences International Journal (LASSIJ) 5, no. 1 (June 30, 2021): 648–66. http://dx.doi.org/10.47264/idea.lassij/5.1.42.
Повний текст джерелаEssien, Essien D. "Ethical Implications of the Techno-Social Dilemma in Contemporary Cyber-Security Phenomenon in Africa." International Journal of Information Communication Technologies and Human Development 10, no. 1 (January 2018): 17–30. http://dx.doi.org/10.4018/ijicthd.2018010102.
Повний текст джерелаButnaru, Denisa. "Exoskeletons, Rehabilitation and Bodily Capacities." Body & Society 27, no. 3 (July 21, 2021): 28–57. http://dx.doi.org/10.1177/1357034x211025600.
Повний текст джерелаBoyko, Taras, Mariia Ruda, Serhiy Stasevych, and Olha Chaplyk. "THE WIND TURBINE AND THE ENVIRONMENT INTERACTION MODEL." Measuring Equipment and Metrology 82, no. 4 (2021): 51–60. http://dx.doi.org/10.23939/istcmtm2021.04.051.
Повний текст джерелаRajaram, Priyanga, Mark Goh, and Jianying Zhou. "Guidelines for cyber risk management in shipboard operational technology systems." Journal of Physics: Conference Series 2311, no. 1 (July 1, 2022): 012002. http://dx.doi.org/10.1088/1742-6596/2311/1/012002.
Повний текст джерелаSreeja, T., Dr Manna Sheela Rani Chetty, and Sekhar Babu Boddu. "Detecting SQL Injection Using Correlative Log Analysis." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 389. http://dx.doi.org/10.14419/ijet.v7i2.32.15720.
Повний текст джерелаEt.al, Sandhya Sukhabogi. "A Theoretical review on the importance of Threat Intelligence Sharing & The challenges intricated." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 3950–56. http://dx.doi.org/10.17762/turcomat.v12i3.1684.
Повний текст джерелаSlack, Chelsey, and Neil Robinson. "Co-operation: A Key to NATOs Cyberspace Endeavour." European Foreign Affairs Review 24, Issue 2 (May 1, 2019): 154–66. http://dx.doi.org/10.54648/eerr2019010.
Повний текст джерелаDreibelbis, Rachel C., Jaclyn Martin, Michael D. Coovert, and David W. Dorsey. "The Looming Cybersecurity Crisis and What It Means for the Practice of Industrial and Organizational Psychology." Industrial and Organizational Psychology 11, no. 2 (June 2018): 346–65. http://dx.doi.org/10.1017/iop.2018.3.
Повний текст джерелаWilner, Alex S. "Cybersecurity and its discontents: Artificial intelligence, the Internet of Things, and digital misinformation." International Journal: Canada's Journal of Global Policy Analysis 73, no. 2 (June 2018): 308–16. http://dx.doi.org/10.1177/0020702018782496.
Повний текст джерелаSwart, Ignatius, Barry Irwin, and Marthie M. Grobler. "Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion." International Journal of Cyber Warfare and Terrorism 6, no. 3 (July 2016): 17–30. http://dx.doi.org/10.4018/ijcwt.2016070102.
Повний текст джерелаSmyrlis, Michail, Iason Somarakis, George Spanoudakis, George Hatzivasilis, and Sotiris Ioannidis. "CYRA: A Model-Driven CYber Range Assurance Platform." Applied Sciences 11, no. 11 (June 2, 2021): 5165. http://dx.doi.org/10.3390/app11115165.
Повний текст джерелаSchmitz-Berndt, Sandra, and Mark Cole. "Towards an Efficient and Coherent Regulatory Framework on Cybersecurity in the EU: The Proposals for a NIS 2.0 Directive and a Cyber Resilience Act." Applied Cybersecurity & Internet Governance 1, no. 1 (December 8, 2022): 121–37. http://dx.doi.org/10.5604/01.3001.0016.1323.
Повний текст джерелаMANANTAN, MARK BRYAN. "The People’s Republic of China’s Cyber Coercion: Taiwan, Hong Kong, and the South China Sea." Issues & Studies 56, no. 03 (September 2020): 2040013. http://dx.doi.org/10.1142/s1013251120400135.
Повний текст джерелаKalogeraki, Eleni-Maria, Spyridon Papastergiou, Haralambos Mouratidis, and Nineta Polemi. "A Novel Risk Assessment Methodology for SCADA Maritime Logistics Environments." Applied Sciences 8, no. 9 (August 28, 2018): 1477. http://dx.doi.org/10.3390/app8091477.
Повний текст джерелаPăvălașcu, Narcis Sebastian, and Manuela Rozalia Gabor. "A Case Study on the Particularities and Sustainability of the Concepts of TQM, Quality Control, and Risk Management in the Corporate Insurance Industry: Loss and the Incidence of Catastrophic Risks." Proceedings 63, no. 1 (December 10, 2020): 3. http://dx.doi.org/10.3390/proceedings2020063003.
Повний текст джерела