Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 75,295
1.
  • Vulnerability and Power Vulnerability and Power
    Cooreman-Guittin, Talitha; Maican, Petre Journal of disability & religion, 2021, Volume: 25, Issue: 1
    Journal Article
    Peer reviewed
    Open access
Full text
Available for: BFBNIB, NUK, PILJ, SAZU, UL, UM, UPUK

PDF
2.
  • Assessment and mapping of g... Assessment and mapping of groundwater vulnerability to pollution: Current status and challenges
    Machiwal, Deepesh; Jha, Madan Kumar; Singh, Vijay P. ... Earth-science reviews, October 2018, 2018-10-00, Volume: 185
    Journal Article
    Peer reviewed

    Increasing groundwater contamination across the globe triggered the concept of “aquifer vulnerability”, which has been extensively used worldwide during past three to four decades by researchers and ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
3.
  • Penilaian indeks keterancam... Penilaian indeks keterancaman komuniti orang asli di Lembangan Sungai Telom, Bertam dan Lemoi, Cameron Highlands
    Ramli, Siti Qhairunissa; Mustafa, Firuza Begham; Salleh, Khairulmaini Osman Geografia : Malaysian journal of society and space, 8/2018, Volume: 14, Issue: 3
    Journal Article
    Peer reviewed

    Istilah keterancaman bertujuan untuk menjelaskan perhubungan yang wujud di antara keterdedahan ancaman fizikal dengan kesejahteraan manusia dan keupayaan mereka untuk menghadapi ancaman. Penilaian ...
Full text
Available for: NUK, ODKLJ, UL, UM
4.
  • Deep Learning Based Vulnera... Deep Learning Based Vulnerability Detection: Are We There Yet?
    Chakraborty, Saikat; Krishna, Rahul; Ding, Yangruibo ... IEEE transactions on software engineering, 09/2022, Volume: 48, Issue: 9
    Journal Article
    Peer reviewed
    Open access

    Automated detection of software vulnerabilities is a fundamental problem in software security. Existing program analysis techniques either suffer from high false positives or false negatives. Recent ...
Full text
Available for: IJS, NUK, UL

PDF
5.
  • The Vulnerable Revolution The Vulnerable Revolution
    Contessa Damien; Hiles Dustin Humanity & society, 05/2018, Volume: 42, Issue: 2
    Journal Article
    Peer reviewed
Full text
Available for: NUK, OILJ, SAZU, UKNU, UL, UM, UPUK
6.
  • E-Filing System for Governm... E-Filing System for Government Offices
    Khan, H U; Javed, A Technical journal (University of Engineering and Technology (Taxila (Extinct city)), 01/2017, Volume: 22, Issue: 1
    Journal Article
    Peer reviewed

    E-Governance is widely thought as ideal approach to establish productive relationship between government and citizens. It is extensively used to bring transparency, accountability and efficiency at ...
Full text
Available for: NUK, UL
7.
  • Assessing coastal vulnerabi... Assessing coastal vulnerability: Development of a combined physical and economic index
    Kantamaneni, Komali; Phillips, Michael; Thomas, Tony ... Ocean & coastal management, 05/2018, Volume: 158
    Journal Article
    Peer reviewed
    Open access

    As a consequence of climate change, coastal communities worldwide are subject to increased risk from sea-level rise and more intense storms. Therefore, it is important for coastal managers to have ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP

PDF
8.
  • Hybrid seismic vulnerabilit... Hybrid seismic vulnerability models for regional structures considering bivariate intensity measures
    Li, Si-Qi Soil dynamics and earthquake engineering (1984), August 2024, 2024-08-00, Volume: 183
    Journal Article
    Peer reviewed

    The multiple-probability decision-making method for earthquake hazards considers multiple performance indicators and can be used to effectively estimate the seismic risk of structures. The seismic ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
9.
  • Vulnerable Familien Vulnerable Familien
    Bauer, Petra; Wiezorek, Christine Sozial extra, 01/2016, Volume: 40, Issue: 6
    Journal Article

    Abstract / Das Wichtigste in Kürze Unter dem Begriff der ‚vulnerablen Familie‘ werden Familien zusammengefasst, deren Lebenslagen bzw. Lebensweisen als problematisch betrachtet werden. Mit der ...
Full text
Available for: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
10.
  • A framework for designing v... A framework for designing vulnerability metrics
    Albanese, Massimiliano; Iganibo, Ibifubara; Adebiyi, Olutola Computers & security, September 2023, 2023-09-00, Volume: 132
    Journal Article
    Peer reviewed

    Vulnerability analysis has long been used to evaluate the security posture of a system. Different approaches, including vulnerability graphs and various vulnerability metrics, have been used to study ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
1 2 3 4 5
hits: 75,295

Load filters