NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.217
1.
  • Examining the patterns of d... Examining the patterns of disaggregate energy security risk and crude oil price: the USA scenario over 1970–2040
    Alola, Andrew Adewale; Özkan, Oktay; Obekpa, Hephzibah Onyeje Resources policy, 20/May , Letnik: 82
    Journal Article
    Recenzirano
    Odprti dostop

    Beyond the environmental drawback of fossil energy sources, energy security remains a salient concern for economic development and environmental sustainability. This explains why the influence of ...
Celotno besedilo
2.
  • Analysis of healthcare big ... Analysis of healthcare big data
    Lv, Zhihan; Qiao, Liang Future generation computer systems, August 2020, 2020-08-00, Letnik: 109
    Journal Article
    Recenzirano

    In order to explore the development of healthcare in China and the privacy and security risk factors in medical data under the background of big data, the development status of China’s healthcare ...
Celotno besedilo
3.
  • Chronicles of security risk... Chronicles of security risk assessment in process industries: Past, present and future perspectives
    Varadharajan, Surendar; Bajpai, Shailendra Journal of loss prevention in the process industries, September 2023, 2023-09-00, Letnik: 84
    Journal Article
    Recenzirano

    Security incidents around the world causes enormous loss in terms of life, economy, and environment. The 9/11 ′triggered the serious onset of research initiatives in the field of security with a more ...
Celotno besedilo
4.
  • Malcoda: Practical and Stoc... Malcoda: Practical and Stochastic Security Risk Assessment for Enterprise Networks
    Sato, Ryohei; Kawaguchi, Hidetoshi; Nakatani, Yuichi IEEE transactions on dependable and secure computing, 07/2024
    Journal Article
    Odprti dostop

    Many security risk assessment models have been proposed to describe and analyze security risks and their dependencies in network systems by means of graphs. However, these models suffer from two ...
Celotno besedilo
5.
  • Mobile shopping apps adopti... Mobile shopping apps adoption and perceived risks: A cross-country perspective utilizing the Unified Theory of Acceptance and Use of Technology
    Chopdar, Prasanta Kr; Korfiatis, Nikolaos; Sivakumar, V.J. ... Computers in human behavior, September 2018, 2018-09-00, 20180901, Letnik: 86
    Journal Article
    Recenzirano
    Odprti dostop

    Consumer adoption of mobile shopping apps is an emerging area in m-commerce which poses an interesting challenge for retailers and app developers. In this study, we adapt the Unified Theory of ...
Celotno besedilo

PDF
6.
  • Assessing the attractivenes... Assessing the attractiveness of chemical and process facilities to terrorism using a situational crime prevention approach
    Marroni, Giulia; Casson Moreno, Valeria; Tortolini, Alessia ... Journal of loss prevention in the process industries, July 2024, 2024-07-00, Letnik: 89
    Journal Article
    Recenzirano

    As intentional attacks to industry have been on the rise in the last years, researchers and institutions put effort in addressing risks of industrial assets exposed to acts of interference. One of ...
Celotno besedilo
7.
  • An integrated approach to a... An integrated approach to assess safety and security risks in chemical process industries
    Soltanzadeh, Ahmad; Zarei, Esmaeil; Mahdinia, Mohsen ... Journal of loss prevention in the process industries, August 2024, 2024-08-00, Letnik: 90
    Journal Article
    Recenzirano

    Chemical process industries (CPIs) face significant safety and security risks that are closely intertwined. However, previous research has predominantly examined these risks separately, lacking a ...
Celotno besedilo
8.
  • Large group activity securi... Large group activity security risk assessment and risk early warning based on random forest algorithm
    Chen, Yanyu; Zheng, Wenzhe; Li, Wenbo ... Pattern recognition letters, April 2021, 2021-04-00, 20210401, Letnik: 144
    Journal Article
    Recenzirano

    •With the continuous development of artificial intelligence, machine learning, as an indispensable means to realize artificial intelligence, is constantly improving, and deep learning is one of the ...
Celotno besedilo
9.
  • Side-Channel Attack Securit... Side-Channel Attack Security Risk Assessment Model Based on Mutual Information Game
    Yao, Jianbo; Zhang, Tao Journal of physics. Conference series, 03/2024, Letnik: 2732, Številka: 1
    Journal Article, Conference Proceeding
    Recenzirano
    Odprti dostop

    Abstract The process of attack and defence of side channel attack can be regarded as the process of mutual information game, the two sides of the game are the cryptographic device designer (defence) ...
Celotno besedilo
10.
  • Environmental higher educat... Environmental higher education, formal finance, energy security risk, and renewable energy investment in China: An aggregate and disaggregate analysis
    Zeng, Qingrui; Hafeez, Muhammad; Sher, Falak ... Renewable energy, October 2024, 2024-10-00, Letnik: 232
    Journal Article
    Recenzirano

    China is currently the largest energy-consuming nation; however, its contribution to renewable energy investment (REI) is significant and warrants examination. Many studies have analyzed how various ...
Celotno besedilo
1 2 3 4 5
zadetkov: 1.217

Nalaganje filtrov