UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.104
1.
  • Examining the patterns of d... Examining the patterns of disaggregate energy security risk and crude oil price: the USA scenario over 1970–2040
    Alola, Andrew Adewale; Özkan, Oktay; Obekpa, Hephzibah Onyeje Resources policy, 20/May , Letnik: 82
    Journal Article
    Recenzirano
    Odprti dostop

    Beyond the environmental drawback of fossil energy sources, energy security remains a salient concern for economic development and environmental sustainability. This explains why the influence of ...
Celotno besedilo
2.
  • Analysis of healthcare big ... Analysis of healthcare big data
    Lv, Zhihan; Qiao, Liang Future generation computer systems, August 2020, 2020-08-00, Letnik: 109
    Journal Article
    Recenzirano

    In order to explore the development of healthcare in China and the privacy and security risk factors in medical data under the background of big data, the development status of China’s healthcare ...
Celotno besedilo
3.
  • Chronicles of security risk... Chronicles of security risk assessment in process industries: Past, present and future perspectives
    Varadharajan, Surendar; Bajpai, Shailendra Journal of loss prevention in the process industries, September 2023, 2023-09-00, Letnik: 84
    Journal Article
    Recenzirano

    Security incidents around the world causes enormous loss in terms of life, economy, and environment. The 9/11 ′triggered the serious onset of research initiatives in the field of security with a more ...
Celotno besedilo
4.
  • Mobile shopping apps adopti... Mobile shopping apps adoption and perceived risks: A cross-country perspective utilizing the Unified Theory of Acceptance and Use of Technology
    Chopdar, Prasanta Kr; Korfiatis, Nikolaos; Sivakumar, V.J. ... Computers in human behavior, September 2018, 2018-09-00, 20180901, Letnik: 86
    Journal Article
    Recenzirano
    Odprti dostop

    Consumer adoption of mobile shopping apps is an emerging area in m-commerce which poses an interesting challenge for retailers and app developers. In this study, we adapt the Unified Theory of ...
Celotno besedilo

PDF
5.
  • Assessing the attractivenes... Assessing the attractiveness of chemical and process facilities to terrorism using a situational crime prevention approach
    Marroni, Giulia; Casson Moreno, Valeria; Tortolini, Alessia ... Journal of loss prevention in the process industries, July 2024, 2024-07-00, Letnik: 89
    Journal Article
    Recenzirano

    As intentional attacks to industry have been on the rise in the last years, researchers and institutions put effort in addressing risks of industrial assets exposed to acts of interference. One of ...
Celotno besedilo
6.
  • How does natural resource d... How does natural resource depletion affect energy security risk? New insights from major energy-consuming countries
    Pang, Liwei; Liu, Linlin; Zhou, Xi ... Energy strategy reviews, July 2024, 2024-07-00, 2024-07-01, Letnik: 54
    Journal Article
    Recenzirano
    Odprti dostop

    The continuous supply of reliable and affordable energy sources is crucial for driving a nation's economic activities. The phenomenon of continuous energy supply at affordable prices is called energy ...
Celotno besedilo
7.
  • An integrated approach to a... An integrated approach to assess safety and security risks in chemical process industries
    Soltanzadeh, Ahmad; Zarei, Esmaeil; Mahdinia, Mohsen ... Journal of loss prevention in the process industries, August 2024, 2024-08-00, Letnik: 90
    Journal Article
    Recenzirano

    Chemical process industries (CPIs) face significant safety and security risks that are closely intertwined. However, previous research has predominantly examined these risks separately, lacking a ...
Celotno besedilo
8.
  • Side-Channel Attack Securit... Side-Channel Attack Security Risk Assessment Model Based on Mutual Information Game
    Yao, Jianbo; Zhang, Tao Journal of physics. Conference series, 03/2024, Letnik: 2732, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Abstract The process of attack and defence of side channel attack can be regarded as the process of mutual information game, the two sides of the game are the cryptographic device designer (defence) ...
Celotno besedilo
9.
  • Large group activity securi... Large group activity security risk assessment and risk early warning based on random forest algorithm
    Chen, Yanyu; Zheng, Wenzhe; Li, Wenbo ... Pattern recognition letters, April 2021, 2021-04-00, 20210401, Letnik: 144
    Journal Article
    Recenzirano

    •With the continuous development of artificial intelligence, machine learning, as an indispensable means to realize artificial intelligence, is constantly improving, and deep learning is one of the ...
Celotno besedilo
10.
  • Disclosing the future food ... Disclosing the future food security risk of China based on crop production and water scarcity under diverse socioeconomic and climate scenarios
    Chen, Lei; Chang, Jianxia; Wang, Yimin ... The Science of the total environment, 10/2021, Letnik: 790
    Journal Article
    Recenzirano

    Climate change and human development may lead to a serious crisis in food security in China, especially in areas with both water shortages and large grain production. Thus, the quantitative ...
Celotno besedilo
1 2 3 4 5
zadetkov: 1.104

Nalaganje filtrov