بدائل البحث:
threat based » bret based (توسيع البحث)
decrease » increase (توسيع البحث)
يعرض 1 - 20 نتائج من 107 نتيجة بحث عن '(( significant threat based ) OR ( significant ((amount decrease) OR (point decrease)) ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 1

    Hybrid deep learning based threat intelligence framework for Industrial IoT systems حسب Jahanzaib Malik (23718816)

    منشور في 2025
    "…However, the increased pervasiveness, reduced human involvement, resource-constrained nature of underlying IoT devices, dynamic and shared spectrum of 4G/5G communication, and reliance on the cloud for outsourced massive storage and computation bring novel security challenges and concerns. A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …"
  2. 2
  3. 3

    Significance of Avicennia Marina in the Arabian Gulf Environment: A Review حسب Kaiprath Puthiyapurayil Haseeba (21392966)

    منشور في 2025
    "…However, in the past two decades Gulf mangroves have been facing significant threats, including extensive coastal development, shoreline modification by establishing marinas and ports, and climate change-associated impacts such as sea-level rise and altered precipitation patterns, which pose significant risks to this fragile ecosystem. …"
  4. 4

    Generative AI: a double-edged sword in the cyber threat landscape حسب Werisha Ibrar (21635153)

    منشور في 2025
    "…Its usage by malevolent entities to automate intricate malware creation poses a significant threat, circumventing conventional defensive measures. …"
  5. 5

    O-Cloud Security: A Comprehensive Survey of Threats, Mitigation Strategies, and Future Directions حسب Muhammad J. Shehab (16905174)

    منشور في 2025
    "…Through this analysis, we aim to provide an in-depth survey aimed at strengthening O-Cloud-based telecom networks against cybersecurity threats and ensuring data and services’ integrity. …"
  6. 6
  7. 7
  8. 8

    Toward Adaptive Intrusion Detection Systems for UAVs Using Cyber-Physical Image Analysis حسب Hanane Amirat (23126110)

    منشور في 2025
    "…<p dir="ltr">The rapid proliferation of uncrewed aerial vehicles (UAVs) across modern applications has significantly heightened their susceptibility to cyber and physical security threats. …"
  9. 9
  10. 10
  11. 11

    Nonlinear Control of Brushless Dual-Fed Induction Generator With a Flywheel Energy Storage System for Improved System Performance حسب Mohammed Hamidat (3722086)

    منشور في 2025
    "…After optimization, the SMC settling time was significantly reduced from 0.7 seconds to 19.97 milliseconds, achieving a 96.9% improvement in response speed, while its steady-state error decreased from 0.48 to 0.06, marking an 87.5% reduction in tracking error. …"
  12. 12

    Cellulose-based materials for antimicrobial water treatment: functionalization strategies and applications حسب Radha, Remya

    منشور في 2025
    "…Water contamination by pathogenic microorganisms poses a significant threat to public health and ecosystems, necessitating the development of sustainable and efficient water decontamination technologies. …"
    احصل على النص الكامل
    article
  13. 13

    Novel interpretable and robust web-based AI platform for phishing email detection حسب Abdulla Al-Subaiey (19757007)

    منشور في 2024
    "…<p dir="ltr">Phishing emails continue to pose a significant threat, causing financial losses and security breaches. …"
  14. 14

    Security Analysis of Integrated HAP-Based FSO and UAV-Enabled RF Downlink Communications حسب Mohammad Javad Saber (4334227)

    منشور في 2024
    "…We investigate the secrecy performance of an integrated HAP-based FSO and unmanned aerial vehicle (UAV)-enabled radio frequency (RF) downlink system using the decode-and-forward relaying protocol. …"
  15. 15

    A Novel Versatile Framework for Enabling Early Detection of Evolving Network-based Cyberattacks حسب THOMAS, RAJESH

    منشور في 2025
    "…Network-based cyber-attacks have been increasing in scale, frequency and sophistication, posing significant threats to nation states and organizations worldwide. …"
    احصل على النص الكامل
  16. 16

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…It is of critical significance given the advancement in modern strategic narratives. …"
  17. 17

    Novel Whole-Cell Inactivated Neisseria Gonorrhoeae Microparticles as Vaccine Formulation in Microneedle-Based Transdermal Immunization حسب Rikhav Gala (18069364)

    منشور في 2018
    "…Here we report that whole-cell-based gonococcal microparticle vaccine loaded in dissolvable microneedles for transdermal administration induced significant increase in antigen-specific IgG antibody titers and antigen-specific CD4 and CD8 T lymphocytes in mice compared to gonococcal antigens in solution or empty microneedles. …"
  18. 18

    Security Supply Chain Using UAVs: Validation and Development of a UAV-Based Model for Qatar’s Mega Sporting Events حسب Khalifa AL-Dosari (17931434)

    منشور في 2023
    "…The key findings of the study are: (1) a valid and reliable UAV-based cybersecurity framework for FIFA mega sporting events was developed; (2) five critical factors were identified, including traceability, security and privacy, trust, acceptability, and preparedness; (3) all factors were significantly and positively correlated, highlighting the complexity of managing security systems in mega sporting events.…"
  19. 19

    The Role of Nanofluids and Renewable Energy in the Development of Sustainable Desalination Systems: A Review حسب Tejvir Singh (18619219)

    منشور في 2020
    "…Moreover, at present, a significant portion of the power comes from traditional fossil-fuel-fired power plants and the greenhouse gas emissions associated with power production along with concentrated brine discharge from the process, pose a severe threat to the environment. …"
  20. 20