Search alternatives:
threats » threat (Expand Search)
decrease » increase (Expand Search)
Showing 1 - 20 results of 112 for search '(( significant threats based ) OR ( significantly ((longer decrease) OR (linear decrease)) ))', query time: 0.11s Refine Results
  1. 1

    Hybrid deep learning based threat intelligence framework for Industrial IoT systems by Jahanzaib Malik (23718816)

    Published 2025
    “…However, the increased pervasiveness, reduced human involvement, resource-constrained nature of underlying IoT devices, dynamic and shared spectrum of 4G/5G communication, and reliance on the cloud for outsourced massive storage and computation bring novel security challenges and concerns. A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …”
  2. 2
  3. 3

    Significance of Avicennia Marina in the Arabian Gulf Environment: A Review by Kaiprath Puthiyapurayil Haseeba (21392966)

    Published 2025
    “…However, in the past two decades Gulf mangroves have been facing significant threats, including extensive coastal development, shoreline modification by establishing marinas and ports, and climate change-associated impacts such as sea-level rise and altered precipitation patterns, which pose significant risks to this fragile ecosystem. …”
  4. 4

    Generative AI: a double-edged sword in the cyber threat landscape by Werisha Ibrar (21635153)

    Published 2025
    “…Its usage by malevolent entities to automate intricate malware creation poses a significant threat, circumventing conventional defensive measures. …”
  5. 5
  6. 6

    O-Cloud Security: A Comprehensive Survey of Threats, Mitigation Strategies, and Future Directions by Muhammad J. Shehab (16905174)

    Published 2025
    “…Through this analysis, we aim to provide an in-depth survey aimed at strengthening O-Cloud-based telecom networks against cybersecurity threats and ensuring data and services’ integrity. …”
  7. 7
  8. 8

    Mixed precision iterative refinement with adaptive precision sparse approximate inverse preconditioning by Noaman Khan (19810050)

    Published 2025
    “…<p dir="ltr">Hardware trends have motivated the development of mixed precision algorithms in numerical linear algebra, which aim to decrease runtime while maintaining acceptable accuracy. …”
  9. 9

    Serum 25-hydroxyvitamin D concentrations are inversely associated with body adiposity measurements but the association with bone mass is non-linear in postmenopausal women by Vijay, Ganji

    Published 2021
    “…In a continuous variable analysis, the association between 25(OH)D and bone mass was significant, non-linear, inverse ‘U’. In conclusion, serum 25-hydroxyvitamin D was inversely associated with adiposity measures and non-linearly associated to bone mass in postmenopausal Qatari women.…”
    Get full text
    Get full text
    Get full text
    article
  10. 10

    Serum 25-hydroxyvitamin D concentrations are inversely associated with body adiposity measurements but the association with bone mass is non-linear in postmenopausal women by Vijay Ganji (8710491)

    Published 2021
    “…In a continuous variable analysis, the association between 25(OH)D and bone mass was significant, non-linear, inverse ‘U’. In conclusion, serum 25-hydroxyvitamin D was inversely associated with adiposity measures and non-linearly associated to bone mass in postmenopausal Qatari women.…”
  11. 11

    Analyzing the Influence of Climate and Anthropogenic Development on Vegetation Cover in the Coastal Ecosystems of GCC by Abhilash Dutta Roy (22466830)

    Published 2025
    “…Our results revealed significant changes in land cover, as seen by an increase in artificial built-up areas by 15.5% in two decades and a corresponding decrease in bareland and dense vegetation. …”
  12. 12
  13. 13
  14. 14
  15. 15

    Cellulose-based materials for antimicrobial water treatment: functionalization strategies and applications by Radha, Remya

    Published 2025
    “…Water contamination by pathogenic microorganisms poses a significant threat to public health and ecosystems, necessitating the development of sustainable and efficient water decontamination technologies. …”
    Get full text
    article
  16. 16

    Toward Adaptive Intrusion Detection Systems for UAVs Using Cyber-Physical Image Analysis by Hanane Amirat (23126110)

    Published 2025
    “…<p dir="ltr">The rapid proliferation of uncrewed aerial vehicles (UAVs) across modern applications has significantly heightened their susceptibility to cyber and physical security threats. …”
  17. 17

    Novel interpretable and robust web-based AI platform for phishing email detection by Abdulla Al-Subaiey (19757007)

    Published 2024
    “…<p dir="ltr">Phishing emails continue to pose a significant threat, causing financial losses and security breaches. …”
  18. 18

    Security Analysis of Integrated HAP-Based FSO and UAV-Enabled RF Downlink Communications by Mohammad Javad Saber (4334227)

    Published 2024
    “…We investigate the secrecy performance of an integrated HAP-based FSO and unmanned aerial vehicle (UAV)-enabled radio frequency (RF) downlink system using the decode-and-forward relaying protocol. …”
  19. 19

    A Novel Versatile Framework for Enabling Early Detection of Evolving Network-based Cyberattacks by THOMAS, RAJESH

    Published 2025
    “…Network-based cyber-attacks have been increasing in scale, frequency and sophistication, posing significant threats to nation states and organizations worldwide. …”
    Get full text
  20. 20

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…It is of critical significance given the advancement in modern strategic narratives. …”