Zeitschriftenartikel zum Thema „Natural threat“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Natural threat" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Cartin-Ceba, Rodrigo, Lee B. Lu, and Anna Kolpakchi. "A ‘Natural’ Threat." American Journal of Medicine 120, no. 11 (2007): e3-e4. http://dx.doi.org/10.1016/j.amjmed.2007.04.018.
Der volle Inhalt der QuelleGebbeken, Norbert, and Theodor Krauthammer. "Natural Threat - Tornadoes." Bautechnik 93, no. 4 (2016): 243–53. http://dx.doi.org/10.1002/bate.201600001.
Der volle Inhalt der QuelleKuruvamanikindi Venkatesh, M Sai Kumar, Shaik Mohammed Maaz, Surekari Yashwanth Teja, and Dr. K. Pavan Kumar. "Automated Cyber Threat Identification and Natural Language Processing." International Journal of Scientific Research in Science, Engineering and Technology 12, no. 3 (2025): 89–97. https://doi.org/10.32628/ijsrset2512317.
Der volle Inhalt der QuelleTurner, Marian. "Hungarian natural history under threat." Nature 474, no. 7350 (2011): 139. http://dx.doi.org/10.1038/474139a.
Der volle Inhalt der QuelleShah, Anki, J. Kathyayani, D. Janani, E. Abhinav, and Rajashree Sutrawe. "CYBER THREAT DETECTION AND PROFILING USING AI." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–6. https://doi.org/10.55041/ijsrem.ncft025.
Der volle Inhalt der QuelleP. Karthik and B. Harish Kumar Reddy. "INTELLIGENT PROFILING OF EMERGING CYBER THREATS USING NATURAL LANGUAGE PROCESSING AND MACHINE LEARNING." International Journal of Engineering Research and Science & Technology 21, no. 2 (2025): 986–96. https://doi.org/10.62643/ijerst.2025.v21.i2.pp986-996.
Der volle Inhalt der QuellePasupuleti, Murali Krishna. "Threat Intelligence Automation Using Natural Language Processing on Dark Web Data." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 06 (2025): 399–411. https://doi.org/10.62311/nesx/rphcrcscrcp3.
Der volle Inhalt der QuelleRaghav, Mayank. "NATURAL LANGUAGE PROCESSING BASED THREAT ASSESSMENT." International Journal of Engineering Applied Sciences and Technology 8, no. 6 (2023): 94–99. http://dx.doi.org/10.33564/ijeast.2023.v08i06.012.
Der volle Inhalt der QuelleTohir, RIzki Kurnia, and Fadlan Pramatana. "PEMETAAN ANCAMAN DAN KARAKTERISTIK KEBAKARAN HUTAN DAN LAHAN (KARHUTLA) PROVINSI LAMPUNG." Wahana Forestra: Jurnal Kehutanan 15, no. 2 (2020): 12–27. http://dx.doi.org/10.31849/forestra.v15i2.4705.
Der volle Inhalt der QuelleCzarny, Elżbieta, Jerzy Menkes, and Patryk Toporowski. "Gazprom - threat to Europe?" Economics and Business Review 9, no. 1 (2009): 44–66. http://dx.doi.org/10.18559/ebr.2009.1.551.
Der volle Inhalt der QuelleSangita, Agarwal*1 Abhishek Saha2 Sufia Zaman2 &. Abhijit Mitra3. "RESPONDENT ANALYSIS OF THREATS TO BRACKISH WATER FISHERIES IN ODISHA." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 5, no. 12 (2018): 203–9. https://doi.org/10.5281/zenodo.2525772.
Der volle Inhalt der QuelleAmjad Jumani, Amber Baig, Engr. Dr. Shamim Akhtar, Muhammad Shahmir Shamim, Hira Zaheer, and Areej Changaiz. "AUTOMATING CYBER THREAT INTELLIGENCE EXTRACTION USING NATURAL LANGUAGE PROCESSING TECHNIQUES." Kashf Journal of Multidisciplinary Research 2, no. 06 (2025): 184–201. https://doi.org/10.71146/kjmr498.
Der volle Inhalt der QuelleJermy, A. C. "Plant invaders: The threat to natural ecosystems." Biological Conservation 79, no. 2-3 (1997): 313. http://dx.doi.org/10.1016/s0006-3207(97)89602-4.
Der volle Inhalt der QuelleCowling, Richard M., and David M. Richardson. "Plant invaders: The threat to natural ecosystems." Trends in Ecology & Evolution 10, no. 12 (1995): 508–9. http://dx.doi.org/10.1016/s0169-5347(00)89215-0.
Der volle Inhalt der QuelleZaborowska, Magdalena, Jadwiga Wyszkowska, Agata Borowik, and Jan Kucharski. "Bisphenols—A Threat to the Natural Environment." Materials 16, no. 19 (2023): 6500. http://dx.doi.org/10.3390/ma16196500.
Der volle Inhalt der QuelleWaisová, Šárka. "From Threat to Opportunity." Czech Journal of International Relations 48, no. 3 (2013): 32–61. http://dx.doi.org/10.32422/cjir.318.
Der volle Inhalt der QuelleEmrich, Christopher T., Yao Zhou, Sanam K. Aksha, and Herbert E. Longenecker. "Creating a Nationwide Composite Hazard Index Using Empirically Based Threat Assessment Approaches Applied to Open Geospatial Data." Sustainability 14, no. 5 (2022): 2685. http://dx.doi.org/10.3390/su14052685.
Der volle Inhalt der QuelleDatta, N. Bala Suresh. "Holistic Cyber Threat Intelligence System with Bert for Advanced Threat Detection." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2662–64. https://doi.org/10.22214/ijraset.2025.68780.
Der volle Inhalt der QuelleBhaskar, Parumanchala, Farooq Sunar Mahammad, K. Ramachari, et al. "Automated Cyber Threat Identification Using Natural Language Processing." International Research Journal of Innovations in Engineering and Technology 09, Special Issue (2025): 395–99. https://doi.org/10.47001/irjiet/2025.inspire64.
Der volle Inhalt der QuelleMuhammed, Khaleel, Aavudai Anandhi, Gang Chen, and Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats." Sustainability 13, no. 20 (2021): 11259. http://dx.doi.org/10.3390/su132011259.
Der volle Inhalt der QuelleMuhammed, Khaleel, Aavudai Anandhi, Gang Chen, and Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats." Sustainability 13, no. 20 (2021): 11259. http://dx.doi.org/10.3390/su132011259.
Der volle Inhalt der QuelleArslan, Dilara, Kerim Çiçek, Ömer Döndüren, and Lisa Ernoul. "Threat Ranking to Improve Conservation Planning: An Example from the Gediz Delta, Turkey." Land 10, no. 12 (2021): 1381. http://dx.doi.org/10.3390/land10121381.
Der volle Inhalt der QuelleAbhijit, Mitra. "Threat Detection Technique in Context to Mangrove Ecosystem of Indian Sundarbans." Annals of Marine Science 1, no. 1 (2017): 028–31. https://doi.org/10.17352/ams.000005.
Der volle Inhalt der QuelleManasa, K., P. S. S. Neeraj, V. V. V. Sainadh, G. Gayatri Priya, and V. P. V. Bharathi. "Adaptive Cyber Attack Prediction Using Multi-Source Data." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43159.
Der volle Inhalt der QuelleEdim Bassey Edim, Akpan Itoro Udofot, and Omotosho Moses Oluseyi. "AI-augmented cyber security threat intelligence – enhancing situational awareness." International Journal of Science and Research Archive 14, no. 1 (2025): 890–97. https://doi.org/10.30574/ijsra.2025.14.1.2650.
Der volle Inhalt der QuelleSrija, E., G. S. V. Mithelesh, G. Manas Reddy,, and MD Irfan. "Blockchain-Based Social Networking Model Empowered by Non-Fungible Tokens." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–7. https://doi.org/10.55041/ijsrem.ncft023.
Der volle Inhalt der QuelleVynograd, Nataliya. "Natural Foci Diseases as a Stable Biological Threat." Archivum Immunologiae et Therapiae Experimentalis 62, no. 6 (2014): 445–47. http://dx.doi.org/10.1007/s00005-014-0316-8.
Der volle Inhalt der QuelleHutasoit, SE., MSi., MSE, Posma Sariguna Johnson Kennedy. "Natural Balance of Power, The Balance of Power Between Countries that Promote Economic." Fundamental Management Journal 1, no. 01 (2017): 58–71. http://dx.doi.org/10.33541/fjm.v1i01.195.
Der volle Inhalt der QuelleYadav, Dr Neha. "AI in Cybersecurity: A Literature review." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–7. https://doi.org/10.55041/isjem03378.
Der volle Inhalt der QuelleKelvin Ovabor, Ismail Oluwatobiloba Sule-Odu, Travis Atkison, Adetutu Temitope Fabusoro, and Joseph Oluwaseun Benedict. "AI-driven threat intelligence for real-time cybersecurity: Frameworks, tools, and future directions." Open Access Research Journal of Science and Technology 12, no. 2 (2024): 040–48. http://dx.doi.org/10.53022/oarjst.2024.12.2.0135.
Der volle Inhalt der QuelleRamasankar Molleti, Vinod Goje, Puneet Luthra, and Prathap Raghavan. "Automated threat detection and response using LLM agents." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 079–90. http://dx.doi.org/10.30574/wjarr.2024.24.2.3329.
Der volle Inhalt der QuelleRamasankar, Molleti, Goje Vinod, Luthra Puneet, and Raghavan Prathap. "Automated threat detection and response using LLM agents." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 079–90. https://doi.org/10.5281/zenodo.15067889.
Der volle Inhalt der QuelleP.Ramya, P., R. R.Anitha, J. Rajalakshmi, and R. R.Dineshkumar. "Integrating Quantum Computing and NLP for Advanced Cyber Threat Detection." Journal of Cybersecurity and Information Management 14, no. 2 (2024): 186–97. http://dx.doi.org/10.54216/jcim.140213.
Der volle Inhalt der QuelleDołęga, Marta, and Krzysztof Biernat. "Procesy zarządzania ryzykiem ekologicznym." Studia Ecologiae et Bioethicae 7, no. 1 (2009): 157–64. http://dx.doi.org/10.21697/seb.2009.7.1.10.
Der volle Inhalt der QuelleKashyap, Gaurav. "AI for Threat Detection and Mitigation: Using AI to identify and respond to cybersecurity threats in real-time." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/ijsrem10936.
Der volle Inhalt der QuelleSun, Tianfang, Pin Yang, Mengming Li, and Shan Liao. "An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion." Future Internet 13, no. 2 (2021): 40. http://dx.doi.org/10.3390/fi13020040.
Der volle Inhalt der QuelleSaptono, Edy, Ribka Keiza, and Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia." Technium Social Sciences Journal 23 (September 9, 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.
Der volle Inhalt der QuelleMrozowska, Alicja. "CATALOG OF NON-MILITARY RISKS OCCURRING IN MARINE AREAS, WITH SPECIAL CONSIDERATION FOR THREATS GENERATED BY NATURAL CONDITIONS." Rocznik Bezpieczeństwa Morskiego XIV (November 2, 2020): 1–2. http://dx.doi.org/10.5604/01.3001.0014.6070.
Der volle Inhalt der QuelleIslam, S. A. Mohaiminul, MD Shadikul Bari, Ankur Sarkar, A. J. M. Obaidur Rahman Khan, and Rakesh Paul. "AI-Powered Threat Intelligence: Revolutionizing Cybersecurity with Proactive Risk Management for Critical Sectors." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 7, no. 01 (2024): 1–8. https://doi.org/10.60087/jaigs.v7i01.291.
Der volle Inhalt der QuelleStein, Dr Laura. "ADVANCING PROACTIVE CYBERSECURITY THROUGH CYBER THREAT INTELLIGENCE MINING: A COMPREHENSIVE REVIEW AND FUTURE DIRECTIONS." International Journal of Cyber Threat Intelligence and Secure Networking 2, no. 02 (2025): 1–7. https://doi.org/10.55640/ijctisn-v02i02-01.
Der volle Inhalt der QuelleVÁLEK, Dalibor, and Radomír ŠČUREK. "THREAT OF THE ELECTRICAL TRANSMISSION SYSTEMS BY THE NATURAL." Krízový Manažment 12, no. 1 (2013): 70–76. http://dx.doi.org/10.26552/krm.c.2013.1.70-76.
Der volle Inhalt der QuelleSemenenko, O., Y. Dobrovolsky, I. Tselishchev, V. Ivanov, Т. Akinina, and V. Dubovyi. "ON DETERMINATION OF THREATS TO THE NATIONAL SECURITY OF UKRAINE FROM THE UNDERWATER SPACE." Collection of scientific works of Odesa Military Academy 2, no. 14 (2021): 187–92. http://dx.doi.org/10.37129/2313-7509.2020.14.2.187-192.
Der volle Inhalt der QuelleMunawwar, Arif, Jusni, and Aswan Andi. "The Development Strategy of Batu Papan Natural Bath Tourism Region in Palopo City." International Journal of Innovative Science and Research Technology 8, no. 2 (2023): 854–59. https://doi.org/10.5281/zenodo.7677965.
Der volle Inhalt der QuelleRohit Kumar Bisht. "Cybersecurity and Artificial Intelligence: How AI is Being Used in Cybersecurity to Improve Detection and Response to Cyber Threats." Tuijin Jishu/Journal of Propulsion Technology 45, no. 02 (2024): 6749–61. http://dx.doi.org/10.52783/tjjpt.v45.i02.7577.
Der volle Inhalt der QuelleAguilar-Luzón, María del Carmen, Beatriz Carmona, and Ana Loureiro. "Future Actions towards Climate Change: The Role of Threat Perception and Emotions." European Journal of Sustainable Development 12, no. 4 (2023): 379. http://dx.doi.org/10.14207/ejsd.2023.v12n4p379.
Der volle Inhalt der QuelleShayma Sultanan, Md Mostafizur Rahman, Mohammad Shahadat Hossain, Md. Najmul Gony, and AL Rafy. "AI-powered threat detection in modern cybersecurity systems: Enhancing real-time response in enterprise environments." World Journal of Advanced Engineering Technology and Sciences 6, no. 2 (2022): 136–46. https://doi.org/10.30574/wjaets.2022.6.2.0079.
Der volle Inhalt der QuelleResearcher. "THE ROLE OF AI IN DETECTING INSIDER THREATS IN HEALTHCARE ORGANIZATIONS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 239–48. https://doi.org/10.5281/zenodo.13960643.
Der volle Inhalt der QuelleSridevi Kakolu, Muhammad Ashraf Faheem, and Muhammad Aslam. "Integrating Natural Language Processing with Cybersecurity Protocols: Real-Time Analysis of Malicious Intent in Social Engineering Attack." International Journal of Science and Research Archive 1, no. 1 (2020): 082–95. http://dx.doi.org/10.30574/ijsra.2020.1.1.0020.
Der volle Inhalt der QuelleVamsi Krishna Vemulapalli. "AI-driven cybersecurity: The future of adaptive threat defense." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 3248–55. https://doi.org/10.30574/wjarr.2025.26.2.1953.
Der volle Inhalt der QuelleFang, Yong, Jian Gao, Zhonglin Liu, and Cheng Huang. "Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM." Applied Sciences 10, no. 17 (2020): 5922. http://dx.doi.org/10.3390/app10175922.
Der volle Inhalt der Quelle