Journal articles on the topic 'Natural threat'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Natural threat.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Cartin-Ceba, Rodrigo, Lee B. Lu, and Anna Kolpakchi. "A ‘Natural’ Threat." American Journal of Medicine 120, no. 11 (2007): e3-e4. http://dx.doi.org/10.1016/j.amjmed.2007.04.018.
Full textGebbeken, Norbert, and Theodor Krauthammer. "Natural Threat - Tornadoes." Bautechnik 93, no. 4 (2016): 243–53. http://dx.doi.org/10.1002/bate.201600001.
Full textKuruvamanikindi Venkatesh, M Sai Kumar, Shaik Mohammed Maaz, Surekari Yashwanth Teja, and Dr. K. Pavan Kumar. "Automated Cyber Threat Identification and Natural Language Processing." International Journal of Scientific Research in Science, Engineering and Technology 12, no. 3 (2025): 89–97. https://doi.org/10.32628/ijsrset2512317.
Full textTurner, Marian. "Hungarian natural history under threat." Nature 474, no. 7350 (2011): 139. http://dx.doi.org/10.1038/474139a.
Full textShah, Anki, J. Kathyayani, D. Janani, E. Abhinav, and Rajashree Sutrawe. "CYBER THREAT DETECTION AND PROFILING USING AI." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–6. https://doi.org/10.55041/ijsrem.ncft025.
Full textP. Karthik and B. Harish Kumar Reddy. "INTELLIGENT PROFILING OF EMERGING CYBER THREATS USING NATURAL LANGUAGE PROCESSING AND MACHINE LEARNING." International Journal of Engineering Research and Science & Technology 21, no. 2 (2025): 986–96. https://doi.org/10.62643/ijerst.2025.v21.i2.pp986-996.
Full textPasupuleti, Murali Krishna. "Threat Intelligence Automation Using Natural Language Processing on Dark Web Data." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 06 (2025): 399–411. https://doi.org/10.62311/nesx/rphcrcscrcp3.
Full textRaghav, Mayank. "NATURAL LANGUAGE PROCESSING BASED THREAT ASSESSMENT." International Journal of Engineering Applied Sciences and Technology 8, no. 6 (2023): 94–99. http://dx.doi.org/10.33564/ijeast.2023.v08i06.012.
Full textTohir, RIzki Kurnia, and Fadlan Pramatana. "PEMETAAN ANCAMAN DAN KARAKTERISTIK KEBAKARAN HUTAN DAN LAHAN (KARHUTLA) PROVINSI LAMPUNG." Wahana Forestra: Jurnal Kehutanan 15, no. 2 (2020): 12–27. http://dx.doi.org/10.31849/forestra.v15i2.4705.
Full textCzarny, Elżbieta, Jerzy Menkes, and Patryk Toporowski. "Gazprom - threat to Europe?" Economics and Business Review 9, no. 1 (2009): 44–66. http://dx.doi.org/10.18559/ebr.2009.1.551.
Full textSangita, Agarwal*1 Abhishek Saha2 Sufia Zaman2 &. Abhijit Mitra3. "RESPONDENT ANALYSIS OF THREATS TO BRACKISH WATER FISHERIES IN ODISHA." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 5, no. 12 (2018): 203–9. https://doi.org/10.5281/zenodo.2525772.
Full textAmjad Jumani, Amber Baig, Engr. Dr. Shamim Akhtar, Muhammad Shahmir Shamim, Hira Zaheer, and Areej Changaiz. "AUTOMATING CYBER THREAT INTELLIGENCE EXTRACTION USING NATURAL LANGUAGE PROCESSING TECHNIQUES." Kashf Journal of Multidisciplinary Research 2, no. 06 (2025): 184–201. https://doi.org/10.71146/kjmr498.
Full textJermy, A. C. "Plant invaders: The threat to natural ecosystems." Biological Conservation 79, no. 2-3 (1997): 313. http://dx.doi.org/10.1016/s0006-3207(97)89602-4.
Full textCowling, Richard M., and David M. Richardson. "Plant invaders: The threat to natural ecosystems." Trends in Ecology & Evolution 10, no. 12 (1995): 508–9. http://dx.doi.org/10.1016/s0169-5347(00)89215-0.
Full textZaborowska, Magdalena, Jadwiga Wyszkowska, Agata Borowik, and Jan Kucharski. "Bisphenols—A Threat to the Natural Environment." Materials 16, no. 19 (2023): 6500. http://dx.doi.org/10.3390/ma16196500.
Full textWaisová, Šárka. "From Threat to Opportunity." Czech Journal of International Relations 48, no. 3 (2013): 32–61. http://dx.doi.org/10.32422/cjir.318.
Full textEmrich, Christopher T., Yao Zhou, Sanam K. Aksha, and Herbert E. Longenecker. "Creating a Nationwide Composite Hazard Index Using Empirically Based Threat Assessment Approaches Applied to Open Geospatial Data." Sustainability 14, no. 5 (2022): 2685. http://dx.doi.org/10.3390/su14052685.
Full textDatta, N. Bala Suresh. "Holistic Cyber Threat Intelligence System with Bert for Advanced Threat Detection." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2662–64. https://doi.org/10.22214/ijraset.2025.68780.
Full textBhaskar, Parumanchala, Farooq Sunar Mahammad, K. Ramachari, et al. "Automated Cyber Threat Identification Using Natural Language Processing." International Research Journal of Innovations in Engineering and Technology 09, Special Issue (2025): 395–99. https://doi.org/10.47001/irjiet/2025.inspire64.
Full textMuhammed, Khaleel, Aavudai Anandhi, Gang Chen, and Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats." Sustainability 13, no. 20 (2021): 11259. http://dx.doi.org/10.3390/su132011259.
Full textMuhammed, Khaleel, Aavudai Anandhi, Gang Chen, and Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats." Sustainability 13, no. 20 (2021): 11259. http://dx.doi.org/10.3390/su132011259.
Full textArslan, Dilara, Kerim Çiçek, Ömer Döndüren, and Lisa Ernoul. "Threat Ranking to Improve Conservation Planning: An Example from the Gediz Delta, Turkey." Land 10, no. 12 (2021): 1381. http://dx.doi.org/10.3390/land10121381.
Full textAbhijit, Mitra. "Threat Detection Technique in Context to Mangrove Ecosystem of Indian Sundarbans." Annals of Marine Science 1, no. 1 (2017): 028–31. https://doi.org/10.17352/ams.000005.
Full textManasa, K., P. S. S. Neeraj, V. V. V. Sainadh, G. Gayatri Priya, and V. P. V. Bharathi. "Adaptive Cyber Attack Prediction Using Multi-Source Data." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43159.
Full textEdim Bassey Edim, Akpan Itoro Udofot, and Omotosho Moses Oluseyi. "AI-augmented cyber security threat intelligence – enhancing situational awareness." International Journal of Science and Research Archive 14, no. 1 (2025): 890–97. https://doi.org/10.30574/ijsra.2025.14.1.2650.
Full textSrija, E., G. S. V. Mithelesh, G. Manas Reddy,, and MD Irfan. "Blockchain-Based Social Networking Model Empowered by Non-Fungible Tokens." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–7. https://doi.org/10.55041/ijsrem.ncft023.
Full textVynograd, Nataliya. "Natural Foci Diseases as a Stable Biological Threat." Archivum Immunologiae et Therapiae Experimentalis 62, no. 6 (2014): 445–47. http://dx.doi.org/10.1007/s00005-014-0316-8.
Full textHutasoit, SE., MSi., MSE, Posma Sariguna Johnson Kennedy. "Natural Balance of Power, The Balance of Power Between Countries that Promote Economic." Fundamental Management Journal 1, no. 01 (2017): 58–71. http://dx.doi.org/10.33541/fjm.v1i01.195.
Full textYadav, Dr Neha. "AI in Cybersecurity: A Literature review." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–7. https://doi.org/10.55041/isjem03378.
Full textKelvin Ovabor, Ismail Oluwatobiloba Sule-Odu, Travis Atkison, Adetutu Temitope Fabusoro, and Joseph Oluwaseun Benedict. "AI-driven threat intelligence for real-time cybersecurity: Frameworks, tools, and future directions." Open Access Research Journal of Science and Technology 12, no. 2 (2024): 040–48. http://dx.doi.org/10.53022/oarjst.2024.12.2.0135.
Full textRamasankar Molleti, Vinod Goje, Puneet Luthra, and Prathap Raghavan. "Automated threat detection and response using LLM agents." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 079–90. http://dx.doi.org/10.30574/wjarr.2024.24.2.3329.
Full textRamasankar, Molleti, Goje Vinod, Luthra Puneet, and Raghavan Prathap. "Automated threat detection and response using LLM agents." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 079–90. https://doi.org/10.5281/zenodo.15067889.
Full textP.Ramya, P., R. R.Anitha, J. Rajalakshmi, and R. R.Dineshkumar. "Integrating Quantum Computing and NLP for Advanced Cyber Threat Detection." Journal of Cybersecurity and Information Management 14, no. 2 (2024): 186–97. http://dx.doi.org/10.54216/jcim.140213.
Full textDołęga, Marta, and Krzysztof Biernat. "Procesy zarządzania ryzykiem ekologicznym." Studia Ecologiae et Bioethicae 7, no. 1 (2009): 157–64. http://dx.doi.org/10.21697/seb.2009.7.1.10.
Full textKashyap, Gaurav. "AI for Threat Detection and Mitigation: Using AI to identify and respond to cybersecurity threats in real-time." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/ijsrem10936.
Full textSun, Tianfang, Pin Yang, Mengming Li, and Shan Liao. "An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion." Future Internet 13, no. 2 (2021): 40. http://dx.doi.org/10.3390/fi13020040.
Full textSaptono, Edy, Ribka Keiza, and Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia." Technium Social Sciences Journal 23 (September 9, 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.
Full textMrozowska, Alicja. "CATALOG OF NON-MILITARY RISKS OCCURRING IN MARINE AREAS, WITH SPECIAL CONSIDERATION FOR THREATS GENERATED BY NATURAL CONDITIONS." Rocznik Bezpieczeństwa Morskiego XIV (November 2, 2020): 1–2. http://dx.doi.org/10.5604/01.3001.0014.6070.
Full textIslam, S. A. Mohaiminul, MD Shadikul Bari, Ankur Sarkar, A. J. M. Obaidur Rahman Khan, and Rakesh Paul. "AI-Powered Threat Intelligence: Revolutionizing Cybersecurity with Proactive Risk Management for Critical Sectors." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 7, no. 01 (2024): 1–8. https://doi.org/10.60087/jaigs.v7i01.291.
Full textStein, Dr Laura. "ADVANCING PROACTIVE CYBERSECURITY THROUGH CYBER THREAT INTELLIGENCE MINING: A COMPREHENSIVE REVIEW AND FUTURE DIRECTIONS." International Journal of Cyber Threat Intelligence and Secure Networking 2, no. 02 (2025): 1–7. https://doi.org/10.55640/ijctisn-v02i02-01.
Full textVÁLEK, Dalibor, and Radomír ŠČUREK. "THREAT OF THE ELECTRICAL TRANSMISSION SYSTEMS BY THE NATURAL." Krízový Manažment 12, no. 1 (2013): 70–76. http://dx.doi.org/10.26552/krm.c.2013.1.70-76.
Full textSemenenko, O., Y. Dobrovolsky, I. Tselishchev, V. Ivanov, Т. Akinina, and V. Dubovyi. "ON DETERMINATION OF THREATS TO THE NATIONAL SECURITY OF UKRAINE FROM THE UNDERWATER SPACE." Collection of scientific works of Odesa Military Academy 2, no. 14 (2021): 187–92. http://dx.doi.org/10.37129/2313-7509.2020.14.2.187-192.
Full textMunawwar, Arif, Jusni, and Aswan Andi. "The Development Strategy of Batu Papan Natural Bath Tourism Region in Palopo City." International Journal of Innovative Science and Research Technology 8, no. 2 (2023): 854–59. https://doi.org/10.5281/zenodo.7677965.
Full textRohit Kumar Bisht. "Cybersecurity and Artificial Intelligence: How AI is Being Used in Cybersecurity to Improve Detection and Response to Cyber Threats." Tuijin Jishu/Journal of Propulsion Technology 45, no. 02 (2024): 6749–61. http://dx.doi.org/10.52783/tjjpt.v45.i02.7577.
Full textAguilar-Luzón, María del Carmen, Beatriz Carmona, and Ana Loureiro. "Future Actions towards Climate Change: The Role of Threat Perception and Emotions." European Journal of Sustainable Development 12, no. 4 (2023): 379. http://dx.doi.org/10.14207/ejsd.2023.v12n4p379.
Full textShayma Sultanan, Md Mostafizur Rahman, Mohammad Shahadat Hossain, Md. Najmul Gony, and AL Rafy. "AI-powered threat detection in modern cybersecurity systems: Enhancing real-time response in enterprise environments." World Journal of Advanced Engineering Technology and Sciences 6, no. 2 (2022): 136–46. https://doi.org/10.30574/wjaets.2022.6.2.0079.
Full textResearcher. "THE ROLE OF AI IN DETECTING INSIDER THREATS IN HEALTHCARE ORGANIZATIONS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 239–48. https://doi.org/10.5281/zenodo.13960643.
Full textSridevi Kakolu, Muhammad Ashraf Faheem, and Muhammad Aslam. "Integrating Natural Language Processing with Cybersecurity Protocols: Real-Time Analysis of Malicious Intent in Social Engineering Attack." International Journal of Science and Research Archive 1, no. 1 (2020): 082–95. http://dx.doi.org/10.30574/ijsra.2020.1.1.0020.
Full textVamsi Krishna Vemulapalli. "AI-driven cybersecurity: The future of adaptive threat defense." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 3248–55. https://doi.org/10.30574/wjarr.2025.26.2.1953.
Full textFang, Yong, Jian Gao, Zhonglin Liu, and Cheng Huang. "Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM." Applied Sciences 10, no. 17 (2020): 5922. http://dx.doi.org/10.3390/app10175922.
Full text