PDAs: Next hacker threat?

被引:0
|
作者
Perine, K
机构
关键词
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
引用
收藏
页码:34 / 34
页数:1
相关论文
共 50 条
  • [21] Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach
    Ampel, Benjamin
    Samtani, Sagar
    Zhu, Hongyi
    Ullman, Steven
    Chen, Hsinchun
    2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, : 144 - 149
  • [22] PDAs for Oncologists
    Miller, Robert S.
    JOURNAL OF ONCOLOGY PRACTICE, 2007, 3 (01) : 45 - 46
  • [23] PDAs on the move
    不详
    COMMUNICATIONS NEWS, 2002, 39 (07): : 10 - 10
  • [24] Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study
    Williams, Ryan
    Samtani, Sagar
    Patton, Mark
    Chen, Hsinchun
    2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 94 - 99
  • [25] PDAs and medicine
    OReilly, M
    CANADIAN MEDICAL ASSOCIATION JOURNAL, 2001, 165 (07) : 938 - 938
  • [26] PDAs for the head
    Falcioni, JG
    MECHANICAL ENGINEERING, 2004, 126 (07) : 4 - 4
  • [27] CREATING PROACTIVE CYBER THREAT INTELLIGENCE WITH HACKER EXPLOIT LABELS : A DEEP TRANSFER LEARNING APPROACH
    Ampel, Benjamin M.
    Samtani, Sagar
    Zhu, Hongyi
    Chen, Hsinchun
    MIS QUARTERLY, 2024, 48 (01) : 137 - 166
  • [28] THE REAL THREAT TO DEFENSE SPENDING NEXT YEAR
    CONNOLLY, R
    ELECTRONICS-US, 1981, 54 (24): : 50 - 50
  • [29] The next threat to grid reliability - Data security
    Jones, DA
    Skelton, RL
    IEEE SPECTRUM, 1999, 36 (06) : 46 - 48
  • [30] THE NEXT THREAT - REGIONAL NUCLEAR-WAR
    CLAUSEN, P
    NUCLEUS-CAMBRIDGE, 1990, 12 (02): : 1 - &