Search Results - (severity OR security)

  1. Phenotypic scoring of canola blackleg severity using machine learning image analysis

    Published in Plant Phenome Journal (2026)
    Get full text
    Online Article RSS Article
  2. Implicit security requirements classification with large language models using the OWASP application security verification standard: a shift-left approach

    Published in EMSE (2026)
    Get full text
    Online Article RSS Article
  3. Forests and national security in Nigeria: an evaluation of the symboisis and challenges

    Published 2017-06
    Subjects: “…National security,…”
    Full Text Available
    Access Repository
    Conference Proceeding
  4. Chaotic Secure Communication Schemes employing Chua's Circuit

    Published 2010
    Full Text Available
    Access Repository
    Conference Proceeding
  5. Chaotic secure communication schemes employing Chua's Circuit

    Published 2010
    Full Text Available
    Access Repository
    Conference Proceeding
  6. Chaotic Behaviours in Dynamical Systems with Application to Secure Communication

    Published 2012
    Full Text Available
    Access Repository
    Article
  7. Community partnership approach to internal security and crime management

    Published 2015
    Full Text Available
    Access Repository
    Article
  8. Survey of security challenges in university libraries in Southwest Nigeria

    Published 2013
    Full Text Available
    Access Repository
    Article
  9. The Investment and Securities Act 1999 as an Instrument for Investment Protection

    Published 2006
    Full Text Available
    Access Repository
    Article
  10. Jailbreak recurrence as a new security threat in Nigeria

    Published 2019-07
    Subjects: “…National Security…”
    Full Text Available
    Access Repository
    Article
  11. School security in the context of increasing national insecurity in Nigeria

    Published 2013
    Full Text Available
    Access Repository
    Book
  12. The armed forces and security management in Nigeria, 1999 – 2014

    Published 2016
    Full Text Available
    Access Repository
    Book
  13. Cattle rustling, herdsmen violence and national security in Nigeria

    Published 2017
    Full Text Available
    Access Repository
    Book
  14. Democratic security sector governance and military reform in Nigeria

    Published 2015
    Full Text Available
    Access Repository
    Book
  15. Generalized Secure Superchannels: A Signal Encryption Framework

    Published in IEEE Access (2026)
    Get full text
    Online Article RSS Article
  16. The Need for Cloud Security in a Modern Business Environment

    Published in Linux Journal (2026)
    Get full text
    Online Article RSS Article
  17. The Secure GPS Tracking Data for transportation in Distributed Environments

    Get full text
    Online Article RSS Article
  18. The Secure Metric Dimension of the Globe Graph and the Flag Graph

    Published in Advances in Operations Research (2024)
    Get full text
    Online Article RSS Article
  19. Consequences of increased farm resilience on food security in Tajikistan

    Published in Food Security (2026)
    Get full text
    Online Article RSS Article
  20. Securing the Future of Books: A Collaborative Guide to Preservation

    Published in Learned Publishing (2026)
    Get full text
    Online Article RSS Article