|
|
|
Eva Maia, Norberto Sousa, Nuno Oliveira, Sinan Wannous, Orlando Sousa and Isabel Praça
Critical infrastructures are an attractive target for attackers, mainly due to the catastrophic impact of these attacks on society. In addition, the cyber?physical nature of these infrastructures makes them more vulnerable to cyber?physical threats and m...
ver más
|
|
|
|
|
|
Tori Tomiczek, Elizabeth J. Sciaudone, Liliana Velásquez-Montoya, Elizabeth Smyre, Anna Wargula, Kelly Fawcett and Joshua Torres
Coastal highways along narrow barrier islands are vulnerable to flooding due to ocean and bay-side events, which create hazardous travel conditions and may restrict access to surrounding communities. This study investigates the vulnerability of a segment...
ver más
|
|
|
|
|
|
Nikola Andelic, Sandi Baressi ?egota, Ivan Lorencin and Matko Glucina
Malicious websites are web locations that attempt to install malware, which is the general term for anything that will cause problems in computer operation, gather confidential information, or gain total control over the computer. In this paper, a novel ...
ver más
|
|
|
|
|
|
Hammad Tariq Janjuhah, George Kontakiotis, Abdul Wahid, Dost Muhammad Khan, Stergios D. Zarkogiannis and Assimina Antonarakou
The pore system in carbonates is complicated because of the associated biological and chemical activity. Secondary porosity, on the other hand, is the result of chemical reactions that occur during diagenetic processes. A thorough understanding of the ca...
ver más
|
|
|
|
|
|
Alessandro Crivellari and Alina Ristea
The traditional categorization of crime types relies on a hierarchical structure, from high-level categories to lower-level subtypes. This tree-based classification treats crime types as mutually independent when they do not branch from the same higher-l...
ver más
|
|
|