|
|
|
Karolína Bílá
We attempt here to review recent studies focusing on droughts and hydrology in the ?umava Mts. The main question is can bark beetles affect water regimes in forest and what kind of measures might be taken ? if any ? to prevent bark beetle attacks. We com...
ver más
|
|
|
|
|
|
|
Zvi Mendel, Hillary Voet, Ilan Nazarian, Svetlana Dobrinin and Dana Ment
The red palm weevil (Rhynchophorus ferrugineus) inflicts widespread damage in date palm plantations and urban settings, leading to stand loss and safety concerns, intensified by the economic and ecological burdens of synthetic preventive treatments. A no...
ver más
|
|
|
|
|
|
|
Sara Palacios Chavarro, Pantaleone Nespoli, Daniel Díaz-López and Yury Niño Roa
Software is behind the technological solutions that deliver many services to our society, which means that software security should not be considered a desirable feature anymore but more of a necessity. Protection of software is an endless labor that inc...
ver más
|
|
|
|
|
|
|
Jeremy Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite and Siraj Ahmed Shaikh
Systems that integrate cyber and physical aspects to create cyber-physical systems (CPS) are becoming increasingly complex, but demonstrating the security of CPS is hard and security is frequently compromised. These compromises can lead to safety failure...
ver más
|
|
|
|
|
|
|
Mantas Bacevicius and Agne Paulauskaite-Taraseviciene
Various machine learning algorithms have been applied to network intrusion classification problems, including both binary and multi-class classifications. Despite the existence of numerous studies involving unbalanced network intrusion datasets, such as ...
ver más
|
|
|
|
|
|
|
|
Hillary S. Jenkins
The ponderosa pine (Pinus ponderosa, Douglas ex C. Lawson) is a climate-sensitive tree species dominant in the mixed conifer stands of the San Bernardino Mountains of California. However, the close proximity to the city of Los Angeles has resulted in ext...
ver más
|
|
|
|
|
|
|
Donatas Vitkus, Jonathan Salter, Nikolaj Goranin and Dainius Ceponis
This paper proposes a novel approach of knowledge base formation for expert systems, dedicated to IT security risk analysis, using attack trees as a source of information. Automating the conversion of attack trees to a format that expert systems can use ...
ver más
|
|
|
|
|
|
|
Antoine Rauzy and Liu Yang
In this article, we propose decision diagram algorithms to extract minimal cutsets of finite degradation models. Finite degradation models generalize and unify combinatorial models used to support probabilistic risk, reliability and safety analyses (faul...
ver más
|
|
|
|
|
|
|
Lorraine Maclauchlan
The impact of mountain pine beetle, Dendroctonus ponderosae Hopkins (Coleoptera: Scolytinae), is the most significant source of mortality of mature pine forests in western North America; however, in 2003-2004, high levels of mortality were observed in yo...
ver más
|
|
|
|