Active directory attacks—steps, types, and signatures
HIGHLIGHTS who: Basem Ibrahim Mokhtar and colleagues from the School of Information Technology and Computer Science, Nile University, Cairo, Egypt […]
HIGHLIGHTS who: Basem Ibrahim Mokhtar and colleagues from the School of Information Technology and Computer Science, Nile University, Cairo, Egypt […]
HIGHLIGHTS who: surface from the of Economics and, Shandong University of Science and Technology, Qingdao, China have published the paper:
HIGHLIGHTS who: Severine Koch from the Curtin University and University of Jyväskylä have published the research work: Running head: COMMON-SENSE
HIGHLIGHTS who: VIIRS. and collaborators from the GDP predictions comparable to that of NSO GDP figures, nightlight GDP figures could
HIGHLIGHTS who: Benoit Vozel and colleagues from the Engineering School of Applied Sciences and Technology, University of Rennes, Lannion, France
HIGHLIGHTS who: Chaofeng Li from the School of Management, South-Central University for Nationalities, Wuhan, China have published the Article: Data
HIGHLIGHTS who: Zhen-Yao Chen from the Department of Business Administration, Hungkuo Delin University of Technology, No1, Ln380, Qingyun Rd, Tucheng
HIGHLIGHTS who: Ilya V. Zhivetiev and Yury V. Yasyukevich from the America and Australia have published the paper: Network Theory
HIGHLIGHTS who: Kang Li and collaborators from the School of Economics and Management, Zhejiang University of Water Resources and Electric
HIGHLIGHTS who: Yanhong Ma from the School of Politics and International Relations, Tongji University, Shanghai, China have published the article: