64 results
Circular agriculture practices enhance phosphorus recovery for large-scale commercial farms under tropical conditions
-
- Journal:
- The Journal of Agricultural Science / Volume 161 / Issue 6 / December 2023
- Published online by Cambridge University Press:
- 08 January 2024, pp. 763-777
-
- Article
-
- You have access
- Open access
- HTML
- Export citation
Maternal protein restriction during the lactation period disrupts the ontogenetic development of behavioral traits in male Wistar rat offspring
-
- Journal:
- Journal of Developmental Origins of Health and Disease / Volume 14 / Issue 3 / June 2023
- Published online by Cambridge University Press:
- 26 April 2023, pp. 341-352
-
- Article
- Export citation
Quantitative effects of environmental variation on stomatal anatomy and gas exchange in a grass model
-
- Journal:
- Quantitative Plant Biology / Volume 3 / 2022
- Published online by Cambridge University Press:
- 09 March 2022, e6
-
- Article
-
- You have access
- Open access
- HTML
- Export citation
High spectral resolution multi-tone Spacecraft Doppler tracking software: Algorithms and implementations
- Part of
-
- Journal:
- Publications of the Astronomical Society of Australia / Volume 38 / 2021
- Published online by Cambridge University Press:
- 17 December 2021, e065
-
- Article
-
- You have access
- HTML
- Export citation
Mapping mental healthcare professionals’ journey towards digital mental health adoption: A qualitative study
-
- Journal:
- European Psychiatry / Volume 64 / Issue S1 / April 2021
- Published online by Cambridge University Press:
- 13 August 2021, p. S348
-
- Article
-
- You have access
- Open access
- Export citation
Preface
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp xi-xii
-
- Chapter
- Export citation
Part I - Understanding the Behavior of Malicious Hackers
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 15-16
-
- Chapter
- Export citation
9 - Finding At-Risk Systems without Software Vulnerability Identifiers (CVEs)
- from Part II - Predicting Imminent Cyber-Threats
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 163-182
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp i-iv
-
- Chapter
- Export citation
4 - Reasoning about Hacker Engagement
- from Part I - Understanding the Behavior of Malicious Hackers
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 43-59
-
- Chapter
- Export citation
10 - Final Considerations
- from Part II - Predicting Imminent Cyber-Threats
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 183-188
-
- Chapter
- Export citation
5 - Uncovering Communities of Malware and Exploit Vendors
- from Part I - Understanding the Behavior of Malicious Hackers
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 60-74
-
- Chapter
- Export citation
1 - Introduction
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 1-5
-
- Chapter
- Export citation
Foreword
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp ix-x
-
- Chapter
- Export citation
3 - Mining Key-hackers
- from Part I - Understanding the Behavior of Malicious Hackers
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 17-42
-
- Chapter
- Export citation
References
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 189-202
-
- Chapter
- Export citation
2 - Background
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 6-14
-
- Chapter
- Export citation
Index
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 203-212
-
- Chapter
- Export citation
8 - Bringing Social Network Analysis to Aid in Cyber-attack Prediction
- from Part II - Predicting Imminent Cyber-Threats
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 127-162
-
- Chapter
- Export citation
6 - Identifying Exploits in theWild Proactively
- from Part II - Predicting Imminent Cyber-Threats
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 77-107
-
- Chapter
- Export citation