Search Results - "exploitation"
Search alternatives:
-
1
-
2
Global landscape on exploitative leadership: a bilbiometric analysis
Published 2022Get full text
Get full text
Article -
3
-
4
Prevention Of Sexual Exploitation On Migrant Young Girls’ In Sabah
Published 2016Get full text
Get full text
Book Section -
5
-
6
-
7
-
8
-
9
Exploring financial exploitation of older persons in family setting
Published 2018Get full text
Get full text
Conference or Workshop Item -
10
Risk-ranking matrix for security patching of exploitable vulnerabilities
Published 2024Conference Paper -
11
Exploitation of national or local workers and the liability of the employer
Published 2013Get full text
Get full text
Book Chapter -
12
Strategic oscillation for exploitation and exploration of ACS algorithm for job scheduling in static grid computing
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A New Mobile Malware Classification for Camera Exploitation based on System Call and Permission
Published 2024Subjects:Proceedings Paper -
14
University keen to exploit Sibutis educational potential
Published 2012Get full text
Get full text
Get full text
Newspaper -
15
The decision making process for the exploitation of university patents through licensing to established companies and spin-off formations
Published 2008Get full text
Get full text
Conference or Workshop Item -
16
CallDetect: Detection of Call Log Exploitation Inspired by Apoptosis
Published 2024Subjects: “…Call Log Exploitation; API; Mobile Malware; Static Analysis; Apoptosis…”
Get full text
Article -
17
-
18
-
19
-
20
Patents Exploited through Spin-off Formation and Licensing to Established Companies: One University's Decision Making Process
Published 2008Get full text
Get full text
Conference or Workshop Item
