| 481. |
Human Compatible: Artificial Intelligence and the Problem of Control |
Download |
| 482. |
Learning Analytics for Investigating the Mind Map-Guided AI Chatbot Approach in an EFL Flipped Speaking Classroom |
Download |
| 483. |
Methodology for Computer Security Incident Response Teams into IoT Strategy |
Download |
| 484. |
Modeling the Effect of Spending on Cyber Security by Using Surplus Process |
Download |
| 485. |
Operational Risk Management Using Multi-Criteria Assessment (AHP Model) |
Download |
| 486. |
Predicting rice diseases across diverse agro-meteorological conditions using an artificial intelligence approach |
Download |
| 487. |
Risk Management for New Products |
Download |
| 488. |
Risk Management in Prototyping Phase |
Download |
| 489. |
Risk Management in View of the Product Lifecycle |
Download |
| 490. |
Security Measurements of Cyber Networks |
Download |
| 491. |
Using a prediction model to manage cyber security threats |
Download |
| 492. |
Virtual Lab for Online Cyber Security Education |
Download |
| 493. |
Predicting fracture outcomes from clinical registry data using artificial intelligence supplemented models for evidence-informed treatment (PRAISE) study protocol |
Download |
| 494. |
Artificial intelligence on COVID-19 pneumonia detection using chest xray images |
Download |
| 495. |
Bringing artificial intelligence to asset-performance management |
Download |
| 496. |
Mapping technological innovation dynamics in artificial intelligence domains: Evidence from a global patent analysis |
Download |
| 497. |
Artificial intelligence in orthopaedics: A scoping review |
Download |
| 498. |
The Future of API (Application Programming Interface) Security: The Adoption of APIs for Digital Communications and the Implications for Cyber Security Vulnerabilities |
Download |
| 499. |
Using a prediction model to manage cyber security threats |
Download |
| 500. |
Cyber security: retaining the power |
Download |