| 481. | 
Human Compatible: Artificial Intelligence and the Problem of Control | 
Download | 
| 482. | 
Learning Analytics for Investigating the Mind Map-Guided AI Chatbot Approach in an EFL Flipped Speaking Classroom | 
Download | 
| 483. | 
Methodology for Computer Security Incident Response Teams into IoT Strategy | 
Download | 
| 484. | 
Modeling the Effect of Spending on Cyber Security by Using Surplus Process | 
Download | 
| 485. | 
Operational Risk Management Using Multi-Criteria Assessment (AHP Model) | 
Download | 
| 486. | 
Predicting rice diseases across diverse agro-meteorological conditions using an artificial intelligence approach | 
Download | 
| 487. | 
Risk Management for New Products | 
Download | 
| 488. | 
Risk Management in Prototyping Phase | 
Download | 
| 489. | 
Risk Management in View of the Product Lifecycle | 
Download | 
| 490. | 
Security Measurements of Cyber Networks | 
Download | 
| 491. | 
Using a prediction model to manage cyber security threats | 
Download | 
| 492. | 
Virtual Lab for Online Cyber Security Education | 
Download | 
| 493. | 
Predicting fracture outcomes from clinical registry data using artificial intelligence supplemented models for evidence-informed treatment (PRAISE) study protocol | 
Download | 
| 494. | 
Artificial intelligence on COVID-19 pneumonia detection using chest xray images | 
Download | 
| 495. | 
Bringing artificial intelligence to asset-performance management | 
Download | 
| 496. | 
Mapping technological innovation dynamics in artificial intelligence domains: Evidence from a global patent analysis | 
Download | 
| 497. | 
Artificial intelligence in orthopaedics: A scoping review | 
Download | 
| 498. | 
The Future of API (Application Programming Interface) Security: The Adoption of APIs for Digital Communications and the Implications for Cyber Security Vulnerabilities | 
Download | 
| 499. | 
Using a prediction model to manage cyber security threats | 
Download | 
| 500. | 
Cyber security: retaining the power | 
Download |