481. |
Human Compatible: Artificial Intelligence and the Problem of Control |
Download |
482. |
Learning Analytics for Investigating the Mind Map-Guided AI Chatbot Approach in an EFL Flipped Speaking Classroom |
Download |
483. |
Methodology for Computer Security Incident Response Teams into IoT Strategy |
Download |
484. |
Modeling the Effect of Spending on Cyber Security by Using Surplus Process |
Download |
485. |
Operational Risk Management Using Multi-Criteria Assessment (AHP Model) |
Download |
486. |
Predicting rice diseases across diverse agro-meteorological conditions using an artificial intelligence approach |
Download |
487. |
Risk Management for New Products |
Download |
488. |
Risk Management in Prototyping Phase |
Download |
489. |
Risk Management in View of the Product Lifecycle |
Download |
490. |
Security Measurements of Cyber Networks |
Download |
491. |
Using a prediction model to manage cyber security threats |
Download |
492. |
Virtual Lab for Online Cyber Security Education |
Download |
493. |
Predicting fracture outcomes from clinical registry data using artificial intelligence supplemented models for evidence-informed treatment (PRAISE) study protocol |
Download |
494. |
Artificial intelligence on COVID-19 pneumonia detection using chest xray images |
Download |
495. |
Bringing artificial intelligence to asset-performance management |
Download |
496. |
Mapping technological innovation dynamics in artificial intelligence domains: Evidence from a global patent analysis |
Download |
497. |
Artificial intelligence in orthopaedics: A scoping review |
Download |
498. |
The Future of API (Application Programming Interface) Security: The Adoption of APIs for Digital Communications and the Implications for Cyber Security Vulnerabilities |
Download |
499. |
Using a prediction model to manage cyber security threats |
Download |
500. |
Cyber security: retaining the power |
Download |