총 239건 중 239건 출력
, 8/24 페이지
-
71
-
Respite reconsidered : A typology of meanings based on the caregiver's point of view
-
Chappell, Neena L;
Reid, R.Colin;
Dow, Elizabeth;
Department of Sociology, Centre on Aging, University of Victoria, Room 104, A Wing, Sedgewick Building, P.O. Box 1700 STN CSC, Victoria, BC, Canada V8W 2Y2;
Department of Sociology, Centre on Aging, University of Victoria, Room 104, A Wing, Sedgewick Building, P.O. Box 1700 STN CSC, Victoria, BC, Canada V8W 2Y2;
School of Social Work, Memorial University of Newfoundland, St. John's, NF, Canada A1C 5S7;
(Journal of aging studies,
v.15,
2001,
pp.201-216)
-
72
-
RAE-SVM based Webpage Tamper-Resistant Detection Algorithm
-
Changjian Zhou;
Yutong Zhang;
Yunfu Liang;
Jinge Xing;
Department of Modern Educational Technology, Northeast Agricultural University;
College of electrical & information, Northeast Agricultural University;
Department of Modern Educational Technology, Northeast Agricultural University;
Department of Modern Educational Technology, Northeast Agricultural University;
(Journal of information processing systems,
v.21,
2025,
pp.1-12)
-
73
-
Credit Card Fraud Detection using Big Data Technologies
-
Lokesh;
Rushikesh;
Vaishnavi;
Prof. Sarika Aundhakar;
Smt. Kashibai Navale College of Engineering, Pune, Maharashtra, India;
Smt. Kashibai Navale College of Engineering, Pune, Maharashtra, India;
Smt. Kashibai Navale College of Engineering, Pune, Maharashtra, India;
Smt. Kashibai Navale College of Engineering, Pune, Maharashtra, India;
(International Journal of Advanced Research in Science, Communication and Technology,
v.,
2023,
pp.783-786)
-
74
-
Stealing styles
-
Haensler, Philippe Pascal;
University of Zurich, Zurich, Switzerland;
(Orbis litterarum,
v.74,
2019,
pp.173-190)
-
75
-
Information Transmission Scheme between Train and RBC Based on AES-ECC Algorithm
-
Junjie, Zhang;
Yunshui, Zheng;
;
(Journal of physics. Conference series,
v.1986,
2021,
pp.012120)
-
76
-
Escape from the dead letter office
-
Lorenz, Johnny;
;
(Interventions : international journal of postcolonial studies,
v.7,
2005,
pp.72-83)
-
77
-
Economic Espionage: Security Missions Redefined
-
Fraumann, Edwin;
;
(Public administration review,
v.57,
1997,
pp.303)
-
78
-
BogusBiter : A transparent protection against phishing attacks
-
Yue, Chuan;
Wang, Haining;
College of William and Mary, Williamsburg, VA;
College of William and Mary, Williamsburg, VA;
(ACM transactions on Internet technology,
v.10,
2010,
pp.1-31)
-
79
-
PAPDroid: Personalization Awareness Privacy Protection in Android
-
Hongliang Liang;
Dongyang Wu;
Yan Song;
Daijie Zhang;
Lingqing Xia;
;
(Identification, Information, and Knowledge in the Internet of Things (IIKI), 2015 International Conference on,
v.2015,
2015,
pp.122-125)
-
80
-
Sentencing for the offence of misappropriation of public funds: the flawed and problematic approach of Cameroon’s Special Criminal Court
-
Agbor, Avitus Agbor;
;
(Journal of financial crime,
v.31,
2024,
pp.427-445)