-
301
-
302
Detection of Web Command Injection Vulnerability for Cisco IOS-XE
Published 2023-04-01Subjects: “…cisco ios-xe|web service|command injection|vulnerability detection|fuzzing…”
Get full text
Article -
303
Research on rules design of human-machine command countermeasure system
Published 2023-04-01“…In view of the shortcomings of the existing human-machine command countermeasure system in the design research of the rules, according to the typical structure of human-machine command countermeasure system and rule reasoning operation mechanism, and the requirements of the rules of human-machine command countermeasure system are proposed. …”
Get full text
Article -
304
No second-in-command: human fatigue and the crash of the airship Italia revisited
Published 2019-12-01“…In this paper, the pivotal question of why General Nobile was so sleep-deprived at the time of the accident is addressed, specifically with reference to the lack of a second-in-command (i.e., a deputy commander) during the flight. …”
Get full text
Article -
305
Presenting the Law: Text and Imagery on Dutch Ten Commandments Panels
Published 2018-07-01Subjects: “…Ten Commandments panels…”
Get full text
Article -
306
STYLISTIC ANALYSIS OF ENGLISH IMPERATIVE COMMAND MOOD TRANSFER TO JAVANESE
Published 2019-04-01“…This is a comparative study highlighting difference and similarity visualized by Javanese and English pitch contours with similar semantic meaning to be analyzed in pragmatics stylistic framework. Imperative to Command (IC) cannot take place in Bottom-Up situation in Javanese for social reason which puts Imperative to Request (IR) and Imperative to Invite (II) as substitutions. …”
Get full text
Article -
307
A scalable and extensible command training exam system architecture
Published 2023-10-01“…In view of the problems existing in the current exam system, such as separation from the command information system and difficulty in carrying out remote group training, a scalable and extensible command training exam system architecture is proposed to provide technical support for integrating and invoking the relevant components of the command information system and carrying out large-scale group training. …”
Get full text
Article -
308
Creation of the spacecraft’s command-and-measurement system’s heterogeneous simulation model
Published 2020-09-01Subjects: Get full text
Article -
309
Command responsibility of autonomous weapons under international humanitarian law
Published 2022-12-01Subjects: Get full text
Article -
310
C-command constraints in German: A corpus-based investigation
Published 2022-11-01Subjects: “…c-command…”
Get full text
Article -
311
Museums as conflict zones: the Canadian War Museum and Bomber Command
Published 2009-03-01Get full text
Article -
312
Central command: Feedforward control of the sympathoadrenal system during exercise
Published 2012-12-01Subjects: “…central command…”
Get full text
Article -
313
The need to exploit the joint command and control system in the armed forces
Published 2018-11-01Subjects: “…joint command and control…”
Get full text
Article -
314
Counting addressing method: Command addressable element and extinguishing module
Published 2009-01-01Subjects: Get full text
Article -
315
Adaptation of the NATO command chain to new challenges, risks and threats
Published 2019-01-01Get full text
Article -
316
Information technology system to promote drug production command supervision
Published 2024-01-01“…This paper applies the information system to promote the command and control of drug production to the quality control of the drug production process. …”
Get full text
Article -
317
Mordo2: A Personalization Framework for Silent Command Recognition
Published 2024-01-01Subjects: Get full text
Article -
318
GSD: An SPSS extension command for sub-sampling and bootstrapping datasets
Published 2016-09-01Get full text
Article -
319
-
320
Commander Complex—A Multifaceted Operator in Intracellular Signaling and Cargo
Published 2021-12-01Subjects: “…commander complex…”
Get full text
Article