Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,508,240 papers from all fields of science
Search
Sign In
Create Free Account
Pterostichus fenyesi fenderi
Known as:
Pterostichus (Leptoferonia) fenyesi fenderi
, Pterostichus fenyesi fenderi Hacker
National Institutes of Health
Create Alert
Alert
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Contribution to the knowledge of the Nolini of the Maputo Special Reserve in South Mozambique with description of two new species and several taxonomic updates (Lepidoptera, Nolidae, Nolinae).
G. László
,
Alvaro A. Vetina
Zootaxa
2019
Corpus ID: 108845951
Present paper contains the first comprehensive summary of the Nolini species of the Maputo Special Reserve collected between…
Expand
2015
2015
Fire increases ant-tending and survival of the Fender’s blue butterfly larvae
Norah Warchola
,
C. Bastianelli
,
C. Schultz
,
E. Crone
Journal of Insect Conservation
2015
Corpus ID: 16335032
Studies of fire as a management tool often focus on how fire alters microclimate and affects plant quality. While these processes…
Expand
2014
2014
ETHICAL HACKING : TYPES OF ETHICAL HACKERS
V. Chandrika
2014
Corpus ID: 56426891
an ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities…
Expand
2013
2013
Produção cultural e compartilhamento de saberes em rede: entraves e possibilidades para a cultura e a educação
N. Pretto
,
S. D. F. Cordeiro
,
Washington dos Santos Oliveira
2013
Corpus ID: 143854057
This paper analyses the emergence and growth of digitally networked spaces of social production and examines how such spaces…
Expand
2010
2010
How can contributors to open-source communities be trusted? On the assumption, inference, and substitution of trust
P. D. Laat
Ethics and Information Technology
2010
Corpus ID: 32040243
Open-source communities that focus on content rely squarely on the contributions of invisible strangers in cyberspace. How do…
Expand
2010
2010
Mengganyang Hacker dengan SNORT
Rahmat Rafiudin
2010
Corpus ID: 70143186
2007
2007
Exotic grass invasion impacts fitness of an endangered prairie butterfly, Icaricia icarioides fenderi
P. Severns
Journal of Insect Conservation
2007
Corpus ID: 43999579
Fender’s blue butterfly is an endangered species restricted to fragmented, grassland remnants that are becoming increasingly…
Expand
Review
2003
Review
2003
Firewalls and internet security: Repelling the wily hacker, 2nd ed. [Book Review]
R. Mateosian
IEEE Micro
2003
Corpus ID: 40411658
General Interest How the Internet Works, 7th ed., Preston Gralla (Que, 2004, 368 pp., ISBN 0-78972973-3, $29.99; www…
Expand
Highly Cited
1999
Highly Cited
1999
Nectar and hostplant scarcity limit populations of an endangered Oregon butterfly
C. Schultz
,
K. Dlugosch
Oecologia
1999
Corpus ID: 2364623
Abstract As grassland habitats become degraded, declines in juvenile and adult food resources may limit populations of rare…
Expand
1988
1988
STALKING THE WILY HACKER An astronomer-turned-sleuth traces a German trespasser on our military networks, who slipped through operating system security holes and browsed through sensitive databases…
C. Stoll
1988
Corpus ID: 112126029
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE