Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
dimension exploiting » dimension exploring, extensions exploiting, design exploiting
detection exploiting » extraction exploiting, detection evaluating, restoration exploiting
communication from » communication fast
dimension exploiting » dimension exploring, extensions exploiting, design exploiting
detection exploiting » extraction exploiting, detection evaluating, restoration exploiting
communication from » communication fast
1
Published 2015
Table of Contents:
“... and Exploiting the Cyber High Ground with Botnets -- Attribution, Temptation, and Expectation: A Formal Framework...”View full text
Electronic
eBook
2
Published 2008
Table of Contents:
“... -- Forensic Web Services -- Detecting Remote Exploits Using Data Mining -- Portable Electronic Device...”View full text
Electronic
eBook
3
Published 2008
Table of Contents:
“... -- Identifying and Exploiting Group Learning Patterns for Counterterrorism -- Homeland Insecurity -- Terrorism...”View full text
Electronic
eBook
4
Published 2005
Table of Contents:
“... and the Intrusion of Non-linguistic Communication into Utterances -- Mobile Phone Talk in Context -- Unsupervised...”View full text
Electronic
eBook
5
Published 2013
Table of Contents:
“... Allocation of High Dimensional Assets through Canonical Vines -- Inducing Context Gazetteers from...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“..., Time, and Agents -- Benefits of Constrained Interactivity in Using a Three-Dimensional Diagram -- A...”View full text
Electronic
eBook
7
Published 2014
Table of Contents:
“... Annealing Method -- A Single Curve Piecewise Fitting Method for Detecting Valve Stiction and Quantification...”View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... Classification -- On Optimization of Coefficient-Sensitivity and State-Structure for Two Dimensional (2-D...”View full text
Electronic
eBook



