Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
function attacking » functions attacking, function tracking, function making
attacking https » teaching https
computer https » computers https, computing https, computer arts
https function » its function, sites function, ups function
function attacking » functions attacking, function tracking, function making
attacking https » teaching https
computer https » computers https, computing https, computer arts
https function » its function, sites function, ups function
1
Published 2012
Table of Contents:
“... of Drivers -- Attacks and Defenses -- Industrial Espionage and Targeted Attacks: Understanding...”View full text
Electronic
eBook
2
Published 2015
Table of Contents:
“... Application -- Chapter 8. Economic Load Dispatch considering non-smooth Cost Functions Using Predator Prey...”View full text
Electronic
eBook
3
by Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Published 2014
Subjects:
“...Data encryption (Computer science)....”Published 2014
View full text
Electronic
eBook
4
Published 2014
Table of Contents:
“... -- Structural Biology of the Membrane Attack Complex -- Part III: Functional aspect -- Membrane Interactions...”View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“... Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects -- Wavelet-Domain L...”View full text
Electronic
eBook
6
Published 2012
Table of Contents:
“... -- Simultaneous Learning of Several Bayesian and Mahalanobis Discriminant Functions by a Neural Network...”View full text
Electronic
eBook
7
Published 2014
Table of Contents:
“... and Morphology -- Video Watermarking Scheme Resistant to Rotation and Collusion Attacks -- Development...”View full text
Electronic
eBook
8
Published 2014
Table of Contents:
“... in Pervasive Computing - Risk Probability Assessment Model -- CPU Load Based Countermeasure Technique...”View full text
Electronic
eBook
9
Published 2015
Table of Contents:
“... Dust Reinforced Epoxy Composite Using Grey Relational Analysis -- Weight Computation of Alternatives...”View full text
Electronic
eBook
10
Published 2010
Table of Contents:
“... -- InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services...”View full text
Electronic
eBook
11
Published 2015
Table of Contents:
“... Modelled with Complex Objects -- Chemistry-inspired Adaptive Stream Processing -- Computing Partial...”View full text
Electronic
eBook
12
Published 2006
Table of Contents:
“...RFID, e-ID Cards, Trusted Computing, Interoperability -- Radio Frequency Identification (RFID...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“...Computer Vision and Image Processing -- Earliest Computer Vision Systems in Poland -- VICAL: Visual...”View full text
Electronic
eBook
14
Published 2014
Table of Contents:
“...: A Literature Survey -- Detection of Web Based Attacks by Analyzing Web Server Log Files -- A Survey...”View full text
Electronic
eBook
15
Published 2007
Table of Contents:
“... Computation in Large Territories -- Non-equilibrium Thermodynamics, Thermomechanics, Geodynamics -- A Finite...”View full text
Electronic
eBook
16
Published 2005
Table of Contents:
“... Grid -- Session 1: Grid Computing -- CGSV: An Adaptable Stream-Integrated Grid Monitoring System...”View full text
Electronic
eBook
17
Table of Contents:
“...1 Introduction: Geomathematical Motivation -- Part I: Auxiliary Functions -- 2 The Gamma Function...”
View full text
View full text
Electronic
eBook
18
Published 2014
Table of Contents:
“... on Instructions Statistics: Algorithm for Deciding Offload Function Set on Mobile Cloud System -- Improved...”View full text
Electronic
eBook
19
Published 2006
Table of Contents:
“... -- Forward Secure Communication in Wireless Sensor Networks -- Mechanisms -- Low Rate DoS Attack...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“...-the-Box Attacks -- Invited Tutorials -- Assertion-Based Verification: Industry Myths to Realities (Invited...”View full text
Electronic
eBook



