Search alternatives:
function attacking » functions attacking, function tracking, function making
attacking https » teaching https
computer https » computers https, computing https, computer arts
https function » its function, sites function, ups function
1
Published 2012
Table of Contents: ... of Drivers -- Attacks and Defenses -- Industrial Espionage and Targeted Attacks: Understanding...
View full text
Electronic eBook
2
Published 2015
Table of Contents: ... Application -- Chapter 8. Economic Load Dispatch considering non-smooth Cost Functions Using Predator Prey...
View full text
Electronic eBook
3
Subjects: ...Data encryption (Computer science)....
View full text
Electronic eBook
4
Published 2014
Table of Contents: ... -- Structural Biology of the Membrane Attack Complex -- Part III: Functional aspect --  Membrane Interactions...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ... Approach Using Burr’s Distribution Function for High Speed On-Chip RC Interconnects -- Wavelet-Domain L...
View full text
Electronic eBook
6
Published 2012
Table of Contents: ... -- Simultaneous Learning of Several Bayesian and Mahalanobis Discriminant Functions by a Neural Network...
View full text
Electronic eBook
7
Published 2014
Table of Contents: ... and Morphology -- Video Watermarking Scheme Resistant to Rotation and Collusion Attacks -- Development...
View full text
Electronic eBook
8
Published 2014
Table of Contents: ... in Pervasive Computing - Risk Probability Assessment Model -- CPU Load Based Countermeasure Technique...
View full text
Electronic eBook
9
Published 2015
Table of Contents: ... Dust Reinforced Epoxy Composite Using Grey Relational Analysis -- Weight Computation of Alternatives...
View full text
Electronic eBook
10
Published 2010
Table of Contents: ... -- InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services...
View full text
Electronic eBook
11
Published 2015
Table of Contents: ... Modelled with Complex Objects -- Chemistry-inspired Adaptive Stream Processing -- Computing Partial...
View full text
Electronic eBook
12
Published 2006
Table of Contents: ...RFID, e-ID Cards, Trusted Computing, Interoperability -- Radio Frequency Identification (RFID...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ...Computer Vision and Image Processing -- Earliest Computer Vision Systems in Poland -- VICAL: Visual...
View full text
Electronic eBook
14
Published 2014
Table of Contents: ...: A Literature Survey -- Detection of Web Based Attacks by Analyzing Web Server Log Files -- A Survey...
View full text
Electronic eBook
15
Published 2007
Table of Contents: ... Computation in Large Territories -- Non-equilibrium Thermodynamics, Thermomechanics, Geodynamics -- A Finite...
View full text
Electronic eBook
16
Published 2005
Table of Contents: ... Grid -- Session 1: Grid Computing -- CGSV: An Adaptable Stream-Integrated Grid Monitoring System...
View full text
Electronic eBook
17
Table of Contents: ...1 Introduction: Geomathematical Motivation -- Part I: Auxiliary Functions -- 2 The Gamma Function...
View full text
Electronic eBook
18
Published 2014
Table of Contents: ... on Instructions Statistics: Algorithm for Deciding Offload Function Set on Mobile Cloud System -- Improved...
View full text
Electronic eBook
19
Published 2006
Table of Contents: ... -- Forward Secure Communication in Wireless Sensor Networks -- Mechanisms -- Low Rate DoS Attack...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ...-the-Box Attacks -- Invited Tutorials -- Assertion-Based Verification: Industry Myths to Realities (Invited...
View full text
Electronic eBook