Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
developing complexity » development complexity, developing complex, exploring complexity
processing security » processing series
https developing » hits developing, steps developing, crops developing
developing complexity » development complexity, developing complex, exploring complexity
processing security » processing series
https developing » hits developing, steps developing, crops developing
1
New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC...
Published 2007
Table of Contents:
“... Distribution Process in South Africa -- Hard-drive Disposal and Identity Fraud -- An analysis of security...”View full text
Electronic
eBook
2
Published 2012
Subjects:
“...Complexity. https://scigraph.springernature.com/ontologies/product-market-codes/T11022...”View full text
Electronic
eBook
3
Published 2007
Table of Contents:
“... -- Wireless and Mobile Security -- Comparative Studies in Key Disagreement Correction Process on Wireless Key...”View full text
Electronic
eBook
4
Published 2006
Table of Contents:
“... Engineers -- The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware...”View full text
Electronic
eBook
5
Published 2015
Table of Contents:
“...Visionary Papers -- A Formal Broker Framework for Secure and Cost-Effective Business Process...”View full text
Electronic
eBook
6
Published 2011
Table of Contents:
“... -- Automation Tools Supporting the Development of Information Standards for Complex Systems -- Use of Structured...”View full text
Electronic
eBook
7
Subjects:
“...Algorithm Analysis and Problem Complexity. https://scigraph.springernature.com/ontologies/product...”
View full text
View full text
Electronic
eBook
8
Published 2010
Table of Contents:
“... of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean...”View full text
Electronic
eBook
9
Published 2014
Table of Contents:
“... – A Case in Air Traffic Management -- Supporting Security and Trust in Complex e-Government Services...”View full text
Electronic
eBook
10
Published 2006
Table of Contents:
“... -- Aspect-Oriented Risk Driven Development of Secure Applications -- From Business Process Choreography...”View full text
Electronic
eBook
11
Published 2013
Table of Contents:
“... AéroportésFIT -- Requirement management for complex systems, a critical element of the integration process...”View full text
Electronic
eBook
12
Published 2015
Table of Contents:
“... and Correlated Development of Vision, Strategies and Projects in Complex Environments.-20 Chaotic Interaction...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“...Kristian Beckman Award Awardee Keynote -- The 5 Waves of Information Security – From Kristian...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... Cryptanalysis of SOSEMANUK -- Security Management and Efficient Implementation -- Serial Model for Attack Tree...”View full text
Electronic
eBook
15
Published 2014
Table of Contents:
“... Relates to Functions -- Social Network Analysis Applied to Criminal Networks: Recent Developments in Dutch...”View full text
Electronic
eBook
16
Published 2010
Table of Contents:
“... Computations -- Complexity Issues in Automated Model Revision without Explicit Legitimate State -- Algorithmic...”View full text
Electronic
eBook
17
Published 2015
Table of Contents:
“...Mutation Testing Process Combined with Test-Driven Development in NET Environment -- Boltzmann...”View full text
Electronic
eBook
18
Published 2012
Table of Contents:
“... Behaviours iin Agent-Based Simulation: Colonic Crypt Cell Populations -- Developing a Complex Approach...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“... in Developing Countries Using Multimedia Technology -- Scheduling and Planning Software for Corrugation Process...”View full text
Electronic
eBook
20
Published 2005
Table of Contents:
“... and Algorithms -- Session 6C: Distributed Routing and Switching Protocols I -- Session 7A: Security I -- Session...”View full text
Electronic
eBook



