Search

Your search keyword '"George Markowsky"' showing total 78 results

Search Constraints

Start Over You searched for: Author "George Markowsky" Remove constraint Author: "George Markowsky" Database OpenAIRE Remove constraint Database: OpenAIRE
78 results on '"George Markowsky"'

Search Results

1. BOTNET DETECTION APPROACH BASED ON THE DISTRIBUTED SYSTEMS

5. Botnet Detection Approach for the Distributed Systems

6. Lattice Data Analytics: The Poset of Irreducibles and the MacNeille Completion

7. Distributed Malware Detection System Based on Decentralized Architecture in Local Area Networks

8. Distributed System for Detecting the Malware in LAN

9. The problem of interceptor top level domains revisited

10. THE TERNOPIL EDUCATIONAL COMMUNICATION CENTER: A NATO PROJECT TO INTEGRATE REGIONAL INFORMATION TECHNOLOGY RESOURCES

11. SMART LICENSE PLATE RECOGNITION SYSTEM BASED ON IMAGE PROCESSING USING NEURAL NETWORK

12. The Sad History of Random Bits

13. Commentary: The State of Learning: A Preview

14. Security network interface for alarm systems

15. Producing and evaluating crowdsourced computer security attack trees

16. The problem of interceptor top level domains

17. Scanning for vulnerable devices in the Internet of Things

18. Crowdsourcing, big data and homeland security

19. An introduction to algorithmic information theory

20. Adapting American ERP systems for China: Cross-cultural issues and a case study

21. Was the 2006 Debian SSL Debacle a system accident?

22. Universal asset assessment system based on excel™

23. Phage typing sets

24. Misconceptions about the Golden Ratio

25. Primes, irreducibles and extremal lattices

26. Data communication crypto protocol for security systems sensor networks

27. Comparing apples and oranges how to select the most probable targets

28. Bounding fault detection probabilities in combinational circuits

29. Genetic algorithm implementation for distributed security systems optimization

30. Network Capable Application Processor Based on a FPGA

31. First American-Ukrainian School of Computer Sciences and Technologies: Reality and Perspective

32. A Low-Cost Network Controller for Security Systems

33. Detection of Unauthorized Intrusion into Cargo Containers that are under Custom Seals

34. A Distributed Approach to the Recognition of Geographically Located IP Devices

35. Distributed traceroute approach to geographically loocating IP devices

39. Necessary and sufficient conditions for a phenotype system to have a factor-union representation

40. Phage typing set for differentiating Staphylococcus epidermidis

41. A fast algorithm for Steiner trees

42. A mathematical analysis of human leukocyte antigen serology

43. An Evaluation of Local Path ID Swapping in Computer Networks

44. Subprojective lattices and projective geometry

46. The factorization and representation of lattices

47. On Dedekind’s problem: the number of isotone Boolean functions. II

48. Mathematical immunogenetics II antibody incidence structure

49. Best Huffman trees

50. Fleshing Out Projections

Catalog

Books, media, physical & digital resources