34 results on '"George Markowsky"'
Search Results
2. The Budget Theorem and the Russo-Ukrainian War.
3. State-based Sandbox Tool for Distributed Malware Detection with Avoid Techniques.
4. Lattice-Based Technique to Visualize and Compare Regional Terrorism Using the Global Terrorism Database.
5. Lanchester's Equations and Cyberwarfare.
6. Detection DNS Tunneling Botnets.
7. Proof-of-Activity Consensus Protocol Based on a Network's Active Nodes Indication.
8. Botnet Detection Approach for the Distributed Systems.
9. Lattice Data Analytics: The Poset of Irreducibles and the MacNeille Completion.
10. The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis.
11. Distributed Malware Detection System Based on Decentralized Architecture in Local Area Networks.
12. Distributed System for Detecting the Malware in LAN.
13. The problem of interceptor top level domains revisited.
14. The problem of interceptor top level domains.
15. Scanning for vulnerable devices in the Internet of Things.
16. Was the 2006 Debian SSL Debacle a system accident?
17. Adapting American ERP systems for China: Cross-cultural issues and a case study.
18. Universal asset assessment system based on excel™.
19. Evolutionary dynamics of revolution: Opinion modeling in society based on graphs and rules.
20. High School Cyber Defense Competitions: Lessons from the Trenches.
21. Consumer Guide to Online Cybersecurity Resources: UMCEG.
22. Security Tools for GRID- Systems.
23. Survey of Supercomputer Cluster Security Issues.
24. RF Eavesdropping Beowulf Clusters.
25. Database design for CAD system optimising distributed sensor networks for perimeter security.
26. Learning Probabilistic Prediction Functions.
27. Learning Probabilistic Prediction Functions (Extended Abstract)
28. Bases for Chain-Complete Posets
29. VLSI Self-Testing Based on Syndrome Techniques.
30. Exact and Approximate Membership Testers
31. Analysis of a Universal Class of Hash Functions.
32. Digital Forensics and Cyber Crime - 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings
33. Digital Forensics and Cyber Crime - 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings
34. Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.