135 results on '"George Markowsky"'
Search Results
2. The Budget Theorem and the Russo-Ukrainian War.
3. State-based Sandbox Tool for Distributed Malware Detection with Avoid Techniques.
4. Lattice-Based Technique to Visualize and Compare Regional Terrorism Using the Global Terrorism Database.
5. Lanchester's Equations and Cyberwarfare.
6. Detection DNS Tunneling Botnets.
7. Proof-of-Activity Consensus Protocol Based on a Network's Active Nodes Indication.
8. Botnet Detection Approach for the Distributed Systems.
9. Lattice Data Analytics: The Poset of Irreducibles and the MacNeille Completion.
10. Botnet Detection Approach based on the Distributed Systems.
11. The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis.
12. Distributed Malware Detection System Based on Decentralized Architecture in Local Area Networks.
13. Distributed System for Detecting the Malware in LAN.
14. The problem of interceptor top level domains revisited.
15. The problem of interceptor top level domains.
16. Scanning for vulnerable devices in the Internet of Things.
17. Was the 2006 Debian SSL Debacle a system accident?
18. Adapting American ERP systems for China: Cross-cultural issues and a case study.
19. Universal asset assessment system based on excel™.
20. Evolutionary dynamics of revolution: Opinion modeling in society based on graphs and rules.
21. High School Cyber Defense Competitions: Lessons from the Trenches.
22. Consumer Guide to Online Cybersecurity Resources: UMCEG.
23. The Sad History of Random Bits.
24. Security Tools for GRID- Systems.
25. Survey of Supercomputer Cluster Security Issues.
26. RF Eavesdropping Beowulf Clusters.
27. Database design for CAD system optimising distributed sensor networks for perimeter security.
28. Security network interface for alarm systems.
29. BOTNET DETECTION APPROACH BASED ON THE DISTRIBUTED SYSTEMS
30. The Ternopil Educational Communication Center: a NATO Project to Integrate Regional Information Technology Resources.
31. Smart License plate Recognition System based on Image Processing using Neural Network.
32. An introduction to algorithmic information theory.
33. Introduction To Algorithmic Information Theory.
34. Digital Forensics and Cyber Crime : 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings
35. Bounding fault detection probabilities in combinational circuits.
36. Digital Forensics and Cyber Crime : 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings
37. Botnet Detection Approach for the Distributed Systems
38. Distributed Malware Detection System Based on Decentralized Architecture in Local Area Networks
39. Distributed System for Detecting the Malware in LAN
40. THE TERNOPIL EDUCATIONAL COMMUNICATION CENTER: A NATO PROJECT TO INTEGRATE REGIONAL INFORMATION TECHNOLOGY RESOURCES
41. SMART LICENSE PLATE RECOGNITION SYSTEM BASED ON IMAGE PROCESSING USING NEURAL NETWORK
42. Commentary: The State of Learning: A Preview
43. Learning Probabilistic Prediction Functions.
44. Learning Probabilistic Prediction Functions (Extended Abstract)
45. Bases for Chain-Complete Posets
46. VLSI Self-Testing Based on Syndrome Techniques.
47. Exact and Approximate Membership Testers
48. Analysis of a Universal Class of Hash Functions.
49. Security network interface for alarm systems
50. Producing and evaluating crowdsourced computer security attack trees
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.