137 results on '"George Markowsky"'
Search Results
2. The Budget Theorem and the Russo-Ukrainian War.
3. State-based Sandbox Tool for Distributed Malware Detection with Avoid Techniques.
4. Lattice-Based Technique to Visualize and Compare Regional Terrorism Using the Global Terrorism Database.
5. Lanchester's Equations and Cyberwarfare.
6. Detection DNS Tunneling Botnets.
7. Proof-of-Activity Consensus Protocol Based on a Network's Active Nodes Indication.
8. Botnet Detection Approach for the Distributed Systems.
9. Lattice Data Analytics: The Poset of Irreducibles and the MacNeille Completion.
10. The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis.
11. Distributed Malware Detection System Based on Decentralized Architecture in Local Area Networks.
12. Distributed System for Detecting the Malware in LAN.
13. The problem of interceptor top level domains revisited.
14. The problem of interceptor top level domains.
15. Scanning for vulnerable devices in the Internet of Things.
16. Was the 2006 Debian SSL Debacle a system accident?
17. Adapting American ERP systems for China: Cross-cultural issues and a case study.
18. Universal asset assessment system based on excel™.
19. Evolutionary dynamics of revolution: Opinion modeling in society based on graphs and rules.
20. High School Cyber Defense Competitions: Lessons from the Trenches.
21. Consumer Guide to Online Cybersecurity Resources: UMCEG.
22. The Sad History of Random Bits.
23. Security Tools for GRID- Systems.
24. Survey of Supercomputer Cluster Security Issues.
25. RF Eavesdropping Beowulf Clusters.
26. BOTNET DETECTION APPROACH BASED ON THE DISTRIBUTED SYSTEMS
27. Database design for CAD system optimising distributed sensor networks for perimeter security.
28. Security network interface for alarm systems.
29. An introduction to algorithmic information theory.
30. Botnet Detection Approach for the Distributed Systems
31. Introduction To Algorithmic Information Theory.
32. Digital Forensics and Cyber Crime : 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings
33. Bounding fault detection probabilities in combinational circuits.
34. Digital Forensics and Cyber Crime : 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings
35. Distributed Malware Detection System Based on Decentralized Architecture in Local Area Networks
36. Distributed System for Detecting the Malware in LAN
37. THE TERNOPIL EDUCATIONAL COMMUNICATION CENTER: A NATO PROJECT TO INTEGRATE REGIONAL INFORMATION TECHNOLOGY RESOURCES
38. SMART LICENSE PLATE RECOGNITION SYSTEM BASED ON IMAGE PROCESSING USING NEURAL NETWORK
39. Commentary: The State of Learning: A Preview
40. Producing and evaluating crowdsourced computer security attack trees
41. Security network interface for alarm systems
42. Scanning for vulnerable devices in the Internet of Things
43. Learning Probabilistic Prediction Functions.
44. Learning Probabilistic Prediction Functions (Extended Abstract)
45. Bases for Chain-Complete Posets
46. VLSI Self-Testing Based on Syndrome Techniques.
47. Exact and Approximate Membership Testers
48. Analysis of a Universal Class of Hash Functions.
49. Crowdsourcing, big data and homeland security
50. Adapting American ERP systems for China: Cross-cultural issues and a case study
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.