64 results on '"Janicke H"'
Search Results
2. SCADA security in the light of Cyber-Warfare
3. The Role of Dynamic Security Policy in Military Scenarios
4. Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications
5. A Survey of COVID-19 Contact Tracing Apps.
6. A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports
7. Lipopolysaccharide and interferon gamma activate nuclear factor kappa B and induce cyclo-oxygenase-2 in equine vascular smooth muscle cells
8. Ignition of dust clouds by brush discharges in oxygen enriched atmospheres
9. Hvordan kan pedagoger tilrettelegge for, - og ivareta barns uttrykk i planlagte aktiviteter med materialer i barnehagen?
10. Editorial message of the special issue devoted to the best papers of SEC@SAC 2013
11. Ignition of dust clouds by brush discharges in oxygen enriched atmospheres
12. Security, Privacy and Trust in Cyber Physical Systems
13. Editorial of the Special Track in Computer Security
14. Editorial of the Special Track in Computer Security (2012)
15. Editorial of the Special Track in Computer Security (2011)
16. Dynamic Access Control Policies: Specification and Verification
17. Visualization of High-Dimensional Point Clouds Using Their Density Distribution's Topology
18. Deltr: Digital embryo lineage tree reconstructor
19. Visual Analysis of Flow Features Using Information Theory
20. Brushing of Attribute Clouds for the Visualization of Multivariate Data
21. Multifield
22. New framework for policy support for Mobile Grid Services.
23. Optimizing Software Quality Assurance.
24. Visual analysis of high dimensional point clouds using topological landscapes.
25. Decentralized XACML Overlay Network.
26. Secure management layer for JXTA-based information sharing systems.
27. Quantitative Quality Assurance Approach.
28. A Property Based Framework for Trust and Reputation in Mobile Computing.
29. Concurrent Enforcement of Usage Control Policies.
30. Deriving Enforcement Mechanisms from Policies.
31. A Compositional Event & Time-Based Policy Model.
32. Equine carpal articular cartilage fibronectin distribution associated with training, joint location and cartilage deterioration
33. Dynamic Access Control Policies: Specification and Verification.
34. Skole for demokrati? En diskusjon av betingelser for skolens demokratidannende funksjon
35. Teaching for democracy: Transformative learning theory mediating policy and practice
36. Læreplan og demokrati
37. Hva slags medborger?
38. Software Certification through Quality Profiling.
39. Norske elevers demokratikunnskaper og aksept for religiøse autoriteter i samfunnet
40. Hvordan kan evne til refleksjon og dømmekraft utvikles gjennom dialogisk undervisning?
41. Cybersecurity assessment of the public sector in greece
42. The fsefflness of selected grass mixtfres for the grassland establishment on organic soil
43. A Model-based Approach to Interdependency between Safety and Security in ICS
44. Automated Sensor Node Malicious Activity Detection with Explainability Analysis.
45. Setting Up and Running Online Communities of Practice (CoPs) for Veterinary Educators.
46. Cybersecurity of Critical Infrastructures: Challenges and Solutions.
47. Redefining the 'arsenal of democracy'.
48. WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles.
49. Creating the Next Generation of Evidence-Based Veterinary Practitioners and Researchers: What are the Options for Globally Diverse Veterinary Curricula?
50. Security Defense Strategy for Intelligent Medical Diagnosis Systems (IMDS).
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.