Personensuche
X
?
Lecture Notes in Computer Science; Advances in Swarm Intelligence ,
4
Method Based on Data Mining Techniques for Breast Cancer Re..:
, In:
?
Seafloor Geomorphology as Benthic Habitat ,
5
Continental shelf, canyons and pockmark fields in the south..:
, In:
?
Emerging Trends in Cybersecurity Applications ,
6
DataCookie: Sorting Cookies Using Data Mining for Preventio..:
, In:
?
Communications in Computer and Information Science; Applied Technologies ,
7
XSS2DENT, Detecting Cross-Site Scripting Attacks (XSS) Vuln..:
, In:
?
Information Systems and Technologies; Lecture Notes in Networks and Systems ,
8
P100 ERP as a Tool to Identifying Problem Solving:
, In:
?
2019 3rd Cyber Security in Networking Conference (CSNet) ,
9
Phishing Attacks: Detecting and Preventing Infected E-mails..:
, In:
?
Advances in Intelligent Systems and Computing; Advances in Emerging Trends and Technologies ,
10
Trusted Phishing: A Model to Teach Computer Security Throug..:
, In:
?
2019 3rd Cyber Security in Networking Conference (CSNet) ,
11
XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Att..:
, In:
?
2018 IEEE 19th International Conference on High Performance Switching and Routing (HPSR) ,
12
Redefining the Economics of Reach with Integrated Optics:
, In:
?
Proceedings of the 2017 Winter Simulation Conference ,
13
Using quality of service lanes to control the impact of rai..:
, In:
?
Proceedings of the 7th International Workshop on Performance Modeling, Benchmarking and Simulation of High Performance Computing Systems ,
14
An evaluation of network architectures for next generation ..:
, In:
?
Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis ,
15