Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Специальные определители для вычислительной техники - 004.01/.08
Научные статьи
В разделе "Специальные определители для вычислительной техники"
An efficient indexing technique for AES lookup table to prevent side-channel cache timing attack
A classification framework to detect DoS attacks
A study on malware and malware detection techniques
Analysis and prediction of individual stock prices of financial sector companies in NIFTY50
A survey on risk assessments of heart attack using data mining approaches
Plagiarism detection system for the kurdish language
Towards data resilience: the analytical case of crypto ransomware data recovery techniques
A comparative analysis and proposing ‘ANN Fuzzy AHP model’ for requirements prioritization
SASMEDU: security assessment method of software in engineering education
Efficient clustering algorithm with enhanced cohesive quality clusters
Basis path based test suite minimization using genetic algorithm
Entailment and spectral clustering based single and multiple document summarization
Deplyoing advance data analytics techniques with conversational analytics outputs for fraud detection
Sorting using a combination of bubble sort, selection sort & counting sort
The circumstances in which modular programming becomes the favor choice by novice programmers
Visual Association Analytics Approach to Predictive Modelling of Students’ Academic Performance
Early Skin Cancer Detection Using Deep Convolutional Neural Networks on Mobile Smartphone
Implementation of Business Intelligence to Determine Evaluation of Activities (Case Study Indonesia Stock Exchange)
FBSEM: A Novel Feature-Based Stacked Ensemble Method for Sentiment Analysis
Application of Artificial Neural Networks for Detecting Malicious Embedded Codes in Word Processing Documents
An Optimized Machine Learning Approach for Predicting Parkinson's Disease
Эффективность использования компьютерного тестирования в образовательной деятельности среднего профессионального образования
Comparative Analysis of Data mining Methods to Analyze Personal Loans Using Decision Tree and Naïve Bayes Classifier
Analysis of Threats and Cybersecurity in the Oil and Gas Sector within the Context of Critical Infrastructure
How do Machine Learning Algorithms Effectively Classify Toxic Comments? An Empirical Analysis
A Decision-Making Technique for Software Architecture Design
Targeted Attacks Detection and Security Intruders Identification in the Cyber Space
Application of Machine Learning and Predictive Models in Healthcare – A Review
Balancing Simplification and Detail Preservation in Low Poly Image Abstraction through Edge-Preserved Seed Point Generation
Impact of Cybersecurity Measures in the Healthcare Sector: A Comprehensive Review of Contemporary Approaches and Emerging Trends
Application of Particle Swarm Optimization to Improve the Performance of the K-Nearest Neighbor in Stunting Classification in South Sumatra, Indonesia
Cybersecurity as a Legal and Social Pillar for Protec ting Digital Rights and Enhancing Trust in the Digital Space
Информационное общество: ожидания и реальность
Проблемы реализации информационных технологий в образовании
Стратегии защиты информации
Безопасность личных данных в социальных сетях
Проблемы безопасности и особенности защиты пластиковых карт от мошенничества
Формирование структуры веб-приложения для процесса взаимодействия с клиентами организации по продаже мебели
Стандартные криптографические алгоритмы шифрования
The major cyber security trends for the financial and commercial institutions
← Предыдущая
Следующая страница →
1
|
...
|
5
|
6
|
7
|
8
|
9
|
10
|
11
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.