Yazar
Chen, Thomas M. editor.
Format:
Electronic Resources
Alıntı:
Cyberterrorism Understanding, Assessment, and Response / Chen, Thomas M. editor.
Yazar
Seehusen, Fredrik. editor.
Format:
Electronic Resources
Alıntı:
Risk Assessment and Risk-Driven Testing Third International Workshop, RISK 2015, Berlin, Germany
View Other Search Results
Yazar
Großmann, Jürgen. editor.
Format:
Electronic Resources
Alıntı:
Risk Assessment and Risk-Driven Quality Assurance 4th International Workshop, RISK 2016, Held in
Yazar
Iyengar, Sitharama S. author.
Format:
Electronic Resources
Alıntı:
-- Coverage Assessment and Target Tracking in 3-D Domains -- A Stochastic Preserving Scheme of
5.
Yazar
Tingberg, Anders. editor.
Format:
Electronic Resources
Alıntı:
Assessment and Tissue Analysis -- Dose and Classification -- Image Processing, CAD, Breast Density, and New
Yazar
Cuppens-Boulahia, Nora. editor.
Format:
Electronic Resources
Alıntı:
, metrics and risk assessment, information flow control, identity management, identifiability and decision
Yazar
Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349
Format:
Electronic Resources
Alıntı:
Infrastructure Cybersecurity Issues; CyberSecurity Threats, Assessment and Privacy; and Vulnerability and Malware
Yazar
Cheung, Simon K.S. editor.
Format:
Electronic Resources
Alıntı:
in Blended Learning, Content Development for Blended Learning, Assessment for Blended Learning
Yazar
Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683
Format:
Electronic Resources
Alıntı:
Cryptosystems and Applied Cryptography -- Modelling and Risk Assessment -- Trust Computing.
Yazar
Dimitrakopoulos, George. author.
Format:
Electronic Resources
Alıntı:
-- Sustainable Mobility in Smart Cities: Traffic Assessment, Forecasting and Management -- Advanced Driver
Yazar
Rome, Erich. editor.
Format:
Electronic Resources
Alıntı:
resilience assessment; emergency management: critical infrastructure preparedness; modelling, simulation and
Yazar
Poovendran, Radha. editor.
Format:
Electronic Resources
Alıntı:
, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis