Presentica
PRESENTATIONS
CONTACT
LOGIN
Upload File
Search Results for 'Security as a software metric'
LE 1 Access Control Contiguous Zone Contingency Response XYZ Port Facility Maritime Security Exercise
Microsoft Azure Overview and Cloud Solutions for Businesses
Designing a Reputation System to Detect Malicious Behavior in the Google Android Market
Analysis of Nanostructural Layers using Low Frequency Impedance Spectroscopy: A Case Study on Self-Assembled Alkane Layers on Silicon
Introduction to SAT Based Abstraction Refinement in Model Checking
Bayesian Geoadditive Latent Variable Models for Discrete and Continuous Responses
I2NSF Use Cases in Access Networks & Seeking an Open OAM Interface
High-Level Expert Meeting to Develop the Near East Regional Action Plan for Agricultural and Rural Statistics
A Pairing Based Blind Signature E-Voting Scheme
Streamlining the Purchase Module Corrugation Process with Efficient Planned Flow Software
Combustion Modeling in FLUENT: Overview and Applications
Previous