Showing
1 - 2
results of
2
Skip to content
Institutional Login
Language
English
Te reo Māori
Books & media
Combined Results
Books & media
Articles & more
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced
Page will reload when a filter is removed.
Applied Filters:
Suggested Topics:
Remove Filter
Cloud computing
AND
Remove Filter
Computer security
Page will reload when a filter is removed.
Show filters (2)
Suggested Topics:
Remove Filter
Cloud computing
AND
Remove Filter
Computer security
Search Results - "Network topology"
Suggested Topics within your search.
Suggested Topics within your search.
Artificial intelligence
2
Cloud computing
Computer security
Security measures
2
Application software
1
Computer networks
1
Machine learning
1
Showing
1 - 2
results of
2
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
Email
Export
Print
Save
Select result number 1
1
Artificial intelligence and security : 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings.
Published 2020
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
Springer eBooks
Request this item
Save to List
Saved in:
Select result number 2
2
Advances in artificial intelligence and security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings.
Published 2021
Ebook
Call Number:
Loading...
Located:
Loading...
Online:
Springer eBooks
Request this item
Save to List
Saved in:
Select Page | with selected:
Email
Export
Print
Save
Search Tools:
RSS Feed
–
Email Search
–
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Location
Online
2 results
2
Item type
Ebook
2 results
2
Year of Publication
From:
To:
Items from Articles & more search
An Adaptive Coordinated Wide-Area Backup Protection Algorithm for Network Topology Variability
by
Chang, N.
, et al.
Capacitated Shortest Path Tour-Based Service Chaining Adaptive to Changes of Service Demand and Network Topology
by
Hara, T.
, et al.
Distribution Network Topology Analysis and Parameter Calculation Method Based on Pseudo Measurement Data
by
Deng, Ying
, et al.
Platoon Vulnerability due to Network Topology and Targeted Vehicle
by
Hendrix, Constance
, et al.
Optical network topology design to execute many tasks simultaneously in a disaggregated data center
by
Ikoma, Akishige
, et al.
More results…