№ |
Element
|
Documents count |
---|---|---|
1261 | text generation (>>>) | 1 |
1262 | text mining (>>>) | 1 |
1263 | the assessment of the parameters of the protection system (>>>) | 1 |
1264 | the composition of it systems (>>>) | 1 |
1265 | the control panel (>>>) | 1 |
1266 | the database management system (>>>) | 1 |
1267 | the dynamics of offenses (>>>) | 1 |
1268 | the equilibrium of the Stackelberg (>>>) | 1 |
1269 | the gradient boosting method (>>>) | 1 |
1270 | the information security (>>>) | 1 |
1271 | the life cycle of it systems (>>>) | 1 |
1272 | the processing of personal data (>>>) | 1 |
1273 | the security of web applications (>>>) | 1 |
1274 | the telltale signs (>>>) | 1 |
1275 | thermal sensors (>>>) | 1 |
1276 | Thread protocol (>>>) | 1 |
1277 | Thread protocol protection mechanisms (>>>) | 1 |
1278 | threat analysis (>>>) | 2 |
1279 | threat classification (>>>) | 1 |
1280 | threat model (>>>) | 5 |
Facet 'Subjects'
Filter: Speciality group (FGOS):100000 - Информационная безопасность