№ |
Element
|
Documents count |
---|---|---|
1 | access control (>>>) | 1 |
2 | ad-hoc networks (>>>) | 1 |
3 | adaptive control (>>>) | 1 |
4 | authentication (>>>) | 2 |
5 | authenticity (>>>) | 1 |
6 | Confidentiality (>>>) | 1 |
7 | control-flow graph (>>>) | 1 |
8 | critical information infrastructure (>>>) | 1 |
9 | cryptographic outsourcing (>>>) | 1 |
10 | cyber-physical system (>>>) | 1 |
11 | cyberphysical systems (>>>) | 1 |
12 | digital signature (>>>) | 1 |
13 | discrete wavelet transform (>>>) | 1 |
14 | edge computing (>>>) | 1 |
15 | elliptic curves (>>>) | 1 |
16 | isogeny (>>>) | 1 |
17 | learning automata (>>>) | 1 |
18 | malware detection (>>>) | 1 |
19 | neuro-fuzzy logic (>>>) | 1 |
20 | risk assessment (>>>) | 1 |
Facet 'Subjects'
Filter: Speciality code (FGOS):10.06.01