№ |
Элемент
|
Количество документов |
---|---|---|
1781 | comment analysis (>>>) | 1 |
1782 | company (>>>) | 1 |
1783 | comparative analysis (>>>) | 2 |
1784 | compilation-based symbolic execution (>>>) | 1 |
1785 | complex protection (>>>) | 1 |
1786 | composition analysis (>>>) | 1 |
1787 | compromised nodes (>>>) | 1 |
1788 | computer attack (>>>) | 1 |
1789 | computer attacks (>>>) | 1 |
1790 | computer intelligence (>>>) | 1 |
1791 | computer network (>>>) | 1 |
1792 | computer security (>>>) | 5 |
1793 | computer vision (>>>) | 1 |
1794 | computing resources (>>>) | 1 |
1795 | conditional random fields (>>>) | 1 |
1796 | confidential data (>>>) | 1 |
1797 | Confidentiality (>>>) | 3 |
1798 | configura tion management (>>>) | 1 |
1799 | configuration (>>>) | 4 |
1800 | configuration management (>>>) | 2 |
Фасет 'Тематика'
Фильтр: Группа специальностей ФГОС:100000 - Информационная безопасность