Writing with ease

il y a 5 ans 119 Vues

Bioinformatics for Computer Scientists

il y a 8 ans 672 Vues

Analysis of hybrid image with FFT (Fast Fourier Transform)

il y a 9 ans 1714 Vues

Introduction to Common Weakness Enumeration (CWE)

il y a 9 ans 2050 Vues

Private Browsing: A Window of Forensic Opportunity

il y a 10 ans 2258 Vues

Network switching

il y a 10 ans 4357 Vues

Digital Forensic: Brief Intro & Research Challenge

il y a 10 ans 4060 Vues

Survey & Review of Digital Forensic

il y a 10 ans 2121 Vues

Partitioned Based Regression Verification

il y a 10 ans 2492 Vues

CRAXweb: Automatic Exploit Generation for Web Applications

il y a 10 ans 1953 Vues

Botnets 101

il y a 11 ans 7354 Vues

Session initiation protocol

il y a 11 ans 1166 Vues

TPC-H in MongoDB

il y a 11 ans 3797 Vues

Web application security: Threats & Countermeasures

il y a 11 ans 7492 Vues

Cloud computing security

il y a 11 ans 1679 Vues

Can the elephants handle the no sql onslaught

il y a 11 ans 804 Vues

Fuzzy logic based students’ learning assessment

il y a 11 ans 1248 Vues

Link state routing protocol

il y a 11 ans 35338 Vues

Chat bot analysis

il y a 11 ans 2676 Vues

Data mining & column stores

il y a 11 ans 1174 Vues