Plus de 1100 sites pédagogiques francophones, triés sur le volet et reconnus pour la qualité de leur contenu en ressources disciplinaires et la présence de liens commentés.
Ce support de formation vise prioritairement les professionnels de l'information (bibliothécaires, documentalistes) et les enseignants, impliqués dans la formation des usagers.
This Nitro Marketing blog keeps you up to date with the launch of one of the most respectable online marketer's products: Mark Joyner's Extreme Business Makeover. This will be great!
P. Harris, J. Swafford, T. Edwards, M. Zhang, S. Nigavekar, T. Yarbrough, L. Lane, T. Helmer, L. Lebo, G. Mayo и 3 other автор(ы). Journal of biomedical informatics, 44 (4):
655-62(августа 2011)6505<m:linebreak></m:linebreak>CI: Copyright (c) 2011; GR: 1 UL1 RR024975/RR/NCRR NIH HHS/United States; JID: 100970413; NIHMS271884; OID: NLM: NIHMS271884 Available on 08/01/12; OID: NLM: PMC3118397 Available on 08/01/12; PMCR: 2012/08/01; 2010/08/30 received; 2010/10/27 revised; 2011/01/27 accepted; 2011/02/15 aheadofprint; ppublish;<m:linebreak></m:linebreak>USMIB; Recursos; Software; Recerca clínica.
M. Gaikwad, M. Gabhane, и M. Golait. International Journal on Recent and Innovation Trends in Computing and Communication, 3 (4):
1773--1777(апреля 2015)
Narita. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue VI):
117-128(ноября 2019)1. Symantec, 2019 Internet Security Threat Report, Vol. 24, 2019. 2. Akamai, 2019 State of the Internet / Security: Media Under Assault, 2019. https://www.akamai.com 3. J. Xia, S. Vangala, J. Wu, L. Gao, and K. Kwiat, “Effective Worm Detection for Various Scan Technique,” Journal of Computer Security, vol.14, no.4, pp.359–387, 2006. 4. W. Yu, X. Wang, X. Fu, D. Xuan, and W. Zhao, “An Invisible Localization Attack to Internet Threat Monitors,” IEEE Trans. Parallel and Distributed Systems, vol.20, no.11, pp.1611–1625, 2009. 5. M. Narita, K. Ogura, B.B. Bista, and T. Takata, “Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack,” Proc. 17th International Conference on Network-Based Information Systems (NBiS 2014), 2014. 6. M. Narita, B.B. Bista, and T. Takata, “A Practical Study on Noise-Tolerant PN Code-Based Localisation Attacks to Internet Threat Monitors,” Int. J. Space-Based and Situated Computing, vol.3, no.4, pp.215–226, December 2013. 7. W. Yu, S. Wei, G. Ma, X. Fu, and N. Zhang, “On Effective Localization Attacks Against Internet Threat Monitors,” Proc. 2013 IEEE International Conference on Communications (ICC), pp.2011–2015, 2013. 8. UCSD Network Telescope. https://www.caida.org/projects/network telescope/ 9. Guillot, R. Fontugne, P. Winter, P. Me´rindol, A. King, A. Dainotti, and C. Pelsser, “Chocolatine: Outage Detection for Internet Background Radiation,” 10. Proc. Network Traffic Measurement and Analysis Conference (TMA), June 2019. DShield. http://www.dshield.org/ 11. M. Eto, D. Inoue, J. Song, J. Nakazato, K. Ohtaka, and K. Nakao, “nicter: A Large-Scale Network Incident Analysis System: Case Studies for Understanding Threat Landscape,” Proc. 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp.37–45, 2011. 12. D. Inoue, M. Eto, K. Suzuki, M. Suzuki, and K. Nakao, “DAEDALUS-VIZ: Novel Real-Time 3D Visualization for Darknet Monitoring-Based Alert System,” Proc. 9th International Symposium on Visualization for Cyber Security, pp.72–79, October 2012. 13. H. Kanehara, Y. Murakami, J. Shimamura, T. Takahashi, D. Inoue and N. Murata, “Real-time botnet detection using nonnegative tucker decomposition,” 14. Proc. the 34th ACM/SIGAPP Symposium on Applied Computing, pp.1337–1344, April 2019. 15. X. Fan, C. Li, and X. Dong, “ A Real-Time Network Security Visualization System Based on Incremental Learning (ChinaVis 2018),” J. Visualization, pp.1–15, October 2018. 16. Y. Shinoda, K. Ikai, and M. Itoh, “Vulnerabilities of Passive Internet Threat Monitors,” Proc. 14th USENIX Security Symposium, pp.209–224, 2005. 17. J. Bethencourt, J. Franklin, and M. Vernon, “Mapping Internet Sensors with Probe Response Attacks,” Proc. 14th USENIX Security Symposium, pp.193– 208, 2005. 18. S. Wei, D. Shen, L. Ge, W. Yu, E.P. Blasch, K.D. Pham, and G. Chen, “Secured Network Sensor-Based Defense System,” Proc. SPIE 9469, Sensors and Systems for Space Applications VIII, 2015. 19. W. Yu, N. Zhang, X. Fu, R. Bettati, and W. Zhao, “Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures,” IEEE Trans. Computers, vol.59, no.12, pp.1655–1668, 2010. 20. ENISA, “Proactive Detection of Network Security Incidents, Report,” https://www.enisa.europa.eu/2011. 21. M. Kamizono et al., “anti Malware engineering WorkShop ~MWS Datasets 2015~,” MWS2015, 2015..
P. Tran-Gia, T. Hossfeld, M. Menth, и R. Pries. e&i Elektrotechnik und Informationstechnik, Special Issue 'Future Internet', ISSN: 0932-383X (print), ISSN: 1613-7620 (online), (августа 2009)