Journal articles on the topic 'WebPosition analyzer (Computer file)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 15 journal articles for your research on the topic 'WebPosition analyzer (Computer file).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Narwal, Priti, Deepak Kumar, and Shailendra N. Singh. "A Hidden Markov Model Combined With Markov Games for Intrusion Detection in Cloud." Journal of Cases on Information Technology 21, no. 4 (2019): 14–26. http://dx.doi.org/10.4018/jcit.2019100102.
Full textKatyayan, Pragya, and Nisheeth Joshi. "Development of Automatic Rule-based Semantic Tagger and Karaka Analyzer for Hindi." ACM Transactions on Asian and Low-Resource Language Information Processing 21, no. 2 (2022): 1–25. http://dx.doi.org/10.1145/3479155.
Full textJawad, Alkenani, and Ahmed Nassari Khulood. "Enhance work for java based network analyzer tool used to analyze network simulator files." Enhance work for java based network analyzer tool used to analyze network simulator files 29, no. 2 (2023): 954–62. https://doi.org/10.11591/ijeecs.v29.i2.pp954-962.
Full textAlkenani, Jawad, and Khulood Ahmed Nassar. "Enhance work for java based network analyzer tool used to analyze network simulator files." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 2 (2023): 954. http://dx.doi.org/10.11591/ijeecs.v29.i2.pp954-962.
Full textRamos, Rogelio, Roumen Zlatev, Benjamin Valdez, Margarita Stoytcheva, Mónica Carrillo, and Juan-Francisco García. "LabVIEW 2010 Computer Vision Platform Based Virtual Instrument and Its Application for Pitting Corrosion Study." Journal of Analytical Methods in Chemistry 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/193230.
Full textAstsatryan, Hrachya, Arthur Lalayan, Aram Kocharyan, and Daniel Hagimont. "Performance-efficient Recommendation and Prediction Service for Big Data frameworks focusing on Data Compression and In-memory Data Storage Indicators." Scalable Computing: Practice and Experience 22, no. 4 (2021): 401–12. http://dx.doi.org/10.12694/scpe.v22i4.1945.
Full textSmiliotopoulos, Christos, Konstantia Barmpatsalou , and Georgios Kambourakis. "Revisiting the Detection of Lateral Movement through Sysmon." Applied Sciences 12, no. 15 (2022): 7746. http://dx.doi.org/10.3390/app12157746.
Full textGyimesi, Péter. "Automatic Calculation of Process Metrics and their Bug Prediction Capabilities." Acta Cybernetica 23, no. 2 (2017): 537–59. http://dx.doi.org/10.14232/actacyb.23.2.2017.7.
Full textChukwuchekwa, Nkwachukwu, Enwume Joshua U, Longinus S. Ezema, and Cosmas K Agubor. "Investigation of Radio Frequency Licensed Spectrum Utilization in Nigeria: A Study of Rumuokwuta, Port Harcourt, Nigeria." International Journal of Wireless & Mobile Networks 13, no. 05 (2021): 31–41. http://dx.doi.org/10.5121/ijwmn.2021.13503.
Full textAR, Dinesh, and Dr Pradeep Udupa. "Foreseeing Outbreak Investigation by Means of Machine Learning." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1130–35. http://dx.doi.org/10.22214/ijraset.2023.50250.
Full textMercy, Mbise, and Simba Fatuma. "Performance Evaluation of UDSM Network to Deliver Multimedia eLearning Contents: Case of CoICT." Tanzania Journal of Engineering and Technology 41, no. 4 (2022): 205–18. http://dx.doi.org/10.52339/tjet.v41i4.860.
Full textDon, Africa, Aaron, and Torrizo, Lorwin Felimar. "Comparative Study of Intrusion Detection Systems against Mainstream Network Sniffing Tools." International Journal of Engineering & Technology 7, no. 4.16 (2018): 188–91. http://dx.doi.org/10.14419/ijet.v7i4.16.22884.
Full textLipman, Robert. "STEP File Analyzer Software." Journal of Research of the National Institute of Standards and Technology 122 (March 30, 2017). http://dx.doi.org/10.6028/jres.122.016.
Full textRuo, Ando, Kadobayashi Youki, and Takakura Hiroki. "Clustering Massive Packets using a Lock-Free Algorithm of Tree-Based Reduction on GPGPU." April 3, 2021. https://doi.org/10.5281/zenodo.4661457.
Full textKluban, Maryna, Mohammad Mannan, and Amr Youssef. "On Detecting and Measuring Exploitable JavaScript Functions in Real-World Applications." ACM Transactions on Privacy and Security, October 26, 2023. http://dx.doi.org/10.1145/3630253.
Full text