-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10by Johnston, PeterSubjects: “...Portfolio and Security Analysis...”
Published 2012
Get access
Get access
Article in Journal/Newspaper -
11by Johnston, PeterSubjects: “...Portfolio and Security Analysis...”
Published 2012
Get access
Get access
Get access
Article in Journal/Newspaper -
12
-
13A new auditing mechanism for open source NoSQL database a case study on open source MongoDB databaseby Mohamed, Hany Heidar Hussein“... and it is used in many important projects and products. Security analysis for MongoDB revealed that it doesn’t...”
Published 2015
Get access
Get access
Get access
Get access
Thesis -
14“... model of security analysis is needed to understand the drivers of security in the Artic region...”
Get access
Get access
Article in Journal/Newspaper -
15by Solomonov, M P, Pakhomov, A A, Okhlopkov, G N“... factors as variables: agglomeration, labor, capital, and infrastructure security. Analysis uses statistics...”
Published in IOP Conference Series: Earth and Environmental Science (2020)
Get access
Get access
Get access
Article in Journal/Newspaper -
16
-
17“..., the constructivist approach theoretical foundations to the security analysis are revealed, and analysis...”
Get access
-
18by Sweet, Victoria“... security approach differs from traditional security analysis. Part III reviews examples of human rights...”
Published 2014
Get access
Get access
Text -
19
-
20by Sekaran, Kamini Kousalya, 1981-“... estimation are used for realtime security analysis, optimal power flow, etc. These are also used...”
Published 2008
Get access
Thesis