G–network

Results: 1960



#Item
181Neuroscience / Nervous system / Cognitive science / Cognitive neuroscience / Emotion / Magnetic resonance imaging / Functional magnetic resonance imaging / Facial expression / Artificial neural network / G factor / Microexpression / Empathy

Journal of Vision):11, 1–12 http://journalofvision.org/content

Add to Reading List

Source URL: haxbylab.dartmouth.edu

Language: English - Date: 2016-01-05 09:59:56
182

Modeling Avian Influenza Immunity Distribution Profile Through the Poultry Production Network in Egypt: A Decision Tool for Zoonotic Influenza Management M.Peyre 1, M.Choisy 2, H. Sobhy 3, W.H. Kilany 3,4, A. Tripodi5, G

Add to Reading List

Source URL: www.vectormune.com

Language: English
    183Internet / Network architecture / Computing / Regional Internet registries / Internet Standards / IP addresses / IPv6 / Working groups / AFRINIC / IPv6 deployment / American Registry for Internet Numbers / Asia-Pacific Network Information Centre

    Member G u i d e b o o k afrinic.net meeting.afrinic.net/afrinic-19

    Add to Reading List

    Source URL: afrinic.net

    Language: English - Date: 2015-07-21 04:20:20
    184Internet / Computing / Internet Standards / Internet protocols / Domain name system / Network architecture / Radio-frequency identification / Verisign / WHOIS

    Metadata-driven Threat Classification of Network Endpoints Appearing in Malware Andrew G. West and Aziz Mohaisen (Verisign Labs) July 11, 2014 – DIMVA – Egham, United Kingdom PRELIMINARY OBSERVATIONS

    Add to Reading List

    Source URL: www.andrew-g-west.com

    Language: English - Date: 2014-07-27 21:24:28
    185

    The Italian Interbank Network: statistical properties and a simple model G. De Masia G. Iorib and G. Caldarellic a Dipartimento di Economia, Piazzale Martelli 8, 60121 Ancona, Italy;

    Add to Reading List

    Source URL: www.guidocaldarelli.com

    Language: English - Date: 2012-07-02 08:28:18
      186

      Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets Elias Athanasopoulos1, Kostas G. Anagnostakis2, and Evangelos P. Markatos1 1 Institute of Computer Science (ICS)

      Add to Reading List

      Source URL: users.ics.forth.gr

      Language: English - Date: 2010-11-23 05:43:52
        187

        Flexible Web Visualization for Alert-Based Network Security Analytics Lihua Hao Christopher G. Healey

        Add to Reading List

        Source URL: www.csc.ncsu.edu

        Language: English - Date: 2014-03-08 09:19:10
          188

          GAS: Overloading a File Sharing Network as an Anonymizing System Elias Athanasopoulos1 , Mema Roussopoulos2,1 , Kostas G. Anagnostakis3 , and Evangelos P. Markatos1 1

          Add to Reading List

          Source URL: users.ics.forth.gr

          Language: English - Date: 2010-11-23 05:43:52
            189

            International Journal of Network Security, Vol.15, No.5, PP, SeptA Survey on Various Cyber Attacks and Their Classification M. Uma and G. Padmavathi

            Add to Reading List

            Source URL: ijns.femto.com.tw

            Language: English - Date: 2014-11-13 16:52:00
              190Software / Computing / Computer security / Computer network security / Software testing / Penetration test / Application security / Vulnerability assessment / W3af / Security testing / Metasploit Project / Vulnerability

              International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, NovemberAN OVERVIEW OF PENETRATION TESTING 1 Aileen G. Bacudio, 1Xiaohong Yuan, 2Bei-Tseng Bill Chu, 1Monique Jones

              Add to Reading List

              Source URL: airccse.org

              Language: English - Date: 2011-11-30 01:55:07
              UPDATE