Search ResultsElektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Yazar
Materyal Türü
Dil
Konu
Kütüphane
101 sonuç bulundu Arama sonuçlarına abone ol
000000000000DEFAULTTR
Yazdır
Liste seç
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
    Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
      by 
      Gundala palle, Santosh reddy, author.
      Format: 
      Alıntı: 
      Controlling Applications etc.) in IoT which requires quick response to react and control the situations if
      by 
      Metzgar, Jonathan Brian, author.
      Format: 
      Alıntı: 
      transport between radiance probes based on statistical measurement of visibility. We control the depth of
      by 
      Fan, Xinyi, author.
      Format: 
      Alıntı: 
      applications, including quality-control for manufacturing, online retailing, entertainment with virtual reality
      by 
      Oluwatimi, Oyindamola D., author.
      Format: 
      Alıntı: 
      . As a direct consequence, the technologies utilized determine the types of contextual access control
      by 
      Nwafor, Ebelechukwu, author.
      Format: 
      Alıntı: 
      collection using a provenance anomaly-based intrusion detection system (IDS) in a climate control system and
      by 
      Thames, Lane. editor.
      Format: 
      Alıntı: 
      Viewpoint of Industrial Control System Security: An Inference-based Intrusion Detection System -- Practical
      by 
      Crawford, Chris S., author.
      Format: 
      Alıntı: 
      into applications for various purposes such as device control, user-state monitoring, training and
      by 
      Lankhorst, Marc. author.
      Format: 
      Alıntı: 
      An enterprise architecture tries to describe and control an organisation’s structure, processes