Zobrazeno 1 - 10
of 75
pro vyhledávání: '"Bogdanoski, Mitko"'
Autor:
Minchev, Zlatogor, Bogdanoski, Mitko
No single nation, culture or religion can achieve peace and security at home while ignoring the terrorist threats posed to others globally. This book presents lectures and a keynote speech delivered as part of the NATO Advanced Training Course (ATC)
Autor:
Lalović, Komlen G.1 komlen.lalovic@pmc.edu.rs, Bogdanoski, Mitko Z.2 mitko.bogdanoski@ugd.edu.mk
Publikováno v:
Military Technical Courier / Vojnotehnicki Glasnik. Jul-Sep2021, Vol. 69 Issue 3, p676-686. 11p.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of Engineering Science & Technology Review; 2021, Vol. 14 Issue 6, p91-101, 11p
Autor:
Hadji-Janev, Metodi, Bogdanoski, Mitko
Much of the social, economic and political activities in the region of South-East-Europe (SEE) take place via so-called cyberspace. Even though there is evidence of growing dependence of cyberspace in SEE countries the practice shows that there is no
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2788::a9b0fbe431f9aad7d15a57a2a6c182ea
http://eprints.ugd.edu.mk/18044/
http://eprints.ugd.edu.mk/18044/
Autor:
Bogdanoski, Mitko, Veljovski, Gjorgji
In the last decade of the twentieth century, the rapid development of computer technology and its application in the military doctrine prompted the idea of network-centric warfare. Besides sea, air, land and space, the contemporary strategy defines c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2788::131701321da01a7fa2b0424bd5fc5ef1
http://eprints.ugd.edu.mk/17424/
http://eprints.ugd.edu.mk/17424/
This paper presents an approach to multimodal biometric authentication using face and iris biometric traits. Having in mind that variety of devices, such as laptops, smartphones and tablets have a high quality camera built in, it is possible to obtai
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2788::5387b88bedcb5e405eafb9b1b4f507ec
http://eprints.ugd.edu.mk/16526/
http://eprints.ugd.edu.mk/16526/
Technology concerning mobile devices has presented revolutionary growth during the last decade. Mobile phones do not serve only as a means of communication, but also as portable computers with advanced communication capabilities. Smartphones are able
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2788::3bd193c05dccef6fa5d5c40e04171efc
http://eprints.ugd.edu.mk/16528/
http://eprints.ugd.edu.mk/16528/
Anomalies in IoT typically occur as a result of malicious activity. As an example, a point anomaly may occur once network intrusion is attempted, while collective anomaly may result from device being hacked. Due to the nature of the attacks, some ano
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2788::21448de669fac013cc6c411fc242959d
http://eprints.ugd.edu.mk/16527/
http://eprints.ugd.edu.mk/16527/