Zobrazeno 1 - 10
of 74
pro vyhledávání: '"Cayirci, Erdal"'
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:389-405
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:315-330
Autor:
Balboni, Paolo, Barata, Martim Taborda, Basile, Cataldo, Bella, Giampaolo, Beuchelt, Gerald, Caballero, Albert, Capparelli, Francesco, Cayirci, Erdal, Chen, Thomas M., Cheng, Hongbing, Collins, Lauren, Curry, Samuel J.J., Dara, Rozita, Ellis, Scott R., Gross, William F., Jr., Gurkok, Cem, Hamed, Tarfa, Hao, Feng, Harmening, Jim, Hoffman, Rich, Huseynov, Emin, Jhawar, Ravi, Kakareka, Almantas, Kapoor, Bhushan, Karunamoorthy, Aruna, Katsikas, Sokratis K., Khader, Dalia, Khan, John Benjamin, Kotapati, Kameswari, Kremer, Stefan C., Lancrenon, Jean, LaPorta, Thomas F., Lewis, Keith, Liu, Peng, Mansoor, Bill, Mims, Nailah A., Padmavathi, V., Pandya, Pramod, Paraboschi, Stefano, Patil, Harsh Kupwade, Piuri, Vincenzo, Plate, Henrik, Pooley, James, Rong, Chunming, Rounsavall, Robert, Ryan, Peter Y.A., Saminathan, R., Santana, Mario D., Seigneur, Jean-Marc, Soper, Daniel S., Spies, Terence, Walker, Jesse, West, Michael A., Yan, Liang, Yee, George O.M., Zhao, Gansen
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:xvii-xviii
Publikováno v:
In Computer and Information Security Handbook Edition: Third Edition. 2017:369-385
Publikováno v:
In Computer and Information Security Handbook Edition: Third Edition. 2017:301-316
Publikováno v:
2017 Winter Simulation Conference (WSC).
Our Training and Experimentation Cloud Architecture, namely the hTEC, is applied to joint military space operations simulation. The hTEC follows the recommendations on the modelling and simulation as a service (MSaaS) by NATO Science and Technology O
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
In Network and System Security Edition: Second Edition. 2014:353-380
Publikováno v:
In Network and System Security Edition: Second Edition. 2014:291-317