Your search returned 2 results.

Sort
Results
Data-Driven Cyber-Vulnerability Maintenance Policies by
  • Afful-Dadzie, Anthony
  • Alien, Theodore T
Source: Journal of Quality Technology
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Modeling Multiple Ip Traffic Streams with Rate Limits by
  • Heyman, D. P
  • Lucantoni, David
Source: Ieee/Acm Transactions on Networking
Material type: Article Article; Format: print
Availability: Items available for loan: Engr Abul Kalam Library (1).
Pages
Visit counter For Websites

Copyright © 
Engr Abul Kalam Library, NEDUET, 2024