Showing 1 - 6 results of 6 for search 'Y. M. Tumanov' Skip to content
Open Access
  • Home
  • Collections
    • High Impact Articles
    • Jawi Collection
    • Malay Medicine
    • Forensic
  • Search Options
    • UiTM Open Access
    • Search by UiTM Scopus
    • Advanced Search
    • Search by Category
  • Discovery Service
    • Sources
    • UiTM Journals
    • List UiTM Journal in IR
    • Statistic
  • About
    • Open Access
    • Creative Commons Licenses
    • COKI | Malaysia Open Access
    • User Guide
    • Contact Us
    • Search Tips
    • FAQs
Advanced
  • Author
  • Y. M. Tumanov
Showing 1 - 6 results of 6 for search 'Y. M. Tumanov', query time: 0.04s Refine Results
  1. 1
    The Model of the Software Running on a Computer Equipment Hardware Included in the Grid network
    The Model of the Software Running on a Computer Equipment Hardware Included in the Grid network
    by T. A. Mityushkina, Y. M. Tumanov
    Published 2012-12-01
    Get full text
    Article
  2. 2
    The Development of the Method of Protection of Computing Grid from Modification of Calculation Results
    The Development of the Method of Protection of Computing Grid from Modification of Calculation Results
    by S. V. Gavrilyuk, Y. M. Tumanov
    Published 2010-03-01
    Get full text
    Article
  3. 3
    Behavior Analysis Usage with Behavior Tures Adoption for Malicious Code Detection on JAVASCRIPT Scenarios Example
    Behavior Analysis Usage with Behavior Tures Adoption for Malicious Code Detection on JAVASCRIPT Scenarios Example
    by Y. M. Tumanov, S.V. Gavrilyuk
    Published 2010-03-01
    Get full text
    Article
  4. 4
    Cloud Computation Server Model Based on Grid Network
    Cloud Computation Server Model Based on Grid Network
    by K. V. Karman, Y. M. Tumanov
    Published 2012-12-01
    Get full text
    Article
  5. 5
    Distributed Computations Environment Protection Using Artificial Immune Systems
    Distributed Computations Environment Protection Using Artificial Immune Systems
    by A. V. Moiseev, A. A. Stankevichus, Y. M. Tumanov
    Published 2011-12-01
    Get full text
    Article
  6. 6
    Vulnerability Detection in Binary Code Based on Constraint Satisfiability Checking
    Vulnerability Detection in Binary Code Based on Constraint Satisfiability Checking
    by A. V. Filonenko, I. K. Isaev, D. V. Sidorov, Y. M. Tumanov
    Published 2010-06-01
    Get full text
    Article
Search Tools: Get RSS Feed — Email this Search

© 2020 | Services hosted by the Perpustakaan Tun Abdul Razak, | Universiti Teknologi MARA | Disclaimer


Loading...