Your search for 25211 returns 3985 document(s) |
Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks, Page 497-523 |
Author: Kai-Lun Hui, Seung Hyun Kim, and Qiu-Hong Wang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
From Monologue to Dialogue: Performative Objects to Promote Collective Mindfulness in Computer-Mediated Team Discussions, Page 559-581 |
Author: Aaron M. Curtis, Alan R. Dennis, and Kelly O. McNamara | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Platform or Wholesale? A Strategic Tool for Online Retailers to Benefit from Third-Party Information, Page 763-785 |
Author: Young Kwark, Jianqing Chen, and Srinivasan Raghunathan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Social Network Integration and User Content Generation: Evidence from Natural Experiments, Page 1035-1058 |
Author: Ni Huang, Yili Hong, and Gordon Burtch | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information Technology Investments and Firm Risk Across Industries: Evidence from the Bond Market, Page 1347-1367 |
Author: Keongtae Kim, Sunil Mithas, and Michael Kimbrough | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Transfer Learning Dari Model Vit-B/16 Dataset Imagenet Ke Describable Textures Dataset Dan Flowers-102 |
Author: Fauzan Muhammad; | Call Number: T-1382 (Softcopy T-1091) MAK PI-182 TR-CSUI-054 | Edition: 2024 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Discovering communication threads in emails using a conceptual clustering approach, HAL. 221-229 |
Author: Anjali Ganesh Jivant; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A System for discovering relationship by feature extraction form text databases |
Author: Jack G. Conrad; Mary Hunter Utt; | Call Number: SEM-256 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Discovering typical structures of documents: a road map approach, Hal. 146-163 |
Author: Ke Wang; | Call Number: SEM-250 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed. |
Call Number: 005.8 She | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|