437 results on '"Fidge, Colin"'
Search Results
52. Jump-Starting Software Engineering Careers
53. Using Semicircular Sampling to Increase Sea-Wind Retrieval Altitude with a High-Altitude UAV Scatterometer
54. Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control
55. Verifying Emulation of Legacy Mission Computer Systems
56. A Z Based Approach to Verifying Security Protocols
57. Using Semicircular Sampling to Increase Sea-Wind Retrieval Altitude with a High-Altitude UAV Scatterometer
58. A Data Normalization Technique for Detecting Cyber Attacks on UAVs
59. Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems
60. GPS-Spoofing Attack Detection Technology for UAVs Based on Kullback-Leibler Divergence
61. Discovering Data-Aware Mode Switching Constraints to Monitor Mode Switching Decisions in Supervisory Control
62. The Algebra of Multi-tasking
63. A Formal Model of Real-Time Program Compilation
64. A methodology for compilation of high-integrity real-time programs
65. Partitioning composite web services for decentralized execution using a genetic algorithm
66. Interactively verifying a simple real-time scheduler
67. Identifying critical components during information security evaluations
68. Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems
69. GPS-Spoofing Attack Detection Technology for UAVs Based on Kullback–Leibler Divergence
70. Proof Obligations for Real-Time Refinement
71. Adding real time to formal program development
72. Real-time refinement
73. Application of Simulated Annealing to Data Distribution for All-to-All Comparison Problems in Homogeneous Systems
74. Feature Selection for Precise Anomaly Detection in Substation Automation Systems
75. HIBAF: A data security scheme for fog computing
76. Automated detection-in-depth in industrial control systems
77. An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes
78. A Resilient Fog-IoT Framework for Seamless Microservice Execution
79. Making Optimal and Justifiable Asset Maintenance Decisions
80. An Extensible Framework for Analysing Resource Behaviour Using Event Logs
81. Microservice Remodularisation of Monolithic Enterprise Systems for Embedding in Industrial IoT Networks
82. A Resilient Fog-IoT Framework for Seamless Microservice Execution
83. Feature Selection for Precise Anomaly Detection in Substation Automation Systems
84. HIBAF: A data security scheme for fog computing
85. An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes
86. BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture
87. A scheduling-based dynamic fog computing framework for augmenting resource utilization
88. A self-diagnosis method for detecting UAV cyber attacks based on analysis of parameter changes
89. Design guidelines for effective occupation-based personal health records
90. Remodularization Analysis for Microservice Discovery Using Syntactic and Semantic Clustering
91. A simple high-precision 2-port vector analyzer
92. A data secured communication system design procedure with a chaotic carrier and synergetic observer
93. Predicting Deadline Transgressions Using Event Logs
94. Profiling Event Logs to Configure Risk Indicators for Process Delays
95. Fault evaluation for security-critical communications devices
96. Specific Resonant Properties of Non-Symmetrical Microwave Antennas
97. A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes
98. BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture
99. Securing Manufacturing Using Blockchain
100. Linear Approximation of Execution-Time Constraints
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.