5 results on '"Michael Putyato"'
Search Results
2. Methods of protection in speaker verification systems
3. Research of Social Engineering Mechanisms and Analysis of Counteraction Methods
4. An Approach to Identifying the Process of Implementing a Distributed Denial of Service Attack based on a Probable Graph Model
5. Raman scattering on semiconductor microtubes
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.