Search alternatives:
decrease processes » disease processes (Expand search), decay processes (Expand search)
decrease decrease » decrease release (Expand search), disease decreases (Expand search), decrease sucrose (Expand search)
security protocol » security protocols (Expand search), security protection (Expand search)
python security » prison security (Expand search), prision security (Expand search)
decrease break » decreases breast (Expand search), decreases areas (Expand search), decrease treg (Expand search)
break decrease » urea decrease (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
decrease processes » disease processes (Expand search), decay processes (Expand search)
decrease decrease » decrease release (Expand search), disease decreases (Expand search), decrease sucrose (Expand search)
security protocol » security protocols (Expand search), security protection (Expand search)
python security » prison security (Expand search), prision security (Expand search)
decrease break » decreases breast (Expand search), decreases areas (Expand search), decrease treg (Expand search)
break decrease » urea decrease (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
1
“... to an intravenous nicotine self-administration protocol. The break point during a progressive ratio schedule and...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Article
2
3
4
5
6
Subjects:
“...Segurança em infraestrutura crítica, Testes de conformidade de protocolos industriais...”
Access document
Access document
Master thesis
7
Subjects:
“...Redes de computadores - Protocolos...”
Access document (1)
Access document (2)
Access document (1)
Access document (2)
Master thesis
8
“... of a Late Paleozoic mountain range and the coeval development of basins during Pangea break-up in SW Iberia...”
Access document
Access document
Conference object
9
“... work. In.IoT addresses the middleware concerns of the most popular solutions (security, usability, and...”
Access document
Access document
Doctoral thesis
10
“... and one of the main is the information security. In IoT environments the security is essential for not...”
Access document
Access document
Master thesis
11
“... their performance and security. In this context, this work presents the implementation of a remote...”
Access document
Access document
Bachelor thesis
12
13
14
15
17
“... this demand, the tool proposed on this paper was developed in Python, utilizing the Scapy library...”
Access document
Access document
Bachelor thesis
19
“... languages such as Python, Java, SQL and Bash. The resulting platform supports four streaming types, features...”
Access document
Access document
Master thesis
20
“... by chemical, physical, or enzymatic processes. Treatments such as high-pressure processing can be used...”
Access document
Access document
Article