Name | Identifiers | Coverage |
---|---|---|
Insider Threats in Cyber Security |
|
Fulltext |
|
Fulltext |
|
|
Fulltext |
|
|
Fulltext |
|
|
Fulltext |
|
|
Fulltext |
|
Resource-Adaptive Cognitive Processes |
|
Fulltext |
Revision, Acceptability and Context |
|
Fulltext |
|
Fulltext |
|
Teaching Fundamental Concepts of Informatics |
|
Fulltext |