Letteratura scientifica selezionata sul tema "Honeysett"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Honeysett".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Honeysett"
Kwok, Virginia. "Ethics and aesthetics are one". Babel. Revue internationale de la traduction / International Journal of Translation 65, n. 2 (23 aprile 2019): 249–63. http://dx.doi.org/10.1075/babel.00087.kwo.
Testo completoKanatas, Anastasios, e Andrew Harris. "RE: Visavadia BG, Honeysett J, Danford MH. Manuka honey dressing: An effective treatment for chronic wound infections. Br J Oral Maxillofac Surg. 2006 Nov 17; [Epub ahead of print]". British Journal of Oral and Maxillofacial Surgery 46, n. 3 (aprile 2008): 258. http://dx.doi.org/10.1016/j.bjoms.2007.10.005.
Testo completoBOBIŞ, Otilia, Victoriţa BONTA, Liviu A. MĂRGHITAŞ, Daniel S. DEZMIREAN, Claudia PAŞCA, Adriana URCAN, Erzsebet Timea DOMOKOS e Adela Ramona MOISE. "Does Genetic Engineering Influence the Nutritional Value of Plums? Case Study on Two conventional and One Genetically Engineered Plum Fruits". Bulletin of University of Agricultural Sciences and Veterinary Medicine Cluj-Napoca. Animal Science and Biotechnologies 76, n. 1 (12 giugno 2019): 51. http://dx.doi.org/10.15835/buasvmcn-asb:2019.0003.
Testo completoPolák, J., J. Kumar, B. Krška e M. Ravelonandro. "Biotech/GM crops in horticulture: plum cv. HoneySweet resistant to Plum pox virus". Plant Protection Science 48, Special Issue (12 dicembre 2012): S43—S48. http://dx.doi.org/10.17221/37/2012-pps.
Testo completoBOBIŞ, Otilia, Ioan ZAGRAI, Victoriţa BONTA, Luminiţa ZAGRAI, Liviu A. MĂRGHITAŞ, Daniel S. DEZMIREAN, Claudia PAŞCA e Adriana URCAN. "Comparative Studies on Chemical Composition of Two Conventional Bred and One Genetically Engineered Plum-Fruits". Bulletin of University of Agricultural Sciences and Veterinary Medicine Cluj-Napoca. Animal Science and Biotechnologies 74, n. 2 (26 novembre 2017): 149. http://dx.doi.org/10.15835/buasvmcn-asb:0020.
Testo completoZagrai, Ioan, Luminita Zagrai e Angela Festila. "Preliminary Results on Behavior of Transgenic and Conventional Plum to Natural PPV Infection in a New Field Trial". Bulletin of University of Agricultural Sciences and Veterinary Medicine Cluj-Napoca. Horticulture 73, n. 2 (30 novembre 2016): 274. http://dx.doi.org/10.15835/buasvmcn-hort:12292.
Testo completoKomínek, Petr, Jaroslav Polák, Marcela Komínková e Ralph Scorza. "Gene flow was not detected from a field trial of transgenic plum cv. HoneySweet – Short Communication". Plant Protection Science 55, No. 2 (17 febbraio 2019): 90–92. http://dx.doi.org/10.17221/96/2018-pps.
Testo completoZagrai, Ioan, Luminița Antonela Zagrai e Georgeta Maria Guzu. "HONEYSWEET TRANSGENIC PLUM HAS A NEUTRAL EFFECT ON DIVERSITY AND DYNAMICS APHID POPULATION UNDER TEMPERATE CONTINENTAL CLIMATE CONDITIONS". Fruit Growing Research 39 (12 dicembre 2023): 120–27. http://dx.doi.org/10.33045/fgr.v39.2023.15.
Testo completoScorza, R., J. M. Hily, A. Callahan, T. Malinowski, M. Cambra, N. Capote, I. Zagrai, V. Damsteegt, P. Briard e M. Ravelonandro. "DEREGULATION OF PLUM POX RESISTANT TRANSGENIC PLUM 'HONEYSWEET'". Acta Horticulturae, n. 738 (marzo 2007): 669–73. http://dx.doi.org/10.17660/actahortic.2007.738.88.
Testo completoKrška, Boris, Klára Gogolková, Jana Horsáková e Jaroslav Polák. "Effects of economically important virus diseases on the expression of some pomological traits and nutritional compounds in GM plum cultivar HoneySweet (Prunus domestica L.)". Horticultural Science 44, No. 1 (21 febbraio 2017): 1–5. http://dx.doi.org/10.17221/30/2015-hortsci.
Testo completoTesi sul tema "Honeysett"
Oliveira, Júnior Gildásio Antonio de. "Honeyselk : um ambiente para pesquisa e visualização de ataques cibernéticos em tempo real". reponame:Repositório Institucional da UnB, 2016. http://repositorio.unb.br/handle/10482/22886.
Testo completoSubmitted by Camila Duarte (camiladias@bce.unb.br) on 2017-01-25T15:28:38Z No. of bitstreams: 1 2016_GildásioAntoniodeOliveiraJúnior.pdf: 4791513 bytes, checksum: 9cce1023de6318d9405f9be7d6680634 (MD5)
Approved for entry into archive by Raquel Viana(raquelviana@bce.unb.br) on 2017-03-13T18:28:49Z (GMT) No. of bitstreams: 1 2016_GildásioAntoniodeOliveiraJúnior.pdf: 4791513 bytes, checksum: 9cce1023de6318d9405f9be7d6680634 (MD5)
Made available in DSpace on 2017-03-13T18:28:49Z (GMT). No. of bitstreams: 1 2016_GildásioAntoniodeOliveiraJúnior.pdf: 4791513 bytes, checksum: 9cce1023de6318d9405f9be7d6680634 (MD5)
Dado o grande número de vulnerabilidades em sistemas de informação e a atividade contínua dos atacantes, é cada vez mais necessário usar técnicas de detecção de tráfego malicioso para identificação e proteção contra ataques cibernéticos. Portanto, é importante operacionalizar intencionalmente um ambiente cibernético para ser invadido e comprometido, a fim de permitir que profissionais de segurança analisem a evolução dos diversos ataques e vulnerabilidades exploradas. Este trabalho propõe uma arquitetura projetada para a pesquisa e a obtenção de informações do ponto de vista dos atacantes. A solução, denominada HoneySELK, foi implementada e seus resultados avaliados para mostrar sua capacidade de coletar, analisar e visualizar uma grande quantidade de ataques cibernéticos em tempo real.
Due to the large number of vulnerabilities in information systems and the continuous activity of attackers, techniques for malicious traffic detection are required to identify and protect against cyber-attacks. Therefore, it is important to intentionally operate a cyber environment to be invaded and compromised in order to allow security professionals to analyze the evolution of the various attacks and exploited vulnerabilities. In this paper, we propose a security architecture deployed specifically for research and information gathering from the attackers’ point of view. This architecture, named HoneySELK, is described and its results are evaluated to show its ability to collect, analyze, and visualize large amount of cyber-attacks in real time.
Libri sul tema "Honeysett"
Honeysett, Martin. The best of Honeysett. Newton Abbot: David & Charles, 1985.
Cerca il testo completoHelton, Peter. Headcase. Long Preston: Magna, 2011.
Cerca il testo completoHelton, Peter. Headcase. New York: Carroll & Graf, 2005.
Cerca il testo completoHelton, Peter. Headcase. New York: Carroll & Graf, 2005.
Cerca il testo completoHelton, Peter. Headcase. New York: Carroll & Graf, 2005.
Cerca il testo completoHelton, Peter. Slim chance. London: Constable, 2006.
Cerca il testo completoHelton, Peter. Slim chance. New York: Carroll & Graf, 2006.
Cerca il testo completoHelton, Peter. Headcase (Chris Honeysett Murder Mystery). Constable and Robinson, 2005.
Cerca il testo completoHelton, Peter. Slim Chance: A Chris Honeysett Murder Mystery Set in Bath (Chris Honeysett Murder Mysteries). Carroll & Graf, 2006.
Cerca il testo completoLock 13: A Chris Honeysett mystery. Severn House, 2017.
Cerca il testo completoCapitoli di libri sul tema "Honeysett"
Dagon, David, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian Grizzard, John Levine e Henry Owen. "HoneyStat: Local Worm Detection Using Honeypots". In Lecture Notes in Computer Science, 39–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30143-1_3.
Testo completoScorza, Ralph, Ann Callahan, Michel Ravelonandro e Michael Braverman. "Development and Regulation of the Plum Pox Virus Resistant Transgenic Plum ‘HoneySweet’". In Regulation of Agricultural Biotechnology: The United States and Canada, 269–80. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-2156-2_12.
Testo completo