2025-02-23T08:25:58-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22open-sciencenbuvgovua-19533%22&qt=morelikethis&rows=5
2025-02-23T08:25:58-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22open-sciencenbuvgovua-19533%22&qt=morelikethis&rows=5
2025-02-23T08:25:58-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-23T08:25:58-05:00 DEBUG: Deserialized SOLR response
Overview of the modern methods of protection and security of software systems
Saved in:
Main Authors: | O. O. Letychevskyi, V. S. Peschanenko, Ya. V. Hryniuk, Yu. Radchenko, V. M. Yakovlev |
---|---|
Format: | Article |
Language: | English |
Published: |
2019
|
Series: | Cybernetics and Systems Analysis |
Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001018672 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
2025-02-23T08:25:58-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&rows=40&rows=5&wt=json&json.nl=arrarr&q=id%3A%22open-sciencenbuvgovua-19533%22&qt=morelikethis
2025-02-23T08:25:58-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&rows=40&rows=5&wt=json&json.nl=arrarr&q=id%3A%22open-sciencenbuvgovua-19533%22&qt=morelikethis
2025-02-23T08:25:58-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-23T08:25:58-05:00 DEBUG: Deserialized SOLR response
Similar Items
-
Modern methods and software systems of molecular modeling and application of behavior algebra
by: O. O. Letychevskyi, et al.
Published: (2022) -
Decentralized systems in logistics: usage overview and security issues
by: O. O. Letychevskyi, et al.
Published: (2020) -
Application of machine learning in software engineering: an overview
by: O. G. Moroz, et al.
Published: (2019) -
Application of machine learning in software engineering: an overview
by: Moroz, O.H., et al.
Published: (2019) -
Fuzzing technique and its usage in cybersecurity tasks
by: O. O. Letychevskyi, et al.
Published: (2022)