2025-02-22T16:41:14-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22open-sciencenbuvgovua-9551%22&qt=morelikethis&rows=5
2025-02-22T16:41:14-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22open-sciencenbuvgovua-9551%22&qt=morelikethis&rows=5
2025-02-22T16:41:14-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-22T16:41:14-05:00 DEBUG: Deserialized SOLR response
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
2021
|
Series: | Data recording, storage & processing |
Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001369262 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
open-sciencenbuvgovua-9551 |
---|---|
record_format |
dspace |
spelling |
open-sciencenbuvgovua-95512024-02-25T16:11:45Z Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems A. V. Davydiuk Yu. Zubok 1560-9189 2021 en Data recording, storage & processing http://jnas.nbuv.gov.ua/article/UJRN-0001369262 Article |
institution |
Library portal of National Academy of Sciences of Ukraine | LibNAS |
collection |
Open-Science |
language |
English |
series |
Data recording, storage & processing |
spellingShingle |
Data recording, storage & processing A. V. Davydiuk Yu. Zubok Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems |
format |
Article |
author |
A. V. Davydiuk Yu. Zubok |
author_facet |
A. V. Davydiuk Yu. Zubok |
author_sort |
A. V. Davydiuk |
title |
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems |
title_short |
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems |
title_full |
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems |
title_fullStr |
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems |
title_full_unstemmed |
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems |
title_sort |
applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems |
publishDate |
2021 |
url |
http://jnas.nbuv.gov.ua/article/UJRN-0001369262 |
work_keys_str_mv |
AT avdavydiuk applyingthepredicatelogicforcybersecurityartifactsverificationindesignofthecriticalpurposesystems AT yuzubok applyingthepredicatelogicforcybersecurityartifactsverificationindesignofthecriticalpurposesystems |
first_indexed |
2024-03-30T06:54:38Z |
last_indexed |
2024-03-30T06:54:38Z |
_version_ |
1796878264190369792 |