Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

Green computing and communications in critical application domains: Challenges and solutions

Publication Type:

Conference Paper

Authors:

Vyacheslav Kharchenko; Anatoliy Gorbenko; Vladimir Sklyar; Chris Phillips

Source:

The International Conference on Digital Technologies 2013, Zilina, Slovakia (2013)
  • 2104 reads
  • Google Scholar
  • RTF
  • EndNote XML

References

Gorbenko, Anatoliy, Vyacheslav Kharchenko, Olga Tarasyuk, and Alexander Romanovsky. "Intrusion-Avoidance via System Diversity." Information & Security: An International Journal 28, no. 1 (2012): 154-158.
  • Downloads
  • How to cite
No files have yet been downloaded.
APA style: Kharchenko, V., Gorbenko A., Sklyar V., & Phillips C. (2013).  Green computing and communications in critical application domains: Challenges and solutions. The International Conference on Digital Technologies 2013.
Chicago style: Kharchenko, Vyacheslav, Anatoliy Gorbenko, Vladimir Sklyar, and Chris Phillips. "Green computing and communications in critical application domains: Challenges and solutions." In The International Conference on Digital Technologies 2013. Zilina, Slovakia , 2013.
IEEE style: Kharchenko, V., A. Gorbenko, V. Sklyar, and C. Phillips, "Green computing and communications in critical application domains: Challenges and solutions", The International Conference on Digital Technologies 2013, Zilina, Slovakia , 25 July 2013 .
  • Trending
  • Latest
  • Most cited
  • How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race (5,327)
  • National Cyber Security Strategy and the Emergence of Strong Digital Borders (5,122)
  • Austria’s National Cyber Security and Defense Policy: Challenges and the Way Forward (4,798)
  • Cyber Defence in Germany: Challenges and the Way Forward for the Bundeswehr (4,608)
  • Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces (4,284)
view all
  • Conflict Resilience and the Image of the Other among North and South Koreans
  • After the Crisis: The Role of Resilience in Coming Back Stronger
  • The Importance of Resilience in the Agenda Women, Peace and Security, Particularly During the COVID-19 Pandemic
  • Technology as a Resilience Factor in Peace Operations
  • Stabilization Missions – Lessons to Be Learned from Resilience-Based Peacebuilding
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2020
This site was designed and is maintained by Procon Ltd., Publisher of Connections: The Quarterly Journal