-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9von: Jiang, Feng2013, in: Where conventional security control validation falls short when evaluating organisational threats
-
10
-
11
-
12
-
13
-
14
-
15
-
16von: Jiang, Feng2022transfer abstract, in: MPI vs Fortran coarrays beyond 100k cores: 3D cellular automata
-
17
-
18von: Jiang, Feng2021transfer abstract, in: Question answering method for infrastructure damage information retrieval from textual data using bidirectional encoder representations from transformers
-
19
-
20