Skip to content

ชมรมลูกศิษย์ ศ.ดร.ประสงค์ ฯ

  • Home
  • HOME
Home Conference Proceedings Proceeding Full NCDT2024

Proceeding Full NCDT2024

Conference Proceedings admin — 18.03.2025 Comments off
Proceeding Full NCDT2024Download

Related Posts

Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media Cyber Science 2023

NCCIT2025 Proceedings

Digital Sovereignty in Cyber Security

Cyber SecurityIntelligence and Analytics (CSIA 2022), Volume 1

The Oxford Handbook of Cyberpsychology

Cybersecurity and High-Performance Computing Environments

admin

  • AI (78)
    • Ethics (3)
  • Architectures (18)
  • Big Data (3)
  • Blockchain (10)
  • Conference Proceedings (19)
  • cyber psychology (4)
  • Cyber Sovereignty (3)
  • Cyber-Physical (10)
  • Cybersecurity (69)
  • Cybersecurity Architecture (3)
  • Cybersecurity Awareness (1)
  • Cybersecurity Capability Maturity Model (C2M2) (3)
  • Data Analysis (5)
  • Data Science (5)
  • Deep Learning (18)
  • Engineering (6)
  • Frameworks (5)
  • Fuzzy (1)
  • ISO (1)
  • Large language models (LLMs) (4)
  • Machine Learning (48)
  • Management (1)
  • Metaverse (1)
  • NIST Special Publication (3)
  • Other (2)
  • Paper (1)
  • Programming (9)
  • Python (4)
  • Research Report (1)
  • Secure coding (1)
  • Systems Analysis and Design (5)
  • Technology (1)
  • thesis (2)
  • Tools (1)
  • การเขียนเชิงวิชาการ (3)
  • วารสารวิชาการ (1)
  • เอกสารคู่มือ (6)
  • เอกสารอ้างอิง (2)
  • The Chief AI Officer’s Handbook
  • Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media Cyber Science 2023
  • Automating Workflows with GitHub Actions: Automate software development workflows and seamlessly deploy your applications using GitHub Actions
  • Generative AI with LangChain Build large language model (LLM) apps with Python, ChatGPT and other LLMs
  • Machine Learning for Decision Sciences with Case Studies in Python
  • NCCIT2025 Proceedings
  • Cybersecurity 2022 Kids Safe Online Activity Book
  • Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
  • Defensive Security Handbook: Best Practices for Securing Infrastructure
  • Automate It with Zapier and Generative AI Harness the power of no-code workflow automation and AI

2014 2016 2017 2018 2019 2020 2021 2022 2023 Academic Academic Writing AI Ariel Evans BERNARD FOX Beyond Security ChatGPT DANIELLE C. TARRAF Data Visualization DGA Dr. Magda Lilia Chelly ECTI ECTI2023 GUY WEICHENBERG JONATHAN WILLIAM WELBURN Mark Sweeney Melissa de Vel-Palumbo MYRON HURA NCCIT NCCIT2020 NCCIT2021 NCCIT2022 NCCIT2023 Neural Networks NIST NSCIC Proceedings Python risk SUZANNE GENC UNESCO Writing Zero Trust ปัญญาประดิษฐ์ มหาวิทยาลัยเทคโนโลยีพระจอมเกล้าพระนครเหนือ แผนพัฒนา

© 2025 ชมรมลูกศิษย์ ศ.ดร.ประสงค์ ฯ - Theme by WPEnjoy · Powered by WordPress