„Computer Science - IT-Security“
Suchergebnisse
100 Treffer
-
Network Security – A Technique Stenography for hiding secret in format and its applications
-
Unsupervised Qualitative Scoring for Binary Item Features
-
Contextual Sentiment Neural Network for Document Sentiment Analysis
-
Ecological Security Assessment of the G20 and its Drivers: EF-Path-STIRPAT Modeling
-
Iterative Computation of Security Strategies of Matrix Games with Growing Action Set
-
Visualization of security event logs across multiple networks and its application to a CSOC
-
MMM: Multi-source Multi-net Micro-video Recommendation with Clustered Hidden Item Representation Learning
-
Accuracy enhancement of biometric recognition using iterative weights optimization algorithm
-
On the security of biquadratic C ∗ public-key cryptosystems and its generalizations
-
A non-alternate 3D structure and its practical security evaluation against differential and linear cryptanalysis
-
Advanced in computer science and its applications
-
ASIC implementation of random number generators using SR latches and its evaluation
-
Tools of Transport Telematics – 15th International Conference on Transport Systems Telematics, TST 2015, Wrocław, Poland, April 15-17, 2015. Selected Papers
-
Computer Science and its Applications – Ubiquitous Information Technologies
-
Computer science and its applications
-
Top-k Team Recommendation and Its Variants in Spatial Crowdsourcing
-
A practical person authentication system using second minor finger knuckles for door security
-
The big data analysis of land use evolution and its ecological security responses in Silver Beach of China by the clustering of spatial patterns
-
A fast watermarking algorithm with enhanced security using compressive sensing and principle components and its performance analysis against a set of standard attacks
-
An approach to clone detection in sequence diagrams and its application to security analysis