„data security“
Suchergebnisse
6.107 Treffer
-
A probabilistic approach to compute strategies for players of a search game in a bounded space
-
A hierarchical fuzzy logic systems frame work for data security
-
K-modestream algorithm for clustering categorical data streams
-
Trust management technique in wireless sensor networks: challenges and issues for reliable communication: a review
-
Using virtual reality in criminological research
-
Exploring the role of information security news descriptions on retweet proneness and user interactions
-
Empowering Network Security through Advanced Analysis of Malware Samples: Leveraging System Metrics and Network Log Data for Informed Decision-Making
-
Data security using RTL algorithm with chaos synchronization for VLC system
-
Personal Data Breaches – eine Untersuchung der praxisrelevanten Rechtsfragen im Zusammenhang mit Verletzungen des Schutzes personenbezogener Daten unter besonderer Berücksichtigung der Schnittstellen von europäischem und nationalem Recht
-
Shadow AI: Cyber Security Implications, Opportunities and Challenges in the Unseen Frontier
-
Security and Management and Wireless Networks – 23rd International Conference, SAM 2024 and 23rd International Conference, ICWN 2024, Held as Part of the World Congress in Computer Science, Computer Engineering and Applied Computing, CSCE 2024, Las Vegas, NV, USA, July 22–25, 2024, Revised Selected Papers
-
International remittances’ impact on household welfare and food security in Bangladesh: evidence from cross-sectional data
-
Data and Applications Security XVII – Status and Prospects
-
Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach
-
Transfer learning for detecting unknown network attacks
-
Transactions on large-scale data- and knowledge-centered systems
-
Information Sciences and Systems 2015 – 30th International Symposium on Computer and Information Sciences (ISCIS 2015)
-
IT-Sicherheit – Konzepte - Verfahren - Protokolle
-
IT-Sicherheit – Konzepte - Verfahren - Protokolle
-
IT-Sicherheit – Konzepte - Verfahren - Protokolle