„computer security“
Suchergebnisse
8.138 Treffer
-
A data security and integrity framework using third-party cloud auditing
-
Digital financial inclusion: next frontiers—challenges and opportunities
-
Behavior science led technology for financial wellness
-
Toward automated regulatory compliance
-
Central bank digital currencies: policy and operational perspectives for India
-
A hybrid model for data security and preserving anonymity using machine learning
-
Dynamic forest of random subsets-based one-time signature-based capability enhancing security architecture for named data networking
-
SonicEvasion: a stealthy ultrasound based invasion using covert communication in smart phones and its security
-
Group security using ECC
-
ICT Systems Security and Privacy Protection – 40th IFIP International Conference, SEC 2025, Maribor, Slovenia, May 21–23, 2025, Proceedings, Part II
-
A review of effectiveness of Saudi E-government data security management
-
Palm leaf manuscripts: Saaswathaiswaryam the eternal treasure of India
-
A model to detect fake profile on Instagram using rule-based approach
-
Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture
-
How to Better Distinguish Security Bug Reports (Using Dual Hyperparameter Optimization)
-
A machine learning analysis of serious misconduct among Australian police
-
Security Analysis of the Access Control Solution of NDN Using BAN Logic
-
Testimony at court: a randomised controlled trial investigating the art and science of persuading witnesses and victims to attend trial
-
Aktuelle Entwicklungen des Rechtsrahmens der Cybersicherheit und Privatheit – Sammelband zur ATHENE-Konferenz 2025 in Darmstadt
-
CAFM-Handbuch – Digitalisierung im Facility Management erfolgreich einsetzen