„data security“
Suchergebnisse
6.107 Treffer
-
Digital Forensics and Cyber Crime – 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9–10, 2024, Proceedings, Part II
-
Security risk and response analysis of typical application architecture of information and communication blockchain
-
Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives
-
Solution of the optimal power flow problem considering security constraints using an improved chaotic electromagnetic field optimization algorithm
-
Advances in Cryptology – ASIACRYPT 2025 – 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part VII
-
Data Science and Reliable Machine Learning – Proceedings from the 4th Codassca Workshop Yerevan, Armenia, October 2024
-
Information Systems Security – 21st International Conference, ICISS 2025, Indore, India, December 16–20, 2025, Proceedings
-
Theory of Cryptography – 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part III
-
Security and Privacy – 4th International Conference, ICSP 2025, Rourkela, India, December 5–7, 2025, Proceedings
-
Security and Privacy in Communication Networks – 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28–30, 2024, Proceedings, Part I
-
Integrating Artificial Intelligence, Security for Environmental and Business Sustainability – Volume 2
-
Borders Don't Stop Hackers: Cybersecurity in a Borderless Digital World – Master Global Threat Landscapes, International Regulations, and Cross-Cultural Security Strategies That Work Anywhere
-
Borders Don't Stop Hackers: Cybersecurity in a Borderless Digital World – Master Global Threat Landscapes, International Regulations, and Cross-Cultural Security Strategies That Work Anywhere
-
Harmonisierung von Datenschutzkonflikten zwischen der DSGVO, dem CLOUD Act und dem chinesischen Datenschutzrecht – Herausforderungen und Strategien
-
Bestands- und Nutzungsdatenauskünfte der Anbieter digitaler Dienste an Strafverfolgungs- und Gefahrenabwehrbehörden
-
Silent Wars: How to Defend Your Business from Corporate Espionage – Discover the hidden threats stealing your secrets—and how to stop them before it's too late.
-
Silent Wars: How to Defend Your Business from Corporate Espionage – Discover the hidden threats stealing your secrets—and how to stop them before it’s too late.
-
Harmonisierung von Datenschutzkonflikten zwischen der DSGVO, dem CLOUD Act und dem chinesischen Datenschutzrecht – Herausforderungen und Strategien
-
Proceedings of Data Analytics and Management – ICDAM 2024, Volume 3
-
Advancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems – First IFIP TC 9, TC 11 International Conference in Cybersecurity, IFIP-UNIVEN-CSIR ICC 2025, Tshwane, South Africa, December 11–12, 2025, Proceedings