„data security“
Suchergebnisse
6.107 Treffer
-
Das Rechtskonforme und effiziente KI-basierte Zeiterfassungssystem – Anforderungen für internationale Banken
-
Proactive Cyber Threat Intelligence – Automating the Intelligence Cycle based on Open Sources
-
Bedrohungsmanagement – Prävention von Gewalt am Arbeitsplatz
-
A study of fuzzy membership functions for dependence decision-making in security robot system
-
Kryptographie
-
Prioritizing and Ranking the Big Data Information Security Risk Spectrum
-
Silent Wars: How to Defend Your Business from Corporate Espionage – Discover the hidden threats stealing your secrets—and how to stop them before it’s too late.
-
Accurate detection of bright spots in electro-luminescence images of photovoltaic panels
-
A representation learning-based time series label propagation for smart grid attack detection
-
Borders Don't Stop Hackers: Cybersecurity in a Borderless Digital World – Master Global Threat Landscapes, International Regulations, and Cross-Cultural Security Strategies That Work Anywhere
-
DIN EN IEC 62351-9 (VDE 0112-351-9), Energiemanagementsysteme und zugehöriger Datenaustausch - IT-Sicherheit für Daten und Kommunikation. Teil 9, Cybersicherheit Schlüsselmanagement für Stromversorgungsanlagen (IEC 62351-9:2023) – = Power systems management and associated information exchange - data and communications security. Part 9, Cyber security key management for power system equipment (IEC 62351-9:2023)
-
Grundlagenforschung für vertrauenswürdige Software
-
Künstliche Intelligenz in der Inneren Sicherheit – Anwendungsfälle und Herausforderungen
-
Design of high-speed all-optical data security system based on XGM in SOA for optical networks
-
Adopting blockchain gamification in education: exploring security, transparency, and trust using SEM analysis
-
Quantum deep learning-enhanced ethereum blockchain for cloud security: intrusion detection, fraud prevention, and secure data migration
-
Mobile network intelligent recommendation based on data mining and network security application in college student employment recommendation system
-
Adaptive network anomaly detection using machine learning approaches
-
Evaluation of computer network data security based on a deep learning algorithm
-
D-NeuRA: customizable dynamic neural rendering for human avatars with disentangled pose and appearance