„data security“
Suchergebnisse
6.107 Treffer
-
Analysis on functionalities and security features of Internet of Things related protocols
-
The impact of channel imperfection and multiple eavesdroppers on security of dual-signal selection in AF-relay systems
-
RETRACTED ARTICLE: The abnormal precipitation in rainy season based on genetic algorithm and the security of big data in network
-
Machine learning-based physical layer security: techniques, open challenges, and applications
-
Research on user security authentication method of eco-environmental monitoring database
-
Deep reinforcement learning-based computation offloading and resource allocation in security-aware mobile edge computing
-
Privacy Technologies and Policy – 13th Annual Privacy Forum, APF 2025, Frankfurt am Main, Germany, October 22–23, 2025, Proceedings
-
Farm diversification and food and nutrition security in Bangladesh: empirical evidence from nationally representative household panel data
-
Computer Security – ESORICS 2025 – 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II
-
Computer Security – ESORICS 2025 – 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV
-
Digitization in the Financial Industry: Empirical Evidence on Data Privacy and Digital Assets
-
Systematic Approaches to Advanced Information Flow Analysis – and Applications to Software Security
-
Cyber Risk Management in the Financial Services Industry, Spillover Effects and Cyber Insurance Products for Private Customers
-
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
-
Der grundrechtliche Schutz der digitalen Identität unter Berücksichtigung von Datenschutz- und IT-Sicherheitsrecht
-
Maritime Moving Target Detection, Tracking and Geocoding Using Range-Compressed Airborne Radar Data
-
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
-
Integration of Network Security Mechanisms in Softwarized Networks with Data Plane Programming and Software-Defined Networking
-
Systematic Approaches to Advanced Information Flow Analysis – and Applications to Software Security
-
Certain Power Management Algorithms for Wireless Sensor Networks by Energy Efficient Data Transmission, Security and Node Deployment