„computer security“
Suchergebnisse
8.138 Treffer
-
Physical-layer security analysis of PSK quantum-noise randomized cipher in optically amplified links
-
Organizational information security policies: a review and research framework
-
Compared to what? Estimating the relative concentration of crime at places using systematic and other reviews
-
Uncertain extensive game with application to resource allocation of national security
-
Selection of Pareto-efficient response plans based on financial and operational assessments
-
ZLBM: zero level binary mapping technique for video security
-
A new approach for managing Android permissions: learning users’ preferences
-
On the security of warning message dissemination in vehicular Ad hoc networks
-
Mapping the coverage of security controls in cyber insurance proposal forms
-
Analysis for malware detection
-
Pattern matching of signature-based IDS using Myers algorithm under MapReduce framework
-
On the use of watermark-based schemes to detect cyber-physical attacks
-
Private Blocking Technique for Multi-party Privacy-Preserving Record Linkage
-
Top-k Team Recommendation and Its Variants in Spatial Crowdsourcing
-
Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication
-
Security Measures Against a Rogue Network-on-Chip
-
A systematic review of tagging as a method to reduce theft in retail environments
-
Improving Secrecy Outage and Throughput Performance in Two-Way Energy-Constraint Relaying Networks Under Physical Layer Security
-
c't Security 2013 – Rundumschutz und Rezepte gegen den Abhörwahn
-
Security Analysis and Enhancement of the Most Recent RFID Authentication Protocol for Telecare Medicine Information System