„Security Computing“
Suchergebnisse
2.343 Treffer
-
ARCS 2019 – 32nd GI/ITG International Conference on Architecture of Computing Systems May 20 – 21, 2019, Technical University of Denmark, Copenhagen, Denmark Workshop Proceedings
-
High performance computing approach for DNA motif discovery
-
Identification and integration of security activities for secure agile development
-
DNA QR coding for data security using DNA sequence
-
Enhancing the security in RSA and elliptic curve cryptography based on addition chain using simplified Swarm Optimization and Particle Swarm Optimization for mobile devices
-
A validation of security determinants model for cloud adoption in Saudi organisations’ context
-
A security-based asymmetric cryptographic algorithm to improve IEEE802.11i protocol
-
A checklist based evaluation framework to measure risk of information security management systems
-
Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison
-
Security enhancement technique in cognitive networks
-
Object oriented software security: goal questions metrics approach
-
Smart grid security with AES hardware chip
-
Security concerns and countermeasures in cloud computing: a qualitative analysis
-
Security architectures in wireless sensor network
-
Resource provision and QoS support with added security for client side applications in cloud computing
-
A hierarchical fuzzy logic systems frame work for data security
-
Security and Management and Wireless Networks – 23rd International Conference, SAM 2024 and 23rd International Conference, ICWN 2024, Held as Part of the World Congress in Computer Science, Computer Engineering and Applied Computing, CSCE 2024, Las Vegas, NV, USA, July 22–25, 2024, Revised Selected Papers
-
Quantum Shield for AI Security – Secure Systems, Quantum Blockchain, Adversarial Attacks and Defenses in AI
-
A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development
-
Risk management-based security evaluation model for telemedicine systems