„Security Computing“
Suchergebnisse
2.343 Treffer
-
Security and Dependability for Federated Cloud Platforms (Dagstuhl Seminar 12281)
-
Secure Architectures in the Cloud (Dagstuhl Seminar 11492)
-
Wirtschaftsspionage – Phänomenologie – Erklärungsansätze – Handlungsoptionen
-
Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment
-
Applied Quantum Computing and Cryptography – Challenges, Opportunities, and Performance Analysis for Algorithms
-
Enhancing the Security of Cloud Manufacturing by Restricting Resource Access
-
Special issue on data management - principles, technologies, and applications
-
Cloud Connector für SAP
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems LVI – Special Issue on Data Management - Principles, Technologies, and Applications
-
Intelligent deep federated learning model for enhancing security in internet of things enabled edge computing environment
-
IT-Prüfung, Datenschutzmanagement und KI-Audit – Neue Ansätze für die IT-Revision
-
Anomaly Detection at “supersonic” Speed
-
Cybersecurity in China – The Next Wave
-
Trusted Computing : eine universelle Sicherheitsplattform kann Marktzutritt beschränken
-
Trusted Computing and Information Security – 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings
-
Guide to Computer Network Security
-
Mobile Security and Trusted Computing (Mobile Sicherheit und vertrauenswürdiges Rechnen)
-
Crowdsourcing privacy policy analysis: Potential, challenges and best practices
-
Pattern-based methods for vulnerability discovery
-
Towards a clean slate: Attempting to preserve civil liberty in the post-Snowden age