„data security“
Suchergebnisse
6.107 Treffer
-
IoT: Security risks and opportunities – End of product lifecycle analysis
-
Security für Data-Warehouse- und Business-Intelligence-Systeme – Konzepte, Vorgehen und Praxis
-
Security für Data-Warehouse- und Business-Intelligence-Systeme – Konzepte, Vorgehen und Praxis
-
Application of Markov Process Algorithm Based on Mobile System Security in Financial Risk Model
-
IT-Risikomanagement von Cloud-Services in Kritischen Infrastrukturen – HMD Best Paper Award 2017
-
Sicherheitskritische Mensch-Computer-Interaktion – Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement
-
Beobachtungsmöglichkeiten im Domain Name System – Angriffe auf die Privatsphäre und Techniken zum Selbstdatenschutz
-
A redundant weight removal method inspired by specific immunotherapy for boosting transfer learning security
-
Design Considerations for Broker Federation Architectures for Data-Driven Business Processes in Aviation
-
Enhancing Data Ingestion Efficiency in Cloud-Based Systems: A Design Pattern Approach
-
Improved Health Care Monitoring System Using Proposed LRRN-DLNN Algorithm Based on CPPFFR AI Data Preservation and ESRCC-Based Security
-
Rethinking the Denoising Strategy in Session-Based Recommendation via Bidirectional Information Flow
-
A Comprehensive Survey on Deep Learning Techniques in Educational Data Mining
-
The Practical Real-Time Enterprise – Facts and Perspectives
-
Enterprise Identity Management – Towards an Investment Decision Support Approach
-
The Cyber Risk Handbook – Creating and Measuring Effective Cybersecurity Capabilities
-
The Cyber Risk Handbook – Creating and Measuring Effective Cybersecurity Capabilities
-
Electronic Government and the Information Systems Perspective – Third International Conference, EGOVIS 2014, Munich, Germany, September 1-3, 2014. Proceedings
-
Security with Noisy Data – On Private Biometrics, Secure Key Storage and Anti-Counterfeiting
-
Intelligent intrusion detection system based on crowd search optimization for attack classification in network security