„computer security“
Suchergebnisse
8.138 Treffer
-
Alignment of safety and security risk assessments for modular production systems
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIX
-
Computer Safety, Reliability, and Security – SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014. Proceedings
-
Cyber Security and 5G-assisted Industrial Internet of Things using Novel Artificial Adaption based Evolutionary Algorithm
-
Navigating Misinformation – User-Centered Design and Evaluation of Indicator-Based Digital Interventions
-
Enhancing water security through integrated decision-making and selective withdrawal for sustainable reservoir management
-
On the Move to Meaningful Internet Systems. OTM 2017 Workshops – Confederated International Workshops, EI2N, FBM, ICSP, Meta4eS, OTMA 2017 and ODBASE Posters 2017, Rhodes, Greece, October 23–28, 2017, Revised Selected Papers
-
Künstliche Intelligenz und Krieg – Welche Risiken entstehen, wenn der Mensch die Kontrolle verliert?
-
Identifying security issues in the industrial internet of things
-
How concentrated is crime among victims? A systematic review from 1977 to 2014
-
Security economics: an adversarial risk analysis approach to airport protection
-
Financial cryptography and data security – 25th International Conference, FC 2021, virtual event, March 1-5, 2021, revised selected papers
-
Cloud Database Management System security challenges and solutions: an analysis
-
Poisoning Attacks in Deep Learning Security
-
Mechanized modeling and security proofs for web protocols
-
On security aspects of internet service ecosystems exposing internal networks
-
IT-Forensik – Ein Grundkurs
-
Communication Security for Distributed Mixed-Criticality Systems
-
Correction to: Assessing the adoption of security policies by developers in terraform across different cloud providers
-
Untersuchung des forensischen Nutzen von Smart Home Security Systemen : Daten- und Hardwareanalyse sowie Manipulationsversuche am Beispiel eines RING Security Systems