„computer security“
Suchergebnisse
8.138 Treffer
-
Untersuchung des forensischen Nutzen von Smart Home Security Systemen : Daten- und Hardwareanalyse sowie Manipulationsversuche am Beispiel eines RING Security Systems
-
The Role of Behavioural Biometrics in Enhancing Industrial Cyber Security
-
Analyzing and mitigating (with LLMs) the security misconfigurations of Helm charts from Artifact Hub
-
Climate variability, population growth, and globalization impacting food security in Pakistan
-
Computational Intelligence in Pattern Recognition – Proceedings of CIPR 2024, Volume 1
-
Ontology-based security modeling in ArchiMate
-
Improving security of the Internet of Things via RF fingerprinting based device identification system
-
Reasoning about software security via synthesized behavioral substitutes
-
From mobile to security – towards secure smartphones
-
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
-
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
-
Social Engineering and Human Hacking – Strategies for the Prevention and Defense Against Manipulation Techniques in IT
-
Large Language Models for Automatic Deidentification of Electronic Health Record Notes – International Workshop, IW-DMRN 2024, Kaohsiung, Taiwan, January 15, 2024, Revised Selected Papers
-
Information Systems – 20th European, Mediterranean, and Middle Eastern Conference, EMCIS 2023, Dubai, United Arab Emirates, December 11-12, 2023, Proceedings, Part II
-
Blockchain drivers to achieve sustainable food security in the Indian context
-
A trust-based security environment in MANET: definition and performance evaluation
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVI – Special Issue on Data Warehousing and Knowledge Discovery
-
Multidisciplinary research and practice for informations systems – proceedings
-
Assessing the sensitivity of physiographical parameters in modeling hydrological ecosystem services that support food security: The case of Vietnamese Mekong Delta
-
Deep learning and ensemble methods for anomaly detection in ICS security