„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
Video Steganography Using Knight Tour Algorithm and LSB Method for Encrypted Data
-
Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding
-
On translation hyperovals in semifield planes
-
A classification of planes intersecting the Veronese surface over finite fields of even order
-
A note on the Walsh spectrum of the Flystel
-
A generalized construction of variable-length non-overlapping codes
-
On equidistant single-orbit cyclic and quasi-cyclic subspace codes
-
Secret and shared keys recovery on hamming quasi-cyclic with SASCA
-
Ehr management evolution through purpose-based access control and blockchain smart contracts
-
Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles
-
Enhancing time-series access control using deep recurrent neural networks and generative adversarial networks
-
On the effectiveness of adversarial samples against ensemble learning-based windows PE malware detectors
-
Artificial intelligence for system security assurance: A systematic literature review
-
Theoretical lower bounds for one-dimensional locally private estimations with missing data – Proofs with three types of missing mechanisms
-
Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation
-
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter
-
Exploring smooth number-based MAC algorithms for secure communication in IoT devices: a systematic literature review
-
Accurate code fragment clone detection and its application in identifying known CVE clones
-
Industrial network intrusion detection in open-set scenarios
-
Real-time open-file backup system with machine-learning detection model for ransomware