„(lcsh)Computer security.“
Suchergebnisse
1.000+ Treffer
-
Advances in Artificial-Business Analytics and Quantum Machine Learning – Select Proceedings of the 3rd International Conference, Com-IT-Con 2023, Volume 1
-
Machine Learning Approaches in Cybersecurity to Enhance Security in Future Network Technologies
-
Parallelized and distributed task based ontology matching in clustering environment with semantic verification
-
Safe registers can achieve correct implementation of peterson’s two process mutual exclusion algorithm
-
Design of a collaborative virtual environment for training security agents in big events
-
Performance evaluation of framework of VoIP/SIP server under virtualization environment along with the most common security threats
-
A computationally efficient non-local maximum likelihood estimation approach for Rician noise reduction in MRI
-
An optimal path selection criterion in multi path routing using energy
-
Green-J $$^{3}$$ 3 Model: a novel approach to measure energy consumption of modified condition/decision coverage using concolic testing
-
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
-
Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces
-
Safety und Security
-
Usage Intention of Social Robots for Domestic Purpose: From Security, Privacy, and Legal Perspectives
-
The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal framework
-
Umfassende Sicherheit – Safety und Security im Kontext autonomer Systeme
-
Decision support for scheduling security crews at Netherlands Railways
-
Spatially explicit assessment of land ecological security with spatial variables and logistic regression modeling in Shanghai, China
-
Patient and public views about the security and privacy of Electronic Health Records (EHRs) in the UK: results from a mixed methods study
-
Automating trade-off analysis of security requirements
-
Evolving a communication hierarchy on coordinated tasks using adaptive mobile agents