„Computer Science - IT-Security“
Suchergebnisse
1.000+ Treffer
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIX
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVI – Special Issue on Data Warehousing and Knowledge Discovery
-
SonicEvasion: a stealthy ultrasound based invasion using covert communication in smart phones and its security
-
Costas array based key pre-distribution scheme (CAKPS) for WSN and its performance analysis
-
NCAM-CS: neural combinatorial auction mechanisms with item complementarity and substitutability
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems LII
-
On the security of the initial tropical Stickel protocol and its modification based on Linde–de la Puente matrices
-
Security and Cryptography – 20th International Conference, SECRYPT 2023, Rome, Italy, July 10–12, 2023, and 21st International Conference, SECRYPT 2024, Dijon, France, July 8-10, 2024, Revised Selected Papers
-
Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing
-
Financial Cryptography and Data Security – FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers
-
Advanced in Computer Science and its Applications – CSA 2013
-
Cyberterrorism and its Implications. An In-depth Analysis of India's Cybersecurity
-
Cyberterrorism and Its Implications. An In-depth Analysis of India's Cybersecurity
-
AVINet: adaptive variational iteration network for low light image enhancement
-
Recent advances in multi-objective whale optimization algorithm, its versions and applications
-
I-AIR: intention-aware travel itinerary recommendation via multi-signal fusion and spatiotemporal constraints
-
LightNet: a lightweight head pose estimation model for online education and its application to engagement assessment
-
Correction to: SonicEvasion: a stealthy ultrasound based invasion using covert communication in smart phones and its security
-
Knowledge graph completion based on iteratively learning embeddings and noise-aware rules
-
Engineering Secure Software and Systems – Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings