„data security“
Suchergebnisse
1.000+ Treffer
-
Advances in Artificial-Business Analytics and Quantum Machine Learning – Select Proceedings of the 3rd International Conference, Com-IT-Con 2023, Volume 1
-
Machine Learning Approaches in Cybersecurity to Enhance Security in Future Network Technologies
-
Securing Data Sovereignty and Data Security for independent participants in supply chains
-
Parallelized and distributed task based ontology matching in clustering environment with semantic verification
-
Safe registers can achieve correct implementation of peterson’s two process mutual exclusion algorithm
-
Performance evaluation of framework of VoIP/SIP server under virtualization environment along with the most common security threats
-
A computationally efficient non-local maximum likelihood estimation approach for Rician noise reduction in MRI
-
An optimal path selection criterion in multi path routing using energy
-
Green-J $$^{3}$$ 3 Model: a novel approach to measure energy consumption of modified condition/decision coverage using concolic testing
-
Usage Intention of Social Robots for Domestic Purpose: From Security, Privacy, and Legal Perspectives
-
The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal framework
-
Umfassende Sicherheit – Safety und Security im Kontext autonomer Systeme
-
Evolving a communication hierarchy on coordinated tasks using adaptive mobile agents
-
Balancing energy consumption across network for maximizing lifetime in cluster-based wireless sensor network
-
Hybrid test language processing based framework for test case optimization
-
An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1
-
Security-constrained optimal power flow with wind and thermal power generators using fuzzy adaptive artificial physics optimization algorithm
-
Benchmarking of Secure Group Communication schemes with focus on IoT
-
An exploratory study of public reports to investigate patterns and themes of requests for sexual images of minors online
-
Business Continuity Planning for Data Centers and Systems – A Strategic Implementation Guide