Search

Your search keyword '"Doug Tygar"' showing total 2,352 results

Search Constraints

Start Over You searched for: "Doug Tygar" Remove constraint "Doug Tygar" Database Complementary Index Remove constraint Database: Complementary Index
2,352 results on '"Doug Tygar"'

Search Results

1. Automated model generation framework for material flow simulations of production systems.

3. A Red Teaming Framework for Securing AI in Maritime Autonomous Systems.

4. A Survey of Multimodal Perception Methods for Human–Robot Interaction in Social Environments.

5. Vector Network Analyzer (VNA) Measurements for Electrical Impedance Tomography.

8. Anunnaki: A Modular Framework for Developing Trusted Artificial Intelligence.

9. What drives MLOps adoption? An analysis using the TOE framework.

11. Invisible Black-Box Backdoor Attack against Deep Cross-Modal Hashing Retrieval.

13. The Security and Privacy Challenges Toward Cybersecurity of 6G Networks: A Comprehensive Review.

14. Ethnographic Eye-Tracking Interviews: Analyzing Visual Perception and Practices of Looking.

16. IS SOMEONE LISTENING TO YOUR TYPING?

17. Technological dimensions of privacy in Asia.

18. Navigating the landscape of security modelling: the MORS grid.

19. A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software Development.

21. A Survey on Measuring Cognitive Workload in Human-Computer Interaction.

22. Nonverbal Sound in Human-Robot Interaction: A Systematic Review.

23. AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey.

25. Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems.

26. A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning.

27. Semantic Knowledge Graphs for the News: A Review.

28. Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems.

29. Challenges in Deploying Machine Learning: A Survey of Case Studies.

30. Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects.

31. Hybrid password meters for more secure passwords – a comprehensive study of password meters including nudges and password information.

32. A Survey on Machine Learning in Hardware Security.

33. AroMa: Evaluating Deep Learning Systems for Stealthy Integrity Attacks on Multi-tenant Accelerators.

34. Omnisemantics: Smooth Handling of Nondeterminism.

35. Adversarial Learning for Cross Domain Recommendations.

36. Trustworthy AI: A Computational Perspective.

37. Arms Race in Adversarial Malware Detection: A Survey.

38. Space-associated domain adaptation for three-dimensional mineral prospectivity modeling.

42. Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems.

43. A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead.

44. Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain.

46. Arms Race in Adversarial Malware Detection: A Survey.

47. A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education.

48. Anthropomorphize me! - Effects of Robot Gender on Listeners' Perception of the Social Robot NAO in a Storytelling Use Case.

49. Your New Friend NAO vs. Robot No. 783 - Effects of Personal or Impersonal Framing in a Robotic Storytelling Use Case.

50. Detecting Skin Cancer Disease Using Multi Intelligent Techniques.

Catalog

Books, media, physical & digital resources