Search

Your search keyword '"Buchanan, William J."' showing total 64 results

Search Constraints

Start Over You searched for: Author "Buchanan, William J." Remove constraint Author: "Buchanan, William J." Database OpenAIRE Remove constraint Database: OpenAIRE
64 results on '"Buchanan, William J."'

Search Results

1. Enabling Quantum Cybersecurity Analytics in Botnet Detection: Stable Architecture and Speed-up through Tree Algorithms

2. Majority Voting Approach to Ransomware Detection

4. Review of the NIST Light-weight Cryptography Finalists

5. The Future of Integrated Digital Governance in the EU: EBSI and GLASS

6. NapierOne: A modern mixed file data set alternative to Govdocs1

7. Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

8. PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching

9. A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports

10. GLASS: Towards Secure and Decentralized eGovernance Services using IPFS

11. A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT

13. Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates

14. A Distributed Trust Framework for Privacy-Preserving Machine Learning

16. TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies

17. Fast Probabilistic Consensus with Weighted Votes

18. PyDentity: A playground for education and experimentation with the Hyperledger verifiable information exchange platform

19. Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device

20. Protocol for Asynchronous, Reliable, Secure and Efficient Consensus (PARSEC) Version 2.0

22. Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge

23. Open-source Data Analysis and Machine Learning for Asthma Hospitalisation Rates

24. Machine learning and semantic analysis of in-game chat for cyber bullying

25. 'I am Spartacus' – privacy enhancing technologies and privacy as a public good

26. Cloud-based identity and identity meta-data: secure and control own data in globalization era

29. Minimising collateral damage: privacy-preserving Investigative data acquisition platform

30. Crime risk evaluation within information sharing between the Police and community partners

31. How academic IT departments manage changing IT environments

32. Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs

33. Review of 'Coding for Success' implementation

34. AES Encryption and Decryption in Microsoft .NET

35. Analysis of Information governance and patient data protection within primary health care

36. 3DES Encryption and Decryption in Microsoft .NET

37. Mass customisation through personalised brochures: the role of digital printing

38. Uzytkowanie Komputerow

39. Handbook of data communications and networks

40. The complete handbook of the Internet

41. EML in the support of minority languages

42. Mastering Delphi programming

43. Mastering Computing

44. Advanced PC architecture

45. Distributed systems and networks

46. Computer busses

47. Mastering Microsoft Windows, Novell NetWare and UNIX

48. PC Interfacing, communications and Windows programming

49. Mastering Java

50. Mastering Pascal and Delphi programming

Catalog

Books, media, physical & digital resources