Search

Your search keyword '"Proxy"' showing total 86 results

Search Constraints

Start Over You searched for: Descriptor "Proxy" Remove constraint Descriptor: "Proxy" Publication Type eBooks Remove constraint Publication Type: eBooks
86 results on '"Proxy"'

Search Results

8. A Simple Policy Update Method for the Sharing of Privatized Personal Health Information

9. FIDO2 Passwordless Authentication for Remote Devices

10. History Matching and Robust Optimization Using Proxies

15. A Blockchain-Based Proxy Oriented Cloud Storage Public Audit Scheme for Low-Performance Terminal Devices

16. Advantages of Machine Learning in Networking-Monitoring Systems to Size Network Appliances and Identify Incongruences in Data Networks

17. Sampling Methodology for Assessing a Multi-proxy Bioavailable Strontium Isotope Baseline for the Orenburg Region (Russia): Fieldwork Results

18. X-Pro: Distributed XDP Proxies Against Botnets of Things

20. The Power of Proxy Data and Proxy Networks for Hyper-parameter Optimization in Medical Image Segmentation

23. Upgradeability Concept for Collaborative Blockchain-Based Business Process Execution Framework

24. Development the Online Operating System of Urban Infrastructure Data

25. Cyber-Physical Attacks and the Value of Healthcare Data: Facing an Era of Cyber Extortion and Organised Crime

28. Observer Effect: How Intercepting HTTPS Traffic Forces Malware to Change Their Behavior

30. A New Scalable Botnet Detection Method in the Frequency Domain

33. Protocol Conversion Approach to Include Devices with Administration Restriction on a Framework of Reference of Management Network

35. Using Care Professionals as Proxies in the Design Process of Welfare Technology – Perspectives from Municipality Care

38. Betreuung beantragen: 16 Lektionen für gesetzliche Betreuer zum Betreuungsrecht ohne Entmündigung

39. Staatliche Cyberkonflikte

40. A Basic Proxy System Design for Integrating Complicated Distributed Simulation Systems

41. AuthentIx: Detecting Anonymized Attacks via Automated Authenticity Profiling

42. Practical Application Layer Emulation in Industrial Control System Honeypots

43. A Self-configuration Web-API for the Internet of Things

47. Propagation of Behavioral Variations with Delegation Proxies

48. Caml Crush: A PKCS#11 Filtering Proxy

49. Institutionelle Stimmrechtsberatung. : Rechtstatsachen, Rechtsökonomik, rechtliche Rahmenbedingungen und Regulierungsstrategien.

50. Informed Consent, Proxy Consent, and Catholic Bioethics : For the Good of the Subject

Catalog

Books, media, physical & digital resources