Search

Showing total 661 results

Search Constraints

Start Over You searched for: Topic business Remove constraint Topic: business Topic computers and office automation industries Remove constraint Topic: computers and office automation industries Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
661 results

Search Results

1. Does additional audio really work? A study on users' cognitive behavior with audio-visual dual-channel in panoramic digital museum

2. Extending the classical side-channel analysis framework to access-driven cache attacks

3. A survey on the (in)security of trusted execution environments

4. Full-stack vulnerability analysis of the cloud-native platform

5. A lightweight encrypted deduplication scheme supporting backup

6. A survey on cybersecurity attacks and defenses for unmanned aerial systems

7. Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network

8. CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication

9. A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS

10. DroidRL: Feature selection for android malware detection with reinforcement learning

11. AIDTF: Adversarial training framework for network intrusion detection

12. Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art

13. SoK: Run-time security for cloud microservices. Are we there yet?

14. A comprehensive study of DDoS attacks over IoT network and their countermeasures

15. Distributed query execution under access restrictions

16. Do telecommunications prices depend on consumer engagement?

17. Understanding situation awareness in SOCs, a systematic literature review

18. The BH-mixed scheduling algorithm for DAG tasks with constrained deadlines

19. Efficient persistent memory file systems using virtual superpages with multi-level allocator

20. Semantic Attribute-Based Access Control: A review on current status and future perspectives

21. CREW: Computation reuse and efficient weight storage for hardware-accelerated MLPs and RNNs

22. Packet-in request redirection: A load-balancing mechanism for minimizing control plane response time in SDNs

23. Algorithms and architecture support of degree-based quantization for graph neural networks

24. Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer

25. Multiserver configuration for cloud service profit maximization in the presence of soft errors based on grouped grey wolf optimizer

26. A regulatory control framework for decentrally governed DLT systems: Action design research

27. Evaluation of Asian Countries using Data Center Security Index: A Spherical Fuzzy AHP-based EDAS Approach

28. Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments

29. Web-tracking compliance: websites' level of confidence in the use of information-gathering technologies

30. A Taxonomy for Threat Actors' Persistence Techniques

31. Comparative research on network intrusion detection methods based on machine learning

32. Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach

33. Online privacy and market structure: Theory and evidence

34. Partisan selective exposure in news consumption

35. Exclusive content and platform competition in Latin America

36. Let the user speak: Is feedback on Facebook a source of firms' innovation?

37. Telework in the spread of COVID-19

38. KRTunnel: DNS channel detector for mobile devices

39. An empirical study of vulnerability discovery methods over the past ten years

40. Uncovering APT malware traffic using deep learning combined with time sequence and association analysis

41. An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity

42. MMM-RF: A novel high accuracy multinomial mixture model for network intrusion detection systems

43. Energy-efficient acceleration of convolutional neural networks using computation reuse

44. Computing exact WCRT for typed DAG tasks on heterogeneous multi-core processors

45. Reducing Ransomware Crime: Analysis of Victims' Payment Decisions

46. Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise

47. Big Data analytics for sustainability: Insight through technological innovation

48. DIFCS: A Secure Cloud Data Sharing Approach Based on Decentralized Information Flow Control

49. DNN pruning with principal component analysis and connection importance estimation

50. Optimal computational resource pricing in vehicular edge computing: A Stackelberg game approach