Search

Showing total 661 results

Search Constraints

Start Over You searched for: Topic business Remove constraint Topic: business Topic computers and office automation industries Remove constraint Topic: computers and office automation industries Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
661 results

Search Results

1. Does additional audio really work? A study on users' cognitive behavior with audio-visual dual-channel in panoramic digital museum

2. Extending the classical side-channel analysis framework to access-driven cache attacks

3. A survey on the (in)security of trusted execution environments

4. Full-stack vulnerability analysis of the cloud-native platform

5. A lightweight encrypted deduplication scheme supporting backup

6. A survey on cybersecurity attacks and defenses for unmanned aerial systems

7. Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network

8. CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication

9. A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS

10. DroidRL: Feature selection for android malware detection with reinforcement learning

11. AIDTF: Adversarial training framework for network intrusion detection

12. Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art

13. SoK: Run-time security for cloud microservices. Are we there yet?

14. A comprehensive study of DDoS attacks over IoT network and their countermeasures

15. Distributed query execution under access restrictions

16. Do telecommunications prices depend on consumer engagement?

17. Understanding situation awareness in SOCs, a systematic literature review

18. The BH-mixed scheduling algorithm for DAG tasks with constrained deadlines

19. Efficient persistent memory file systems using virtual superpages with multi-level allocator

20. Semantic Attribute-Based Access Control: A review on current status and future perspectives