Search

Your search keyword '"Digital security"' showing total 352 results

Search Constraints

Start Over You searched for: Descriptor "Digital security" Remove constraint Descriptor: "Digital security" Topic computer Remove constraint Topic: computer
352 results on '"Digital security"'

Search Results

1. Cybersecurity Digital Labels for Connected and Autonomous Vehicles

2. SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels

3. Cybersecurity and the new firm: surviving online threats

4. Utilizing Computational Complexity to Protect Cryptocurrency Against Quantum Threats: A Review

5. Three Factor Authentication Novel Framework through Improve System Privacy and Data Security

6. HUMAN FACTORS AFFECTING DIGITAL SECURITY

7. From 'Onion Not Found' to Guard Discovery

9. Xoodyak, a lightweight cryptographic scheme

10. Deep Learning in Biometrics: A Survey

12. Personas elektroniskās identifikācijas tiesiskā regulējuma problemātika

13. 'Is my phone hacked?' Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence

14. A preliminary study on the adoption and effectiveness of SameSite cookies as a CSRF defence

15. We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor

16. Application of Blockchain Technology for 7/12 Asset Tracking System

17. The impact of Artificial Intelligence on Data System Security: A Literature Review

18. Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis

19. Reproduction for Insight:Towards Better Understanding the Quality of Students Tests

20. Auditchain: a mechanism for ensuring logs integrity based on proof of existence in a public blockchain

21. Digital technologies in the process of reforming the judiciary

22. Practical forgeries for ORANGE

23. Surveillance of Journalists/Encryption Issues

27. A Review of Two-Factor Authentication: Suggested Security Effort Moves to Mandatory

28. Cyber Emergency Response Team for Bangladesh

29. Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis

30. Proposed Methodology of Text CAPTCHA for Security with Cloud

31. Practices for Engineering Trustworthy Machine Learning Applications

33. Tensions that hinder the implementation of digital security governance

35. Pegasus Spyware – 'A Privacy Killer'

36. Federated Blockchained Supply Chain Management: A CyberSecurity and Privacy Framework

37. Multi-Party Private Set Intersection Protocols for Practical Applications

38. It Started with Templates: The Future of Profiling in Side-Channel Analysis

39. Post-quantum WireGuard

40. Knowledge Management Applied in the Comparative Study of the IRETE Intrusion Methodology to Access to the Computer Systems

41. International Legal Mechanisms for Ensuring Digital Security

42. Toward practical autoencoder-based side-channel analysis evaluations

43. Intrusion Detection Using Deep Learning

44. IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments

45. Machine Learning and Internet of Things for Smart Processing

46. Real-time intelligent image processing for security applications

47. Research on Anti-Counterfeiting Technology Based on Encrypted Two-Dimensional Code

48. The impact of digital literacy on digital security

50. Outlier Detection Methods and the Challenges for their Implementation with Streaming Data

Catalog

Books, media, physical & digital resources