Search

Your search keyword '"005.8 Data security"' showing total 58 results

Search Constraints

Start Over You searched for: Descriptor "005.8 Data security" Remove constraint Descriptor: "005.8 Data security"
58 results on '"005.8 Data security"'

Search Results

1. Embedded document security using sticky policies and identity based encryption

2. RESCUE : evaluation of a fragmented secret share system in distributed-cloud architecture

3. An agent-based Bayesian method for network intrusion detection

4. An authentication protocol based on chaos and zero knowledge proof

5. A Forensic Audit of the Tor Browser Bundle

6. A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers

7. Trust-aware and Cooperative Routing Protocol for IoT Security

8. MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features

9. Impact of cyberattacks on stock performance: a comparative study

10. Copy-move forgery detection using combined features and transitive matching

11. A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services

12. Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning

13. Top 10 Blockchain Predictions for the (Near) Future of Healthcare

14. Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment

15. Will quantum computers be the end of public key encryption?

16. Decrypting live SSH traffic in virtual environments

17. The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime

18. SMK-means: An Improved Mini Batch K-means Algorithm Based on Mapreduce with Big Data

19. Fingerprinting JPEGs With Optimised Huffman Tables

20. Machine learning and semantic analysis of in-game chat for cyber bullying

21. Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

22. Analysis: Building the Future of EU: Moving Forward with International Collaboration on Blockchain

23. Lightweight cryptography methods

24. Analysis of the adoption of security headers in HTTP

25. The Future Internet: A World of Secret Shares

26. Distance Measurement Methods for Improved Insider Threat Detection

27. A methodology for the security evaluation within third-party Android Marketplaces

28. A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks

29. A RAM triage methodology for Hadoop HDFS forensics

30. Risk assessment for mobile systems through a multilayered hierarchical Bayesian network

31. Password Pattern and Vulnerability Analysis for Web and Mobile Applications

32. The Internet of Things: a security point of view

33. Fundamental Issues in Mobile Healthcare Information Systems

34. If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

35. 'I am Spartacus' – privacy enhancing technologies and privacy as a public good

36. Garmin satnav forensic methods and artefacts: an exploratory study

37. HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society

38. Approaches to the classification of high entropy file fragments

39. Formal security policy implementations in network firewalls

40. Implementation and evaluation of a botnet analysis and detection method in a virtual environment

41. E-Health: chances and challenges of distributed, service oriented architectures

42. Cryptographic privacy-preserving enhancement method for investigative data acquisition

43. Minimising collateral damage: privacy-preserving Investigative data acquisition platform

44. Crime risk evaluation within information sharing between the Police and community partners

45. Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs

46. AES Encryption and Decryption in Microsoft .NET

47. 3DES Encryption and Decryption in Microsoft .NET

48. Framework for network IDS evaluation

49. An integrated firewall policy validation tool

50. Culture & biometrics: regional differences in the perception of biometric authentication technologies

Catalog

Books, media, physical & digital resources