Search

Your search keyword '"COMPUTER security"' showing total 19,987 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER security" Remove constraint Descriptor: "COMPUTER security"
19,987 results on '"COMPUTER security"'

Search Results

1. Device Onboarding Using FDO and the Untrusted Installer Model.

2. How Flexible Is CXL's Memory Protection? Replacing a sledgehammer with a scalpel.

3. Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network.

5. Integrated CPU Monitoring Using 2D Temperature Sensor Arrays Directly Printed on Heat Sinks.

6. Privacy preserving support vector machine based on federated learning for distributed IoT‐enabled data analysis.

7. The rise of "security and privacy": bibliometric analysis of computer privacy research.

8. Social engineering: Methodologies to counter computer attacks on the web. Case: Barrio 26 de Septiembre, Portoviejo, Ecuador.

9. OSS Supply-Chain Security: What Will It Take?

10. Protecting Autonomous Cars from Phantom Attacks.

11. Adversarial mimicry attacks against image splicing forensics: An approach for jointly hiding manipulations and creating false detections.

12. Algorithms patrolling content: where's the harm?

13. UnSafengine64: A Safengine Unpacker for 64-Bit Windows Environments and Detailed Analysis Results on Safengine 2.4.0.

14. Can we quantify trust? Towards a trust-based resilient SIoT network.

16. Ciberseguridad en servicios de apoyo al médico ocupacional de la ciudad de Lima. Estudio piloto.

17. Implementation of two-factor user authentication in computer systems.

18. UNSW‐NB15 computer security dataset: Analysis through visualization.

19. Cryptology as a Way to Teach Advanced Discrete Mathematics.

20. Shadow IT in higher education: survey and case study for cybersecurity.

21. Coming of Age: Stressing the importance of threat models.

22. From Zero to 100: Demystifying zero trust and its implications on enterprise people, process, and technology.

23. PROTECT AND SECURE YOUR WINDOWS COMPUTER: A PRACTICAL GUIDE.

24. Accelerating Cyber Leader Development: A Call to Action for Service War Colleges.

25. Updates, Threats, and Risk Management: Revisiting a recent column considering security updates.

27. Intrusion Detection System with an Ensemble Learning and Feature Selection Framework for IoT Networks.

28. Strengthening Our Intuitions About Hacking.

29. Identification of risk types in innovation projects.

30. Interrupt Stack Protection for Linux Kernel in Hardware Virtualization Layer of ARM64 Architecture.

31. The Empowerment of The Cyber Communities By The Indonesian Goverment From The Perspective of Total War Strategy.

32. ADDP: Anomaly Detection Based on Denoising Pretraining.

33. COMERCIO ELECTRÓNICO Y RIESGOS DE SEGURIDAD DE LA INFORMACIÓN DURANTE LA PANDEMIA DE COVID-19.

34. La inmunización de la red: la inteligencia artificial basada en Python como bloqueo contra los ciberataques.

35. Evolutionary Approaches for Adversarial Attacks on Neural Source Code Classifiers.

36. Deploying Decentralized, Privacy-Preserving Proximity Tracing.

37. Are Software Updates Useless against Advanced Persistent Threats? Considering the conundrum of software updates.

38. Inside Risks: Toward Total-System Trustworthiness; Considering how to achieve the long-term goal to systemically reduce risks.

39. Set the Configuration for the Heart of the OS: On the Practicality of Operating System Kernel Debloating.

40. Recommender Systems under European AI Regulations.

41. STAY CONNECTED... WHEREVER YOU'RE GOING.

42. IoTSim: Internet of Things-Oriented Binary Code Similarity Detection with Multiple Block Relations.

43. Fuzzy CNN Autoencoder for Unsupervised Anomaly Detection in Log Data.

44. MUHASEBE EĞİTİMİNDE DİJİTAL YETKİNLİKLER: TÜRK MUHASEBE MÜFREDATI ÜZERİNE BİR İNCELEME.

45. Strongly nonoutsourceable scratch-off puzzles in blockchain.

46. To what extent does time perspective predict online security behaviour?

47. Performance Evaluation of CNN and Pre-trained Models for Malware Classification.

48. A machine learning approach for digital watermarking.

49. Detecting impersonation episode using teaching learning‐based optimization and support vector machine techniques.

50. Adversarial-Aware Deep Learning System Based on a Secondary Classical Machine Learning Verification Approach.

Catalog

Books, media, physical & digital resources