518 results on '"Ogiela, Lidia"'
Search Results
2. Trusted Computing in Advanced Cybersecurity Solutions
3. Transformative Intelligence in Data Analysis and Knowledge Exploration
4. Cognitive Blind Blockchain CAPTCHA Architecture
5. AI-Based Cybersecurity Systems
6. User-Oriented Solutions in Cybersecurity and Cloud-to-Things Applications
7. Cybersecurity of Distributed Systems and Dispersed Computing
8. Human-Centered Protocols for Secure Data Management in Distributed Systems
9. Personal CAPTCHA-based authentication protocol
10. Hybrid Intelligence Approaches for Distributed Information Management
11. Application of Hybrid Intelligence for Security Purposes
12. Semantic-Based Techniques for Efficient and Secure Data Management
13. Fusion Techniques for Strong Data Protection
14. Modern Cognitive Solutions for Advanced Information Processing
15. Personalized Cryptographic Protocols for Advanced Data Protection
16. Transformative Computing Based on Advanced Human Cognitive Processes
17. Cybersecurity of Distributed Systems and Dispersed Computing
18. Human-Centered Protocols for Secure Data Management in Distributed Systems
19. IoT-based health monitoring system to handle pandemic diseases using estimated computing
20. Human-artificial intelligence approaches for secure analysis in CAPTCHA codes
21. Human Centered Protocols in Transformative Computing
22. Visual Paths in Creation of User-Oriented Security Protocols
23. Data Fusion Protocols for Cloud Infrastructures
24. Implementation of a Device Adopting the OI (Operation Interruption) Protocol to Prevent Illegal Information Flow in the IoT
25. Secure Cognitive Protocols for Data Fusion in Transformative Computing
26. Eye Movement Patterns as a Cryptographic Lock
27. Transformative computing for products sales forecast based on SCIM
28. Semantic-Based Techniques for Efficient and Secure Data Management
29. Application of Hybrid Intelligence for Security Purposes
30. Hybrid Intelligence Approaches for Distributed Information Management
31. Perception-Based Visual Authentication Codes
32. Impact of Sharing Algorithms for Cloud Services Management
33. Application of Cognitive Protocols in Transformative Computing
34. Transformative Computing in Knowledge Extraction and Service Management Processes
35. Cognitive Approaches for Sensor Data Analysis in Transformative Computing
36. Eye Tracking Technology in Personal Authentication Protocols
37. Transformative Computing for Distributed Services Management Protocols
38. Application of Perceptual Features for User Authentication in Distributed Systems
39. User Oriented Protocols for Data Sharing and Services Management
40. Cognitive Personal Security Systems
41. Personalized Protocols for Data Division and Knowledge Management
42. Biometric-Based Linguistic Solutions for Data Encryption and Sharing
43. Multi-level Authentication Protocols Using Scientific Expertise Approach
44. Transformative computing in advanced data analysis processes in the cloud
45. Fusion Techniques for Strong Data Protection
46. Modern Cognitive Solutions for Advanced Information Processing
47. Personalized Cryptographic Protocols for Advanced Data Protection
48. Transformative Computing Based on Advanced Human Cognitive Processes
49. Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies
50. Nature-Inspired Protocols for Cloud Computing and Security Systems
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.