Results 151 to 160 of about 373,921 (174)
Some of the next articles are maybe not open access.
Circularly polarized lanthanide luminescence for advanced security inks
Nature Reviews Chemistry, 2020Lewis Edward MacKenzie, Robert Pal
exaly
Other Efforts to Secure Data in Computer Networks and Beyond
Texts in Computer Science, 2020J. M. Kizza
semanticscholar +1 more source
Security risk analysis for asset in relation to vulnerability, probability of threats and attacks
International Conference on Innovations in Information Technology, 2008G. Kbar
semanticscholar +1 more source
A Survey on Security Aspects for 3GPP 5G Networks
IEEE Communications Surveys and Tutorials, 2020Jin Cao, Maod, Hui Li
exaly
The security of practical quantum key distribution
Reviews of Modern Physics, 2009Valerio Scarani +2 more
exaly
Security Services Using Blockchains: A State of the Art Survey
IEEE Communications Surveys and Tutorials, 2019Tara Salman +2 more
exaly
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
IEEE Communications Surveys and Tutorials, 2020Amr Mohamed +2 more
exaly
A comprehensive security control selection model for inter-dependent organizational assets structure
Information and Computer Security, 2015M. Shahpasand +3 more
semanticscholar +1 more source
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
IEEE Communications Surveys and Tutorials, 2016Anna L Buczak, Erhan Guven
exaly

