Results 231 to 240 of about 1,413,174 (285)
Metasurfaces enable sculpting light in three dimensions. [PDF]
Kim J, Rho J.
europepmc +1 more source
NetworkGuard: An Edge-Based Virtual Network Sensing Architecture for Real-Time Security Monitoring in Smart Home Environments. [PDF]
El Khaled D +3 more
europepmc +1 more source
Kirchhoff Law Johnson noise key generation for secure decentralized identifiers. [PDF]
Mohanasundar K +3 more
europepmc +1 more source
AI-embedded IoT healthcare optimization with trust-aware mobile edge computing. [PDF]
Alamri M +3 more
europepmc +1 more source
Research on network security vulnerability risk contagion in software supply chain based on system dynamics. [PDF]
Cai H, Xiong Q, Lian S.
europepmc +1 more source
An end-to-end convolutional neural network for secure image transmission via joint encryption and steganography. [PDF]
Iqbal A +6 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, 2017
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.
Glīzds, Lauris, Teilāns, Artis
openaire +3 more sources
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.
Glīzds, Lauris, Teilāns, Artis
openaire +3 more sources
IEEE Security & Privacy Magazine, 2004
Computer security has hit the mainstream. This paper is a high-level treatment of computer security, its concepts and terminology, and some pointers about where to go for more information.
Almushilah, Mohammed +2 more
openaire +2 more sources
Computer security has hit the mainstream. This paper is a high-level treatment of computer security, its concepts and terminology, and some pointers about where to go for more information.
Almushilah, Mohammed +2 more
openaire +2 more sources
Journal of AHIMA, 1993
Many factors are contributing to any increased awareness of and interest in computer security. This article has described two aspects of computer security, identification of users and cryptography as a tool for data security. We looked at a number of ways to verify the identity of a user, including things a person knows, has, or is.
L L, Wear, J R, Pinkert
openaire +3 more sources
Many factors are contributing to any increased awareness of and interest in computer security. This article has described two aspects of computer security, identification of users and cryptography as a tool for data security. We looked at a number of ways to verify the identity of a user, including things a person knows, has, or is.
L L, Wear, J R, Pinkert
openaire +3 more sources

