Results 251 to 260 of about 112,027 (304)

XAPT: Explainable Anomaly-Driven Prediction of Threat Stages in APT Campaigns. [PDF]

open access: yesIEEE Access
Lu W   +6 more
europepmc   +1 more source

CaMeLs Can Use Computers Too: System-level Security for Computer Use Agents

open access: green
Hanna Foerster   +8 more
openalex   +1 more source

COMPUTER SECURITY

HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, 2017
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.
Glīzds, Lauris, Teilāns, Artis
openaire   +3 more sources

Computer Security

IEEE Security & Privacy Magazine, 2004
Computer security has hit the mainstream. This paper is a high-level treatment of computer security, its concepts and terminology, and some pointers about where to go for more information.
Almushilah, Mohammed   +2 more
openaire   +2 more sources

Computer security.

Journal of AHIMA, 1993
Many factors are contributing to any increased awareness of and interest in computer security. This article has described two aspects of computer security, identification of users and cryptography as a tool for data security. We looked at a number of ways to verify the identity of a user, including things a person knows, has, or is.
L L, Wear, J R, Pinkert
openaire   +3 more sources

COMPUTER SECURITY

Urologic Clinics of North America, 1986
ROY L. WESLEY, JOHN A. WANAT
openaire   +2 more sources

Secure computing

2010 IEEE International Symposium on Information Theory, 2010
Himanshu Tyagi   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy