Results 251 to 260 of about 112,027 (304)
Editorial: Advances and challenges in AI-driven visual intelligence: bridging theory and practice. [PDF]
Huang B, Zhang D, Liu Q.
europepmc +1 more source
Eliminating single points of trust: a hybrid quantum and post-quantum blockchain with distributed key generation. [PDF]
Goh KW +5 more
europepmc +1 more source
XAPT: Explainable Anomaly-Driven Prediction of Threat Stages in APT Campaigns. [PDF]
Lu W +6 more
europepmc +1 more source
Advancing Brain-Computer Interface Closed-Loop Systems for Neurorehabilitation: Systematic Review of AI and Machine Learning Innovations in Biomedical Engineering. [PDF]
Williams C +7 more
europepmc +1 more source
CaMeLs Can Use Computers Too: System-level Security for Computer Use Agents
Hanna Foerster +8 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, 2017
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.
Glīzds, Lauris, Teilāns, Artis
openaire +3 more sources
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.
Glīzds, Lauris, Teilāns, Artis
openaire +3 more sources
IEEE Security & Privacy Magazine, 2004
Computer security has hit the mainstream. This paper is a high-level treatment of computer security, its concepts and terminology, and some pointers about where to go for more information.
Almushilah, Mohammed +2 more
openaire +2 more sources
Computer security has hit the mainstream. This paper is a high-level treatment of computer security, its concepts and terminology, and some pointers about where to go for more information.
Almushilah, Mohammed +2 more
openaire +2 more sources
Journal of AHIMA, 1993
Many factors are contributing to any increased awareness of and interest in computer security. This article has described two aspects of computer security, identification of users and cryptography as a tool for data security. We looked at a number of ways to verify the identity of a user, including things a person knows, has, or is.
L L, Wear, J R, Pinkert
openaire +3 more sources
Many factors are contributing to any increased awareness of and interest in computer security. This article has described two aspects of computer security, identification of users and cryptography as a tool for data security. We looked at a number of ways to verify the identity of a user, including things a person knows, has, or is.
L L, Wear, J R, Pinkert
openaire +3 more sources
2010 IEEE International Symposium on Information Theory, 2010
Himanshu Tyagi +2 more
openaire +1 more source
Himanshu Tyagi +2 more
openaire +1 more source

