Results 91 to 100 of about 151,861 (137)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Research on computer network information security management and protection strategy
International Conferences on Computers, Information Processing and Advanced Education, 2022With the rapid development of network information technology, we have entered the era of big data. Under this background, computer network information security has also become a major hidden danger.
Zhaoyu Liu
semanticscholar +1 more source
Journal of Information & Knowledge Management, 2023
With advances in computer network technology, the Internet has become an integral part of our daily lives. It goes without saying that providing security to network data is crucial.
Seshu Bhavani Mallampati, Hari Seetha
semanticscholar +1 more source
With advances in computer network technology, the Internet has become an integral part of our daily lives. It goes without saying that providing security to network data is crucial.
Seshu Bhavani Mallampati, Hari Seetha
semanticscholar +1 more source
Principal Component Analysis and Data Encryption Model for Face Recognition System
2022 2nd International Conference on Electronic and Electrical Engineering and Intelligent System (ICE3IS), 2022Face recognition is a biometric technique that uses a computer or machine to facilitate the recognition of human faces. The advantage of this technique is that it can detect faces without direct contact with the device.
Magfirawaty Magfirawaty +5 more
semanticscholar +1 more source
International Journal Artificial Intelligent and Informatics, 2022
Nowadays, with the abundant growth of internet users, attacks on computer systems have dramatically increased. This condition might increase the risk of security for Internet users or networks systems.
F. Nayebi, M.Noorimehr M.Noorimehr
semanticscholar +1 more source
Nowadays, with the abundant growth of internet users, attacks on computer systems have dramatically increased. This condition might increase the risk of security for Internet users or networks systems.
F. Nayebi, M.Noorimehr M.Noorimehr
semanticscholar +1 more source
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2022
Benchmarks are the standards by which technologies can be evaluated and fairly compared. In the field of digital circuits, benchmarks were critical for the development of CAD and FPGA tools decades ago.
Sarah Amir, Domenic Forte
semanticscholar +1 more source
Benchmarks are the standards by which technologies can be evaluated and fairly compared. In the field of digital circuits, benchmarks were critical for the development of CAD and FPGA tools decades ago.
Sarah Amir, Domenic Forte
semanticscholar +1 more source
A Comprehensive Survey on Cloud Security Mechanisms
2022 International Conference on Automation, Computing and Renewable Systems (ICACRS), 2022Cloud computing indicates a tremendous promise for providing on-demand solutions to customers with increased flexibility even at a lower cost over the internet. Cloud service companies efficiently supply their consumers with a variety of storage options.
Dhwani Hakani, P. S. Mann
semanticscholar +1 more source
Nano Security: From Nano-Electronics to Secure Systems
Design, Automation and Test in Europe, 2021The field of computer hardware stands at the verge of a revolution driven by recent breakthroughs in emerging nanodevices. “Nano Security” is a new Priority Program recently approved by DFG, the German Research Council.
I. Polian +22 more
semanticscholar +1 more source
IEEE International Symposium on Signal Processing and Information Technology, 2018
Telemedicine has gained much popularity in recent times. It refers to the use of state of the art telecommunication and information technologies to provide medical and health care services to distant locations.
Ramsha Ahmed, Bilal Hassan, Bo Li
semanticscholar +1 more source
Telemedicine has gained much popularity in recent times. It refers to the use of state of the art telecommunication and information technologies to provide medical and health care services to distant locations.
Ramsha Ahmed, Bilal Hassan, Bo Li
semanticscholar +1 more source

