Results 111 to 120 of about 151,861 (137)
Some of the next articles are maybe not open access.
A Survey on Metaverse: Fundamentals, Security, and Privacy
IEEE Communications Surveys and Tutorials, 2023Yuntao Wang, Zhou, Ning Zhang
exaly
Face recognition system for access control using principal component analysis
International Conference on Speech Technology and Human-Computer Dialogue, 2017Nikita Bakshi, V. Prabhu
semanticscholar +1 more source
Security evaluation of a wireless ad-hoc network with dynamic topology
Automatic Control and Computer Sciences, 2017M. Kalinin, A. Minin
semanticscholar +1 more source
Intrusion detection technique by using fuzzy ART on computer network security
2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2012Preecha Somwang, W. Lilakiatsakun
semanticscholar +1 more source
Foundations of Security Analysis and Design VII
Lecture Notes in Computer Science, 2014A. Aldini, R. Gorrieri
semanticscholar +1 more source
Circularly polarized lanthanide luminescence for advanced security inks
Nature Reviews Chemistry, 2020Lewis Edward MacKenzie, Robert Pal
exaly
International Conference on Cryptography, Security and Privacy, 2014
S. Lekshmi +2 more
semanticscholar +1 more source
S. Lekshmi +2 more
semanticscholar +1 more source

