Results 231 to 240 of about 23,723 (266)
Some of the next articles are maybe not open access.

Modeling Cloud Computing Threats and Vulnerabilities

2019
Cloud-computing is a new paradigm with great potentials for delivering a wide variety of services to different types of customers. It can substitute the traditional IT infrastructure and eliminate the requirements for building and maintaining physical IT infrastructure fully or partly. As a result, cloud customers find themselves outsourcing all or a
openaire   +1 more source

Computer Security Vulnerabilities and Preventive Measures

2020
With the development of economy and the progress of science and technology, computer network has been widely used in every field of development in our country, and effectively promote the coming of China’s social information age. As an open tool, the network is widely used in people’s daily life, but it is also because of this characteristic that the ...
openaire   +1 more source

Molecular imaging in oncology: Current impact and future directions

Ca-A Cancer Journal for Clinicians, 2022
Steven P Rowe, Martin G Pomper
exaly  

Discovering New Vulnerabilities In Computer Systems

2012
Vulnerability research plays a key role in preventing and defending against malicious computer system exploitations. Driven by a multi-billion dollar underground economy, cyber criminals today tirelessly launch malicious exploitations, threatening every aspect of daily computing.
openaire   +1 more source

Dynamical memristors for higher-complexity neuromorphic computing

Nature Reviews Materials, 2022
Suhas Kumar   +2 more
exaly  

University Distributed Computer Network Vulnerability Assessment

2023 IEEE International Conference on Smart Information Systems and Technologies (SIST), 2023
Valerii Lakhno   +5 more
openaire   +1 more source

Wall Street discovers computer vulnerability

Computer Fraud & Security Bulletin, 1990
Belden Menkus, Tina Monk
openaire   +1 more source

Evidence for the utility of quantum computing before fault tolerance

Nature, 2023
Youngseok Kim   +2 more
exaly  

Computer Systems Vulnerabilities

International Journal of Information Security and Cybercrime, 2012
openaire   +1 more source

Analogue computing with metamaterials

Nature Reviews Materials, 2020
Farzad Zangeneh-Nejad   +2 more
exaly  

Home - About - Disclaimer - Privacy