Results 231 to 240 of about 23,723 (266)
Some of the next articles are maybe not open access.
Modeling Cloud Computing Threats and Vulnerabilities
2019Cloud-computing is a new paradigm with great potentials for delivering a wide variety of services to different types of customers. It can substitute the traditional IT infrastructure and eliminate the requirements for building and maintaining physical IT infrastructure fully or partly. As a result, cloud customers find themselves outsourcing all or a
openaire +1 more source
Computer Security Vulnerabilities and Preventive Measures
2020With the development of economy and the progress of science and technology, computer network has been widely used in every field of development in our country, and effectively promote the coming of China’s social information age. As an open tool, the network is widely used in people’s daily life, but it is also because of this characteristic that the ...
openaire +1 more source
Molecular imaging in oncology: Current impact and future directions
Ca-A Cancer Journal for Clinicians, 2022Steven P Rowe, Martin G Pomper
exaly
Discovering New Vulnerabilities In Computer Systems
2012Vulnerability research plays a key role in preventing and defending against malicious computer system exploitations. Driven by a multi-billion dollar underground economy, cyber criminals today tirelessly launch malicious exploitations, threatening every aspect of daily computing.
openaire +1 more source
Dynamical memristors for higher-complexity neuromorphic computing
Nature Reviews Materials, 2022Suhas Kumar +2 more
exaly
University Distributed Computer Network Vulnerability Assessment
2023 IEEE International Conference on Smart Information Systems and Technologies (SIST), 2023Valerii Lakhno +5 more
openaire +1 more source
Wall Street discovers computer vulnerability
Computer Fraud & Security Bulletin, 1990Belden Menkus, Tina Monk
openaire +1 more source
Evidence for the utility of quantum computing before fault tolerance
Nature, 2023Youngseok Kim +2 more
exaly
Computer Systems Vulnerabilities
International Journal of Information Security and Cybercrime, 2012openaire +1 more source
Analogue computing with metamaterials
Nature Reviews Materials, 2020Farzad Zangeneh-Nejad +2 more
exaly

