Works matching DE "COMPUTER security"
Results: 5000
A review of security of electronic health records.
- Published in:
- Health Information Management Journal, 2005, v. 34, n. 1, p. 13
- By:
- Publication type:
- Article
Electronic Health Records: security, safety and archiving.
- Published in:
- Health Information Management Journal, 2005, v. 34, n. 1, p. 1
- By:
- Publication type:
- Article
Ustanovitev Nacionalnega preiskovalnega urada v Sloveniji kot odziv na sodobne - nekonvencionalne oblike kriminalitete.
- Published in:
- Journal of Criminal Investigation & Criminology / Revija za Kriminalistiko in Kriminologijo, 2010, v. 61, n. 3, p. 307
- By:
- Publication type:
- Article
National Cyber Governance Awareness Policy and Framework.
- Published in:
- International Journal of Legal Information, 2019, v. 47, n. 2, p. 70, doi. 10.1017/jli.2019.22
- By:
- Publication type:
- Article
Flexible Infections: Computer Viruses, Human Bodies, Nation-States, Evolutionary Capitalism.
- Published in:
- Science, Technology & Human Values, 2000, v. 25, n. 4, p. 472, doi. 10.1177/016224390002500404
- By:
- Publication type:
- Article
Public Engagement Through the Development of Science-Based Computer Games: The Wellcome Trust’s “Gamify Your PhD” Initiative.
- Published in:
- Science Communication, 2014, v. 36, n. 3, p. 379, doi. 10.1177/1075547013492436
- By:
- Publication type:
- Article
Multi-step Operations Strategic Framework for Ransomware Protection.
- Published in:
- SAM Advanced Management Journal (Society for Advancement of Management), 2020, v. 85, n. 4, p. 16
- By:
- Publication type:
- Article
Az adatbázisok jogi védelme az Európai Unióban.
- Published in:
- Library Review / Konyvtari Figyelo, 2010, v. 20, n. 2, p. 241
- By:
- Publication type:
- Article
Locked Down: Practical Information Security for Lawyers, Second Edition.
- Published in:
- 2017
- By:
- Publication type:
- Book Review
YOUNG AMERICAN CONSUMERS' PRIOR NEGATIVE EXPERIENCE OF ONLINE DISCLOSURE, ONLINE PRIVACY CONCERNS, AND PRIVACY PROTECTION BEHAVIORAL INTENT.
- Published in:
- Journal of Consumer Satisfaction, Dissatisfaction & Complaining Behavior, 2012, v. 25, p. 179
- By:
- Publication type:
- Article
Multi-Attribute Decision-Making for Intrusion Detection Systems: A Systematic Review.
- Published in:
- International Journal of Information Technology & Decision Making, 2023, v. 22, n. 1, p. 589, doi. 10.1142/S021962202230004X
- By:
- Publication type:
- Article
A VIKOR-BASED MULTIPLE CRITERIA DECISION METHOD FOR IMPROVING INFORMATION SECURITY RISK.
- Published in:
- International Journal of Information Technology & Decision Making, 2009, v. 8, n. 2, p. 267, doi. 10.1142/S0219622009003375
- By:
- Publication type:
- Article
UNIVERSALLY COMPOSABLE BLIND SIGNATURE FUNCTIONALITY.
- Published in:
- International Journal of Information Technology & Decision Making, 2004, v. 3, n. 4, p. 673, doi. 10.1142/S0219622004001318
- By:
- Publication type:
- Article
DECISION MAKING FOR NETWORK HEALTH ASSESSMENT IN AN INTELLIGENT INTRUSION DETECTION SYSTEM ARCHITECTURE.
- Published in:
- International Journal of Information Technology & Decision Making, 2004, v. 3, n. 2, p. 281, doi. 10.1142/S0219622004001057
- By:
- Publication type:
- Article
Quantum Physics Helps Secure Data.
- Published in:
- Innovation, 2006, v. 6, n. 1, p. 72
- By:
- Publication type:
- Article
Reharnessing IT Potential.
- Published in:
- Innovation, 2005, v. 5, n. 3, p. 74
- By:
- Publication type:
- Article
Making the Mobile Internet Secure.
- Published in:
- Innovation, 2004, v. 4, n. 1, p. 48
- By:
- Publication type:
- Article
Joint detection of malicious domains and infected clients.
- Published in:
- Machine Learning, 2019, v. 108, n. 8/9, p. 1353, doi. 10.1007/s10994-019-05789-z
- By:
- Publication type:
- Article
Constraint-based clustering selection.
- Published in:
- Machine Learning, 2017, v. 106, n. 9-10, p. 1497, doi. 10.1007/s10994-017-5643-7
- By:
- Publication type:
- Article
An expressive dissimilarity measure for relational clustering using neighbourhood trees.
- Published in:
- Machine Learning, 2017, v. 106, n. 9-10, p. 1523, doi. 10.1007/s10994-017-5644-6
- By:
- Publication type:
- Article
Weightless neural networks for open set recognition.
- Published in:
- Machine Learning, 2017, v. 106, n. 9-10, p. 1547, doi. 10.1007/s10994-017-5646-4
- By:
- Publication type:
- Article
The security of machine learning.
- Published in:
- Machine Learning, 2010, v. 81, n. 2, p. 121, doi. 10.1007/s10994-010-5188-5
- By:
- Publication type:
- Article
Machine learning in adversarial environments.
- Published in:
- 2010
- By:
- Publication type:
- Editorial
Increasing coverage to improve detection of network and host anomalies.
- Published in:
- Machine Learning, 2010, v. 79, n. 3, p. 307, doi. 10.1007/s10994-009-5145-3
- By:
- Publication type:
- Article
Finding anomalous periodic time series.
- Published in:
- Machine Learning, 2009, v. 74, n. 3, p. 281, doi. 10.1007/s10994-008-5093-3
- By:
- Publication type:
- Article
An Empirical Study of Two Approaches to Sequence Learning for Anomaly Detection.
- Published in:
- Machine Learning, 2003, v. 51, n. 1, p. 73, doi. 10.1023/A:1021830128811
- By:
- Publication type:
- Article
Direct analysis in real time—Mass spectrometry (DART‐MS) in forensic and security applications.
- Published in:
- Mass Spectrometry Reviews, 2018, v. 37, n. 2, p. 171, doi. 10.1002/mas.21509
- By:
- Publication type:
- Article
Exploring injection prevention technologies for security-aware distributed collaborative manufacturing on the Semantic Web.
- Published in:
- International Journal of Advanced Manufacturing Technology, 2011, v. 54, n. 9-12, p. 1167, doi. 10.1007/s00170-010-2983-x
- By:
- Publication type:
- Article
A configurable access control system for networked manufacturing monitoring using XML.
- Published in:
- International Journal of Advanced Manufacturing Technology, 2009, v. 39, n. 11/12, p. 1252, doi. 10.1007/s00170-007-1292-5
- By:
- Publication type:
- Article
Newspaper Journalists Use E-mail to Gather News.
- Published in:
- Newspaper Research Journal, 2004, v. 25, n. 2, p. 58, doi. 10.1177/073953290402500204
- By:
- Publication type:
- Article
Securing JPEG-2000 images in constrained environments: a dynamic approach.
- Published in:
- Multimedia Systems, 2018, v. 24, n. 6, p. 669, doi. 10.1007/s00530-018-0591-z
- By:
- Publication type:
- Article
Improving security of quantization-index-modulation steganography in low bit-rate speech streams.
- Published in:
- Multimedia Systems, 2014, v. 20, n. 2, p. 143, doi. 10.1007/s00530-013-0302-8
- By:
- Publication type:
- Article
Advances in digital media security and right management.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
Security and privacy requirements in interactive TV.
- Published in:
- Multimedia Systems, 2011, v. 17, n. 5, p. 393, doi. 10.1007/s00530-010-0221-x
- By:
- Publication type:
- Article
Dynamic Bayesian approach for detecting cheats in multi-player online games.
- Published in:
- Multimedia Systems, 2008, v. 14, n. 4, p. 221, doi. 10.1007/s00530-008-0113-5
- By:
- Publication type:
- Article
Enhancing wireless video streaming using lightweight approximate authentication.
- Published in:
- Multimedia Systems, 2008, v. 14, n. 3, p. 167
- By:
- Publication type:
- Article
Form - Meaning - Usage Synergy in LSP & Professional Communication: Computer Security in Terms of Frame Semantics.
- Published in:
- Fachsprache: Journal of Professional & Scientific Communication, 2022, v. 44, n. 3/4, p. 169, doi. 10.24989/fs.v44i3-4.1973
- By:
- Publication type:
- Article
Security Implementation in Wireless Sensor Network by RF Signal Obfuscation.
- Published in:
- Wireless Personal Communications, 2019, v. 106, n. 2, p. 805, doi. 10.1007/s11277-019-06191-7
- By:
- Publication type:
- Article
Mitigate Black Hole Attack Using Hybrid Bee Optimized Weighted Trust with 2-Opt AODV in MANET.
- Published in:
- Wireless Personal Communications, 2019, v. 106, n. 2, p. 621, doi. 10.1007/s11277-019-06182-8
- By:
- Publication type:
- Article
Collaboration of Trusted Node and QoS Based Energy Multi Path Routing Protocol for Vehicular Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 4, p. 2833, doi. 10.1007/s11277-018-5965-1
- By:
- Publication type:
- Article
Identify and Inspect Libraries in Android Applications.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 1, p. 491, doi. 10.1007/s11277-018-5456-4
- By:
- Publication type:
- Article
Data Transmission Scheme Considering Node Failure for Blockchain.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 1, p. 179, doi. 10.1007/s11277-018-5434-x
- By:
- Publication type:
- Article
An Improved and Secure Two-factor Dynamic ID Based Authenticated Key Agreement Scheme for Multiserver Environment.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 3, p. 1307, doi. 10.1007/s11277-018-5764-8
- By:
- Publication type:
- Article
A novel attributes anonymity scheme in continuous query.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 2, p. 943, doi. 10.1007/s11277-018-5735-0
- By:
- Publication type:
- Article
A Novel Face Liveness Detection Algorithm with Multiple Liveness Indicators.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 4, p. 1677, doi. 10.1007/s11277-018-5661-1
- By:
- Publication type:
- Article
ELAKA: Energy-Efficient and Lightweight Multi-Server Authentication and Key Agreement Protocol Based on Dynamic Biometrics.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 3, p. 767, doi. 10.1007/s11277-018-5348-7
- By:
- Publication type:
- Article
Capability-Based Access Control with ECC Key Management for the M2M Local Cloud Platform.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 2, p. 519, doi. 10.1007/s11277-017-5216-x
- By:
- Publication type:
- Article
Spatial and Temporal Organization Based Access Control for Wireless Network as a Component of Security Requirements.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 3, p. 4587, doi. 10.1007/s11277-017-4740-z
- By:
- Publication type:
- Article
The Analysis of Firewall Policy Through Machine Learning and Data Mining.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 2, p. 2891, doi. 10.1007/s11277-017-4330-0
- By:
- Publication type:
- Article
Anonymous Password Authenticated Key Exchange Protocol in the Standard Model.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 1, p. 1451, doi. 10.1007/s11277-017-4250-z
- By:
- Publication type:
- Article