Works matching DE "SECURE Sockets Layer (Computer network protocol)"
Results: 193
Security System Design and Verification for Zero Trust Architecture.
- Published in:
- Electronics (2079-9292), 2025, v. 14, n. 4, p. 643, doi. 10.3390/electronics14040643
- By:
- Publication type:
- Article
Rock slope kinematic instability controlled by large-scale variation of basalt column orientation.
- Published in:
- Bulletin of Engineering Geology & the Environment, 2021, v. 80, n. 1, p. 239, doi. 10.1007/s10064-020-01917-5
- By:
- Publication type:
- Article
Application of Security Technologies in the Public Websites of Banks in Serbia.
- Published in:
- Izvestia Journal of the Union of Scientists - Varna. Economic Sciences Series, 2018, v. 7, n. 2, p. 298
- By:
- Publication type:
- Article
Quantum Cryptography: Myths, Legends, and Hypothesis.
- Published in:
- ISSA Journal, 2021, v. 19, n. 1, p. 22
- By:
- Publication type:
- Article
Tort Liability in Open Source Software Systems.
- Published in:
- ISSA Journal, 2017, v. 15, n. 12, p. 32
- By:
- Publication type:
- Article
Active Learning: Encoder-Decoder-Outlayer and Vector Space Diversification Sampling.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 13, p. 2819, doi. 10.3390/math11132819
- By:
- Publication type:
- Article
A Semi-Federated Active Learning Framework for Unlabeled Online Network Data.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 8, p. 1972, doi. 10.3390/math11081972
- By:
- Publication type:
- Article
Improving Intent Classification Using Unlabeled Data from Large Corpora.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 3, p. 769, doi. 10.3390/math11030769
- By:
- Publication type:
- Article
SPECIFICS OF IMPLEMENTATION OF THE ASYMMETRIC ENCRYPTION ALGORITHM ON ELLIPTIC CURVES.
- Published in:
- Automation of Technological & Business Processes / Avtomatizaciâ Tehnologiceskih i Biznes-Processov, 2023, v. 15, n. 1, p. 1, doi. 10.15673/atbp.v15i1.2484
- By:
- Publication type:
- Article
Application of Pretrained Large Language Models in Embodied Artificial Intelligence.
- Published in:
- Doklady Mathematics, 2022, v. 106, p. S85, doi. 10.1134/S1064562422060138
- By:
- Publication type:
- Article
An innovative three-layer strategy in response to a quartan malaria outbreak among forest goers in Hainan Island, China: a retrospective study.
- Published in:
- Infectious Diseases of Poverty, 2022, v. 11, n. 1, p. 1, doi. 10.1186/s40249-022-01015-6
- By:
- Publication type:
- Article
Orchestrating Collaborative Research and Clinical Trials during COVID-19 Pandemic – A New Normal.
- Published in:
- 2020
- By:
- Publication type:
- Editorial
NAVIGATING THE NEW: INNOVATIVE STRATEGIES FOR TLS CONNECT AND COLLABORATE.
- Published in:
- Access (10300155), 2024, v. 38, n. 1, p. 18
- By:
- Publication type:
- Article
On Evaluating IoT Data Trust via Machine Learning.
- Published in:
- Future Internet, 2023, v. 15, n. 9, p. 309, doi. 10.3390/fi15090309
- By:
- Publication type:
- Article
FREDY: Federated Resilience Enhanced with Differential Privacy.
- Published in:
- Future Internet, 2023, v. 15, n. 9, p. 296, doi. 10.3390/fi15090296
- By:
- Publication type:
- Article
A Bayesian Semisupervised Approach to Keyword Extraction with Only Positive and Unlabeled Data.
- Published in:
- INFORMS Journal on Computing, 2023, v. 35, n. 3, p. 675, doi. 10.1287/ijoc.2023.1283
- By:
- Publication type:
- Article
webODV - operational and ready for the community.
- Published in:
- Bollettino di Geofisica Teorica ed Applicata, 2021, v. 62, p. 119
- By:
- Publication type:
- Article
Risk Factors for Pyroshock Qualification Failure of Satellite Hardware.
- Published in:
- Journal of the IEST, 2018, v. 61, n. 1, p. 31, doi. 10.17764/1098-4321.61.1.31
- By:
- Publication type:
- Article
HTTPAS: active authentication against HTTPS man-in-the-middle attacks.
- Published in:
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 17, p. 2308, doi. 10.1049/iet-com.2016.0331
- By:
- Publication type:
- Article
多特征融合的煤矿网络加密恶意流量检测方法.
- Published in:
- Journal of Mine Automation, 2022, v. 48, n. 7, p. 142, doi. 10.13272/j.issn.1671-251x.17944
- By:
- Publication type:
- Article
Advancing DNS Performance Through an Adaptive Transport Layer Security Model (ad-TLSM).
- Published in:
- Ingénierie des Systèmes d'Information, 2023, v. 28, n. 3, p. 777, doi. 10.18280/isi.280329
- By:
- Publication type:
- Article
Improving Active Learning Performance through the Use of Data Augmentation.
- Published in:
- International Journal of Intelligent Systems, 2023, p. 1, doi. 10.1155/2023/7941878
- By:
- Publication type:
- Article
A Novel Calibration Method for Tri-axial Magnetometers Based on an Expanded Error Model and a Two-step Total Least Square Algorithm.
- Published in:
- Mobile Networks & Applications, 2022, v. 27, n. 2, p. 794, doi. 10.1007/s11036-021-01898-z
- By:
- Publication type:
- Article
Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing.
- Published in:
- Mobile Networks & Applications, 2017, v. 22, n. 5, p. 848, doi. 10.1007/s11036-017-0851-8
- By:
- Publication type:
- Article
Benchmarking of lightweight cryptographic algorithms for wireless IoT networks.
- Published in:
- Wireless Networks (10220038), 2022, v. 28, n. 8, p. 3453, doi. 10.1007/s11276-022-03046-1
- By:
- Publication type:
- Article
Temporal positional lexicon expansion for federated learning based on hyperpatism detection.
- Published in:
- Expert Systems, 2023, v. 40, n. 5, p. 1, doi. 10.1111/exsy.13183
- By:
- Publication type:
- Article
TLS2trees: A scalable tree segmentation pipeline for TLS data.
- Published in:
- Methods in Ecology & Evolution, 2023, v. 14, n. 12, p. 3083, doi. 10.1111/2041-210X.14233
- By:
- Publication type:
- Article
A Tri-Training method for lithofacies identification under scarce labeled logging data.
- Published in:
- Earth Science Informatics, 2023, v. 16, n. 2, p. 1489, doi. 10.1007/s12145-023-00986-w
- By:
- Publication type:
- Article
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features.
- Published in:
- Journal of Information & Communication Technology, 2022, v. 21, n. 3, p. 279, doi. 10.32890/jict2022.21.3.1
- By:
- Publication type:
- Article
Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme.
- Published in:
- International Journal of Distributed Sensor Networks, 2016, p. 1, doi. 10.1155/2016/5235714
- By:
- Publication type:
- Article
API Misuse Detection in C Programs: Practice on SSL APIs.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2019, v. 29, n. 11/12, p. 1761, doi. 10.1142/S0218194019400205
- By:
- Publication type:
- Article
Tracking unlabeled cancer cells imaged with low resolution in wide migration chambers via U-NET class-1 probability (pseudofluorescence).
- Published in:
- Journal of Biological Engineering, 2023, v. 17, n. 1, p. 1, doi. 10.1186/s13036-022-00321-9
- By:
- Publication type:
- Article
Do different indices of forest structural heterogeneity yield consistent results?
- Published in:
- iForest - Biogeosciences & Forestry, 2022, v. 15, n. 5, p. 424, doi. 10.3832/ifor4096-015
- By:
- Publication type:
- Article
The Study on Assessment of Security Web Applications.
- Published in:
- International Journal of Interactive Mobile Technologies, 2021, v. 15, n. 23, p. 120, doi. 10.3991/ijim.v15i23.27357
- By:
- Publication type:
- Article
Non-destructive classification of unlabeled cells: Combining an automated benchtop magnetic resonance scanner and artificial intelligence.
- Published in:
- PLoS Computational Biology, 2023, v. 19, n. 2, p. 1, doi. 10.1371/journal.pcbi.1010842
- By:
- Publication type:
- Article
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3.
- Published in:
- Journal of Cryptology, 2024, v. 37, n. 2, p. 1, doi. 10.1007/s00145-023-09489-9
- By:
- Publication type:
- Article
Generalization Bounds for Adversarial Contrastive Learning.
- Published in:
- Journal of Machine Learning Research, 2023, v. 24, p. 1
- By:
- Publication type:
- Article
RATIONALE FOR IMPROVING AUTHENTICATION PROTOCOLS IN THE CONDITIONS OF POST-QUANTUM CRYPTOGRAPHY.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2024, v. 30, n. 1, p. 130, doi. 10.18372/2225-5036.30.18614
- By:
- Publication type:
- Article
Unlabeled data selection for active learning in image classification.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-023-50598-z
- By:
- Publication type:
- Article
Unlabeled data selection for active learning in image classification.
- Published in:
- Scientific Reports, 2024, v. 13, n. 1, p. 1, doi. 10.1038/s41598-023-50598-z
- By:
- Publication type:
- Article
Privacy Enforcement on Subscribers Data in Cloud Computing.
- Published in:
- Nigerian Journal of Technology, 2021, v. 40, n. 2, p. 308, doi. 10.4314/njt.v40i2.17
- By:
- Publication type:
- Article
Sound Event Detection in Domestic Environment Using Frequency-Dynamic Convolution and Local Attention.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 10, p. 534, doi. 10.3390/info14100534
- By:
- Publication type:
- Article
THE CONDRO GROUP HACK: INFILTRATING INSTANTSSL.it - A CASE STUDY.
- Published in:
- Journal of Information System Security, 2022, v. 18, n. 3, p. 177
- By:
- Publication type:
- Article
Security Techniques for Data Protection in Cloud Computing: A Review.
- Published in:
- IUP Journal of Computer Sciences, 2021, v. 15, n. 1, p. 12
- By:
- Publication type:
- Article
ESTABLISHING TRUST IN CYBERSECURITY FOR EMBEDDED SYSTEMS.
- Published in:
- EE: Evaluation Engineering, 2020, v. 59, n. 10, p. 20
- By:
- Publication type:
- Article
Dealing with the Heartbleed Bug.
- Published in:
- Teacher Librarian, 2014, v. 41, n. 5, p. 68
- By:
- Publication type:
- Article
Choosing the “Right” Technology to Practice Efficiently and Ethically.
- Published in:
- American Journal of Trial Advocacy, 2017, v. 40, n. 3, p. 523
- By:
- Publication type:
- Article
Migrating federated learning to centralized learning with the leverage of unlabeled data.
- Published in:
- Knowledge & Information Systems, 2023, v. 65, n. 9, p. 3725, doi. 10.1007/s10115-023-01869-8
- By:
- Publication type:
- Article
Data Security Architecture in Cloud Computing based on Elliptic Curve Cryptography with Special Focus on Lowering the Cipher Space.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 1, p. 417
- By:
- Publication type:
- Article
AN INSECURE WILD WEB: A LARGE-SCALE STUDY OF EFFECTIVENESS OF WEB SECURITY MECHANISMS.
- Published in:
- ICTACT Journal on Communication Technology, 2017, v. 8, n. 1, p. 1465, doi. 10.21917/ijct.2017.0217
- By:
- Publication type:
- Article