Treffer 1 - 20
von 2.283.809
Construction of a Computer Data Security Detection Model based on Artificial Intelligence
Ma, Ruzhen
2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC) Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC), 2024 International Conference on. :1-5 Sep, 2024
Evaluation of computer network data security based on a deep learning algorithm
Ma Sujing ; Sun Xinghua
Journal of Intelligent Systems, Vol 34, Iss 1, Pp 1462-74 (2025)
Computer Data Security and Encryption Algorithm Based on Mobile Edge Computing
Jiang, Nannan ; Wang, Jianing ; Yu, Xiaoting ; et al.
2023 International Conference on Networking, Informatics and Computing (ICNETIC) ICNETIC Networking, Informatics and Computing (ICNETIC), 2023 International Conference on. :582-586 May, 2023
A Review of Web Services Research: Current Trends and Future Directions in Computer Data Security
Kumar, Gaurav ; Singh, Kamred Udham ; Pandey, Saroj Kumar ; et al.
2023 International Conference on Communication, Security and Artificial Intelligence (ICCSAI) Communication, Security and Artificial Intelligence (ICCSAI), 2023 International Conference on. :631-635 Nov, 2023
Finding Aids Unleashed: Iterative Development of a Portable Publication System.
Verhoff, Deb ; Pawletko, Joseph G. ; Mennerich, Donald R. ; et al.
Information Technology & Libraries. Sep2025, Vol. 44 Issue 3, p1-15. 15p.
New Data Security Requirements and the Proceduralization of Mass Surveillance Law after the European Data Retention Case
Borgesius, Frederik Zuiderveen ; Arnbak, Axel
hChain: Blockchain Based Large Scale EHR Data Sharing with Enhanced Security and Privacy
Alruwaill, Musharraf ; Mohanty, Saraju ; Kougianos, Elias
A Novel Feature-Aware Chaotic Image Encryption Scheme For Data Security and Privacy in IoT and Edge Networks
Khan, Muhammad Shahbaz ; Al-Dubai, Ahmed ; Ahmad, Jawad ; et al.
A novel fiestal structured chromatic series-based data security approach
Rupa Ch ; Jasmine Shaik ; Rayala Srikavya ; et al.
Discover Internet of Things, Vol 5, Iss 1, Pp 1-20 (2025)
MAIDS: Malicious Agent Identification-based Data Security Model for Cloud Environments
Gupta, Kishu ; Saxena, Deepika ; Gupta, Rishabh ; et al.
Cluster Comput 27, 6167 to 6184, (2024)
Blockchain Adoption in Healthcare: Enhancing Interoperability, Security and Data Exchange
Vimbai Alice Muderere ; Belinda Ndlovu ; Kudakwashe Maguraushe
Journal of Information Systems and Informatics, Vol 7, Iss 3, Pp 2939-2977 (2025)
Safeguarding Virtual Healthcare: A Novel Attacker-Centric Model for Data Security and Privacy
Herath, Suvineetha ; Gelman, Haywood ; Hastings, John ; et al.
2024 IEEE International Conference on Computer and Applications (ICCA-24)
Validation of GDPR Compliance in a Library Management System.
Rajačić, Tijana ; Boberić-Krstićev, Danijela ; Tešendić, Danijela ; et al.
Information Technology & Libraries. Dec2025, Vol. 44 Issue 4, p1-20. 20p.
Improving data security and privacy in sports health monitoring through blockchain
Xiaochun Yuan
Systems and Soft Computing, Vol 7, Iss , Pp 200308- (2025)
High-Security Hardware Module with PUF and Hybrid Cryptography for Data Security
Amael, Joshua Tito ; Natan, Oskar ; Istiyanto, Jazi Eko
Balancing Innovation and Privacy: Data Security Strategies in Natural Language Processing Applications
Liu, Shaobo ; Liu, Guiran ; Zhu, Binrong ; et al.
The 2023 Rhysida Ransomware Attack on the British Library: Prioritisation, Expertise, and Funding Issues.
Houghton, Frank ; Winterburn, Michael ; Oakley, Ken
Information Technology & Libraries. Mar2025, Vol. 44 Issue 1, p1-16. 16p.
Practice on data application and security protection in the field of natural resources in Beijing under the digital intelligence transformation
WEI Lili ; GU Jin ; WANG Jing
大数据, Vol 11, Pp 138-149 (2025)