Treffer 1 - 20 von 2.283.809

1

Construction of a Computer Data Security Detection Model based on Artificial Intelligence
Ma, Ruzhen
2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC) Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC), 2024 International Conference on. :1-5 Sep, 2024

Konferenz
Merkliste
2

Evaluation of computer network data security based on a deep learning algorithm
Ma Sujing ; Sun Xinghua
Journal of Intelligent Systems, Vol 34, Iss 1, Pp 1462-74 (2025)

network data security deep learning open computer artificial intelligence Science Electronic computers. Co...
Fachzeitschrift
Merkliste
3

Computer Data Security and Encryption Algorithm Based on Mobile Edge Computing
Jiang, Nannan ; Wang, Jianing ; Yu, Xiaoting ; et al.
2023 International Conference on Networking, Informatics and Computing (ICNETIC) ICNETIC Networking, Informatics and Computing (ICNETIC), 2023 International Conference on. :582-586 May, 2023

Konferenz
Merkliste
4

A Review of Web Services Research: Current Trends and Future Directions in Computer Data Security
Kumar, Gaurav ; Singh, Kamred Udham ; Pandey, Saroj Kumar ; et al.
2023 International Conference on Communication, Security and Artificial Intelligence (ICCSAI) Communication, Security and Artificial Intelligence (ICCSAI), 2023 International Conference on. :631-635 Nov, 2023

Konferenz
Merkliste
5

Finding Aids Unleashed: Iterative Development of a Portable Publication System.
Verhoff, Deb ; Pawletko, Joseph G. ; Mennerich, Donald R. ; et al.
Information Technology & Libraries. Sep2025, Vol. 44 Issue 3, p1-15. 15p.

Archives Portable computers Data management Data security failures Data curation Computer graphics
Fachzeitschrift
Merkliste
7

hChain: Blockchain Based Large Scale EHR Data Sharing with Enhanced Security and Privacy
Alruwaill, Musharraf ; Mohanty, Saraju ; Kougianos, Elias

Computer Science - Crypt...
Report
Merkliste
8

A Novel Feature-Aware Chaotic Image Encryption Scheme For Data Security and Privacy in IoT and Edge Networks
Khan, Muhammad Shahbaz ; Al-Dubai, Ahmed ; Ahmad, Jawad ; et al.

Computer Science - Crypt...
Report
Merkliste
9

A novel fiestal structured chromatic series-based data security approach
Rupa Ch ; Jasmine Shaik ; Rayala Srikavya ; et al.
Discover Internet of Things, Vol 5, Iss 1, Pp 1-20 (2025)

Fiestal structure Block-based encryption Hexadecimal mapping Multimedia data Security analysis Computer engineering. Co...
Fachzeitschrift
Merkliste
10

MAIDS: Malicious Agent Identification-based Data Security Model for Cloud Environments
Gupta, Kishu ; Saxena, Deepika ; Gupta, Rishabh ; et al.
Cluster Comput 27, 6167 to 6184, (2024)

Computer Science - Crypt... Computer Science - Machi...
Report
Merkliste
11

Blockchain Adoption in Healthcare: Enhancing Interoperability, Security and Data Exchange
Vimbai Alice Muderere ; Belinda Ndlovu ; Kudakwashe Maguraushe
Journal of Information Systems and Informatics, Vol 7, Iss 3, Pp 2939-2977 (2025)

blockchain technology healthcare interoperabil... data exchange privacy and security Mathematics QA1-939
Fachzeitschrift
Merkliste
12

Safeguarding Virtual Healthcare: A Novel Attacker-Centric Model for Data Security and Privacy
Herath, Suvineetha ; Gelman, Haywood ; Hastings, John ; et al.
2024 IEEE International Conference on Computer and Applications (ICCA-24)

Computer Science - Crypt... K.6.5 H.2.7 D.4.6 J.3
Report
Merkliste
13

Dieses Ergebnis kann Gästen nicht angezeigt werden.

14

Validation of GDPR Compliance in a Library Management System.
Rajačić, Tijana ; Boberić-Krstićev, Danijela ; Tešendić, Danijela ; et al.
Information Technology & Libraries. Dec2025, Vol. 44 Issue 4, p1-20. 20p.

Data management Libraries Privacy Integrated library syste... Access to information Data security
Fachzeitschrift
Merkliste
15

Improving data security and privacy in sports health monitoring through blockchain
Xiaochun Yuan
Systems and Soft Computing, Vol 7, Iss , Pp 200308- (2025)

Blockchain technology Sports health monitoring Data security Smart contracts Information technology T58.5-58.64
Fachzeitschrift
Merkliste
16

High-Security Hardware Module with PUF and Hybrid Cryptography for Data Security
Amael, Joshua Tito ; Natan, Oskar ; Istiyanto, Jazi Eko

Computer Science - Crypt... Computer Science - Hardw...
Report
Merkliste
17

Balancing Innovation and Privacy: Data Security Strategies in Natural Language Processing Applications
Liu, Shaobo ; Liu, Guiran ; Zhu, Binrong ; et al.

Computer Science - Crypt... Computer Science - Artif... Computer Science - Compu...
Report
Merkliste
18

The 2023 Rhysida Ransomware Attack on the British Library: Prioritisation, Expertise, and Funding Issues.
Houghton, Frank ; Winterburn, Michael ; Oakley, Ken
Information Technology & Libraries. Mar2025, Vol. 44 Issue 1, p1-16. 16p.

Public libraries Data security failures Computer viruses Information technology Data encryption Information science
Fachzeitschrift
Merkliste
19

Practice on data application and security protection in the field of natural resources in Beijing under the digital intelligence transformation
WEI Lili ; GU Jin ; WANG Jing
大数据, Vol 11, Pp 138-149 (2025)

data security open sharing data classification and... Beijing Electronic computers. Co... QA75.5-76.95
Fachzeitschrift
Merkliste

Filter