Treffer 1 - 20 von 3.501.337

1

Dependency Network Structure and Security Vulnerabilities in Software Supply Chains.
Yoo, Eunae ; Craighead, Christopher W. ; Samtani, Sagar
Journal of Management Information Systems. 2025, Vol. 42 Issue 4, p1149-1176. 28p.

Fachzeitschrift
Merkliste
2

Security and Privacy in IoT-Enabled EEG Brain–Computer Interfaces: A Survey and Comparative Analysis
Baghestan, Ali Baghban ; Rabbani, Mahdi
2025 9th International Conference on Internet of Things and Applications (IoT) Internet of Things and Applications (IoT), 2025 9th International Conference on. :1-6 Oct, 2025

Konferenz
Merkliste
3

Computer Security and Protection Mechanism Design in Automotive Electronic Systems
Liu, Yongtao
2025 2nd International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS) Intelligent Algorithms for Computational Intelligence Systems (IACIS), 2025 2nd International Conference on. :1-6 Aug, 2025

Konferenz
Merkliste
4

Ensemble Convolutional Neural Networks for Computer Network Security Situation Assessment
Luo, Yongsheng
2025 2nd International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS) Intelligent Algorithms for Computational Intelligence Systems (IACIS), 2025 2nd International Conference on. :1-6 Aug, 2025

Konferenz
Merkliste
5

Fifty Years of Open Source Software Supply-Chain Security.
Cox, Russ
Communications of the ACM. Oct2025, Vol. 68 Issue 10, p88-95. 8p.

Zeitschrift
Merkliste
6

Data to Infinity and Beyond: Examining Data Sharing and Reuse Practices in the Computer Security Community
Crowder, Anna ; Lu, Allison ; Childs, Kevin ; et al.
2025 IEEE Symposium on Security and Privacy (SP) SP Security and Privacy (SP), 2025 IEEE Symposium on. :2678-2696 May, 2025

Konferenz
Merkliste
7

Pitfalls in Machine Learning for Computer Security.
Arp, Daniel ; Quiring, Erwin ; Pendlebury, Feargus ; et al.
Communications of the ACM. Nov2024, Vol. 67 Issue 11, p104-112. 9p.

Zeitschrift
Merkliste
8

Research on Computer Information Security Optimization Based on Deep Learning
Zhang, Qingbin
2025 International Conference on Smart & Sustainable Technology (INCSST) Smart & Sustainable Technology (INCSST), 2025 International Conference on. :1-7 Jul, 2025

Konferenz
Merkliste
9

Computer Network Security and Analysis of the Use of Artificial Intelligence in Protection
Kubas, Jan ; Hraska, Michal ; Papan, Jozef ; et al.
2025 35th International Conference Radioelektronika (RADIOELEKTRONIKA) Radioelektronika (RADIOELEKTRONIKA), 2025 35th International Conference. :1-7 May, 2025

Konferenz
Merkliste
10

SECURITY AWARENESS REGARDING ONLINE AND MOBILE E-BANKING COMMUNICATION CHANNELS AMONG STUDENTS IN POLAND IN 2024.
ZBOROWSKI, Marek
Scientific Papers of Silesian University of Technology. Organization & Management / Zeszyty Naukowe Politechniki Slaskiej. Seria Organizacji i Zarzadzanie. 2025, Issue 224, p661-685. 25p.

Fachzeitschrift
Merkliste
11

Stop Using Vulnerability Counts to Measure Software Security.
Meneely, Andy ; Keller, Brandon
Communications of the ACM. Sep2025, Vol. 68 Issue 9, p34-36. 3p.

Zeitschrift
Merkliste
12

Implementation of YOLO and Face Recognition on a Security Camera System for Visitor Detection in the Computer and Network Lab of UNS
Saputra, Baharuddin Dias ; Rahutomo, Faisal ; Sutrisno ; et al.
2024 IEEE 2nd International Conference on Electrical Engineering, Computer and Information Technology (ICEECIT) Electrical Engineering, Computer and Information Technology (ICEECIT), 2024 IEEE 2nd International Conference on. :12-17 Nov, 2024

Konferenz
Merkliste
13

The Role of National Computer Security Incident Response Team (Nat-CSIRT) in Threat Intelligence Sharing Through National Cyber Threat Intelligence System and Cyber Incident Database Center.
Yusuf, Andi ; Setiyadi, Basuki Erwin ; Al Fikri, Muhamad ; et al.
Journal Research of Social Science, Economics & Management. May2025, Vol. 4 Issue 10, p1600-1612. 13p.

Fachzeitschrift
Merkliste
14

Factors Influencing Gen Z Awareness of Computer Security Using Protection Motivation Theory (PMT)
Sahwahita, Rahma ; Utomo, Rio Guntur
2024 International Conference on Information Technology Systems and Innovation (ICITSI) Information Technology Systems and Innovation (ICITSI), 2024 International Conference on. :374-379 Dec, 2024

Konferenz
Merkliste
15

Quality and Security as Key Factors in the Development of Computer Audits in Higher Education Institutions
Daisy Imbaquingo ; Javier Díaz ; José Jácome
25

Computer Security Audits (Verification) Information Security Risk Higher Education Institutional Evaluation
Fachzeitschrift
Merkliste
16

Computer vision for enhancing security and surveillance in a public space
Jadhav, Deepak Dilip ; Debnath, Saswati ; Reddy, Revanuru Harinath ; et al.
2024 International Conference on Computing and Intelligent Reality Technologies (ICCIRT) Computing and Intelligent Reality Technologies (ICCIRT), 2024 International Conference on. :1-5 Dec, 2024

Konferenz
Merkliste
17

The Role of Computer Forensics in Network Security Incident Handling: A Systematic Review
Alqahtani, Aminah M ; Boodai, Jawhara Z.
2024 IEEE Eleventh International Conference on Communications and Networking (ComNet) Communications and Networking (ComNet), 2024 IEEE Eleventh International Conference on. :1-7 Nov, 2024

Konferenz
Merkliste
18

Optimization of Computer Network Security Strategies in Port Operations
Li, Yuepeng
2024 International Conference on Computer Communication, Networks and Information Science (CCNIS) CCNIS Computer Communication, Networks and Information Science (CCNIS), 2024 International Conference on. :60-64 Oct, 2024

Konferenz
Merkliste
19

Security Vulnerability Detection Technology in Computer Software
Li, Xiaoli ; Li, Qinghao ; Xiao, Mingqian ; et al.
2024 International Seminar on Artificial Intelligence, Computer Technology and Control Engineering (ACTCE) ACTCE Artificial Intelligence, Computer Technology and Control Engineering (ACTCE), 2024 International Seminar on. :525-528 Sep, 2024

Konferenz
Merkliste
20

The Practice of Differentiated Instruction Based on the Large Language Models in the Introduction to Computer Security Course
Yan, Qiao ; Lin, Zetao
2024 5th International Conference on Information Science and Education (ICISE-IE) Information Science and Education (ICISE-IE), 2024 5th International Conference on. :463-467 Dec, 2024

Konferenz
Merkliste

Filter