Treffer 1 - 20
von 3.501.337
- 1
- 2
Seite in der Trefferliste auswählen
Dependency Network Structure and Security Vulnerabilities in Software Supply Chains.
Yoo, Eunae ; Craighead, Christopher W. ; Samtani, Sagar
Journal of Management Information Systems. 2025, Vol. 42 Issue 4, p1149-1176. 28p.
Security and Privacy in IoT-Enabled EEG Brain–Computer Interfaces: A Survey and Comparative Analysis
Baghestan, Ali Baghban ; Rabbani, Mahdi
2025 9th International Conference on Internet of Things and Applications (IoT) Internet of Things and Applications (IoT), 2025 9th International Conference on. :1-6 Oct, 2025
Computer Security and Protection Mechanism Design in Automotive Electronic Systems
Liu, Yongtao
2025 2nd International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS) Intelligent Algorithms for Computational Intelligence Systems (IACIS), 2025 2nd International Conference on. :1-6 Aug, 2025
Ensemble Convolutional Neural Networks for Computer Network Security Situation Assessment
Luo, Yongsheng
2025 2nd International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS) Intelligent Algorithms for Computational Intelligence Systems (IACIS), 2025 2nd International Conference on. :1-6 Aug, 2025
Fifty Years of Open Source Software Supply-Chain Security.
Cox, Russ
Communications of the ACM. Oct2025, Vol. 68 Issue 10, p88-95. 8p.
Data to Infinity and Beyond: Examining Data Sharing and Reuse Practices in the Computer Security Community
Crowder, Anna ; Lu, Allison ; Childs, Kevin ; et al.
2025 IEEE Symposium on Security and Privacy (SP) SP Security and Privacy (SP), 2025 IEEE Symposium on. :2678-2696 May, 2025
Pitfalls in Machine Learning for Computer Security.
Arp, Daniel ; Quiring, Erwin ; Pendlebury, Feargus ; et al.
Communications of the ACM. Nov2024, Vol. 67 Issue 11, p104-112. 9p.
Research on Computer Information Security Optimization Based on Deep Learning
Zhang, Qingbin
2025 International Conference on Smart & Sustainable Technology (INCSST) Smart & Sustainable Technology (INCSST), 2025 International Conference on. :1-7 Jul, 2025
Computer Network Security and Analysis of the Use of Artificial Intelligence in Protection
Kubas, Jan ; Hraska, Michal ; Papan, Jozef ; et al.
2025 35th International Conference Radioelektronika (RADIOELEKTRONIKA) Radioelektronika (RADIOELEKTRONIKA), 2025 35th International Conference. :1-7 May, 2025
SECURITY AWARENESS REGARDING ONLINE AND MOBILE E-BANKING COMMUNICATION CHANNELS AMONG STUDENTS IN POLAND IN 2024.
ZBOROWSKI, Marek
Scientific Papers of Silesian University of Technology. Organization & Management / Zeszyty Naukowe Politechniki Slaskiej. Seria Organizacji i Zarzadzanie. 2025, Issue 224, p661-685. 25p.
Stop Using Vulnerability Counts to Measure Software Security.
Meneely, Andy ; Keller, Brandon
Communications of the ACM. Sep2025, Vol. 68 Issue 9, p34-36. 3p.
Implementation of YOLO and Face Recognition on a Security Camera System for Visitor Detection in the Computer and Network Lab of UNS
Saputra, Baharuddin Dias ; Rahutomo, Faisal ; Sutrisno ; et al.
2024 IEEE 2nd International Conference on Electrical Engineering, Computer and Information Technology (ICEECIT) Electrical Engineering, Computer and Information Technology (ICEECIT), 2024 IEEE 2nd International Conference on. :12-17 Nov, 2024
The Role of National Computer Security Incident Response Team (Nat-CSIRT) in Threat Intelligence Sharing Through National Cyber Threat Intelligence System and Cyber Incident Database Center.
Yusuf, Andi ; Setiyadi, Basuki Erwin ; Al Fikri, Muhamad ; et al.
Journal Research of Social Science, Economics & Management. May2025, Vol. 4 Issue 10, p1600-1612. 13p.
Factors Influencing Gen Z Awareness of Computer Security Using Protection Motivation Theory (PMT)
Sahwahita, Rahma ; Utomo, Rio Guntur
2024 International Conference on Information Technology Systems and Innovation (ICITSI) Information Technology Systems and Innovation (ICITSI), 2024 International Conference on. :374-379 Dec, 2024
Quality and Security as Key Factors in the Development of Computer Audits in Higher Education Institutions
Daisy Imbaquingo ; Javier Díaz ; José Jácome
25
Computer vision for enhancing security and surveillance in a public space
Jadhav, Deepak Dilip ; Debnath, Saswati ; Reddy, Revanuru Harinath ; et al.
2024 International Conference on Computing and Intelligent Reality Technologies (ICCIRT) Computing and Intelligent Reality Technologies (ICCIRT), 2024 International Conference on. :1-5 Dec, 2024
The Role of Computer Forensics in Network Security Incident Handling: A Systematic Review
Alqahtani, Aminah M ; Boodai, Jawhara Z.
2024 IEEE Eleventh International Conference on Communications and Networking (ComNet) Communications and Networking (ComNet), 2024 IEEE Eleventh International Conference on. :1-7 Nov, 2024
Optimization of Computer Network Security Strategies in Port Operations
Li, Yuepeng
2024 International Conference on Computer Communication, Networks and Information Science (CCNIS) CCNIS Computer Communication, Networks and Information Science (CCNIS), 2024 International Conference on. :60-64 Oct, 2024
Security Vulnerability Detection Technology in Computer Software
Li, Xiaoli ; Li, Qinghao ; Xiao, Mingqian ; et al.
2024 International Seminar on Artificial Intelligence, Computer Technology and Control Engineering (ACTCE) ACTCE Artificial Intelligence, Computer Technology and Control Engineering (ACTCE), 2024 International Seminar on. :525-528 Sep, 2024
The Practice of Differentiated Instruction Based on the Large Language Models in the Introduction to Computer Security Course
Yan, Qiao ; Lin, Zetao
2024 5th International Conference on Information Science and Education (ICISE-IE) Information Science and Education (ICISE-IE), 2024 5th International Conference on. :463-467 Dec, 2024
- 1
- 2