Search

Your search keyword '"sensitive information"' showing total 225 results

Search Constraints

Start Over You searched for: Descriptor "sensitive information" Remove constraint Descriptor: "sensitive information" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
225 results on '"sensitive information"'

Search Results

1. Trustworthy AI: Securing Sensitive Data in Large Language Models.

2. Examining the Integrity of Apple's Privacy Labels: GDPR Compliance and Unnecessary Data Collection in iOS Apps.

3. "Carefully and Cautiously": How Canadian Cultural Memory Workers Review Digital Materials for Private and Sensitive Information.

4. The Development of a Named Entity Recognizer for Detecting Personal Information Using a Korean Pretrained Language Model.

5. Enhancing Security of the Healthcare Sector using Visual Cryptography.

6. Pragmatic Study of Enterprise Data Breach and its Prevention Technique by DLPD.

7. Blackmail and the self-disclosure of sensitive information on social media: prevalence, victim characteristics and reporting behaviours amongst Omani WhatsApp users.

10. Command Line Interface Risk Modeling

11. 'Carefully and Cautiously': How Canadian Cultural Memory Workers Review Digital Materials for Private and Sensitive Information

12. Customer data taxonomy: a multidimensional scaling approach.

13. Automatic depersonalization of confidential information

14. Multimodal fusion sensitive information classification based on mixed attention and CLIP model1.

15. Fast privacy-preserving utility mining algorithm based on utility-list dictionary.

16. Multimodal fusion sensitive information classification based on mixed attention and CLIP model1.

17. Delving Deep into Reverse Engineering of UEFI Firmwares via Human Interface Infrastructure.

18. ICIS: A Model for Context-Based Classification of Sensitive Personal Information

20. A Method of Protecting Sensitive Information in Intangible Cultural Heritage Communication Network Based on Machine Learning

21. The Development of a Named Entity Recognizer for Detecting Personal Information Using a Korean Pretrained Language Model

22. A noise-based privacy preserving model for Internet of Things.

23. An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage

24. FedDroidMeter: A Privacy Risk Evaluator for FL-Based Android Malware Classification Systems.

25. University students' awareness of e-waste and its disposal practices in Pakistan: a construction of the conceptual framework.

27. Sensitive Information Detection Adopting Named Entity Recognition: A Proposed Methodology

28. Fusion of Traffic Data and Alert Log Based on Sensitive Information

29. Privacy Preserving Data Mining Technique to Secure Distributed Client Data

30. FedSP: Federated Speaker Verification with Personal Privacy Preservation

31. Semantics-Driven Safety Measures in Distributed Big Data Systems on IoT

32. Research on Intelligent Perception Algorithm for Sensitive Information.

33. Towards Human Action Recognition during Surgeries using De-identified Video Data

34. Certificateless integrity auditing scheme for sensitive information protection in cloud storage.

36. Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview.

37. The 2021 National Census in Poland - addressing the challenges of a digital census.

38. Access Control for Wireless Body Area Networks

39. Security in Software Applications by Using Data Science Approaches

41. Experimental Evaluation of Phishing Attack on High School Students

42. Secure and Efficient Sensitive Info-Hiding for Data Sharing via DACES Method in Cloud

43. Sensitive Information Protection Model Based on Bayesian Game.

44. Sensitive, Challenging, and Difficult Topics: Experiences and Practical Considerations for Qualitative Researchers.

45. How does qualitative data collection modality affect disclosure of sensitive information and participant experience? Findings from a quasi-experimental study.

46. A noise-based privacy preserving model for Internet of Things

47. FedDroidMeter: A Privacy Risk Evaluator for FL-Based Android Malware Classification Systems

48. The Classification of Chinese Sensitive Information Based on BERT-CNN

49. Weibo Public Opinion Monitoring System Based on Sensitive Information Mining

50. Towards an Automatic Detection of Sensitive Information in Mongo Database

Catalog

Books, media, physical & digital resources