Search

Your search keyword '"SECURITY systems"' showing total 29,971 results

Search Constraints

Start Over You searched for: Descriptor "SECURITY systems" Remove constraint Descriptor: "SECURITY systems" Search Limiters Full Text Remove constraint Search Limiters: Full Text
29,971 results on '"SECURITY systems"'

Search Results

1. Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective.

2. The LHCb ultra-fast simulation option, Lamarr design and validation.

3. Computationally intelligent real-time security surveillance system in the education sector using deep learning.

4. Securing IoT Networks from DDoS Attacks Using a Temporary Dynamic IP Strategy.

5. Robust Detection of Critical Events in the Context of Railway Security Based on Multimodal Sensor Data Fusion.

6. Improving VulRepair's Perfect Prediction by Leveraging the LION Optimizer.

7. SignEEG v1.0: Multimodal Dataset with Electroencephalography and Hand-written Signature for Biometric Systems.

8. CONSTRUCTION OF POWER SYSTEM NETWORK SECURITY DEFENSE BEHAVIOR DECISION-MAKING MODEL BASED ON ARTIFICIAL INTELLIGENCE TECHNOLOGY.

9. VERIFICATION AND OPTIMIZATION OF NETWORK SECURITY DEFENSE SYSTEM FROM THE PERSPECTIVE OF BLUE ARMY IN ACTUAL OFFENSIVE AND DEFENSIVE EXERCISES.

10. A review of intrusion detection system and security threat in internet of things enabled environment.

11. Secure Cooperative Routing in Wireless Sensor Networks.

12. CoreTemp: Coreset Sampled Templates for Multimodal Mobile Biometrics.

13. TrustHealth: Enhancing eHealth Security with Blockchain and Trusted Execution Environments.

14. Construction and system evolution analysis of China's food security indicator system.

15. Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems.

16. Design Procedure for Real-Time Cyber–Physical Systems Tolerant to Cyberattacks.

17. Power Transformer On-Load Capacity-Regulating Control and Optimization Based on Load Forecasting and Hesitant Fuzzy Control.

18. Analysis of Biometric-Based Cryptographic Key Exchange Protocols—BAKE and BRAKE.

19. The Role of Rescue Services in the Structures of the Maritime Transport Safety Systems in Poland.

20. CIAMS—Checkpoint‐intrigued adversary mitigation scheme for industrial internet of things.

21. Internet of Things Security Early Warning Model Based on Deep Learning in Edge Computing Environment.

22. IoT Ecosystem Security via Distributed Ledger Technology (Blockchain versus IOTA): A Bibliometric Analysis Research.

23. Accelerated Stochastic Variance Reduction Gradient Algorithms for Robust Subspace Clustering.

24. Multi-Attack Intrusion Detection for In-Vehicle CAN-FD Messages.

25. The Legal Situation of Operators of Essential Services and Digital Service Providers in the Provisions of the Act of 5 July 2018 on the National Cybersecurity System.

26. How Digital Health is Revolutionizing Healthcare and Contributing to Positive Health Outcomes.

27. Technical Support System for High Concurrent Power Trading Platforms Based on Microservice Load Balancing.

28. Performance Evaluation of Mobile RPL-Based IoT Networks under Hello Flood Attack.

29. Research on Active-standby Switch of Double 2--vote--2 Safety Computer Platform Based on Status Judgment of Communication Object.

30. Safety Perceptions and Micro-Segregation: Exploring Gated- and Non-Gated-Community Dynamics in Quetta, Pakistan.

31. ResNet1D-Based Personal Identification with Multi-Session Surface Electromyography for Electronic Health Record Integration.

32. Testing of Permeability of RFID Access Control System for the Needs of Security Management.

33. Drone Safety and Security Surveillance System (D4S).

34. A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems.

35. Dual Spectral Attention Model for Iris Presentation Attack Detection.

36. A mobile edge computing-focused transferable sensitive data identification method based on product quantization.

37. Built and natural environment correlates of physical activity of adults living in rural areas: a systematic review.

38. Navigating Privacy and Security in Telemedicine for Primary Care.

39. Chaos Synchronization of Integrated Five-Section Semiconductor Lasers.

40. Practical Security of Continuous Variable Quantum Key Distribution Ascribable to Imperfect Modulator for Fiber Channel.

41. NDNOTA: NDN One-Time Authentication.

42. A Survey on Satellite Communication System Security.

43. Evaluating Trust Management Frameworks for Wireless Sensor Networks.

44. An equilibrium optimizer with deep recurrent neural networks enabled intrusion detection in secure cyber-physical systems.

45. A Survey of MPSoC Management toward Self-Awareness.

46. A Lightweight Secure Scheme for Underwater Wireless Acoustic Network.

47. Subjective Job Insecurity and the Rise of the Precariat: Evidence from the United Kingdom, Germany, and the United States.

48. Realization of Authenticated One-Pass Key Establishment on RISC-V Micro-Controller for IoT Applications.

49. APPLYING NUMERICAL CONTROL TO ANALYZE THE PULL-IN STABILITY OF MEMS SYSTEMS.

50. Can Windows 11 Stop Well-Known Ransomware Variants? An Examination of Its Built-in Security Features.

Catalog

Books, media, physical & digital resources