Search

Your search keyword '"SECURITY systems"' showing total 1,623 results

Search Constraints

Start Over You searched for: Descriptor "SECURITY systems" Remove constraint Descriptor: "SECURITY systems" Topic computer software Remove constraint Topic: computer software
1,623 results on '"SECURITY systems"'

Search Results

1. A survey for fire detection intimation using artificial intelligence.

2. Operational disruption in healthcare associated with software functionality issue due to software security patching: a case report.

3. Automation of System Security Vulnerabilities Detection Using Open-Source Software.

4. Exploring Patients' Trust from a New Perspective. A Text-Analysis Study.

5. Windows unverwundbar.

6. Artificial intelligence 101.

7. 基于博通平台的家庭网关配置文件分段加密方法.

8. What we think we know about cybersecurity: an investigation of the relationship between perceived knowledge, internet trust, and protection motivation in a cybercrime context.

9. Telemedicine adoption issues in the United States and Brazil: Perception of healthcare professionals.

10. Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks.

11. Cetratus: A framework for zero downtime secure software updates in safety‐critical systems.

12. Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general.

13. Using the Ensemble of Deep Neural Networks for Normal and Abnormal Situations Detection and Recognition in the Continuous Video Stream of the Security System.

14. To Shame A Thief.

15. An Improved and Secure Two-factor Dynamic ID Based Authenticated Key Agreement Scheme for Multiserver Environment.

16. Intake.

17. Blanking on Rebellion: Where the Future is "Nabster".

18. Geländeüberwachung selbst planen und installieren.

19. Detection of suspicious persons and special software.

20. Framework for big data usage in risk management process in banking institutions.

21. Warning! Strange behaviour.

22. Making IT better: how biometrics can cure healthcare.

23. FIMCE: A Fully Isolated Micro-Computing Environment for Multicore Systems.

24. A Proposal and Implementation of Communication Control Function for NTMobile.

25. A SOFTWARE TOOL TO SUPPORT THE SELECTION OF CANDIDATES IN PRIVATE SECURITY SERVICES.

26. MECHANICAL CHARACTERISTICS OF CYLINDER PIN TUMBLER LOCKS AS THEY RELATE TO RESISTANCE TESTING.

27. Implementation of RFID Technology at Defence Science Library, DESIDOC : A Case Study.

28. Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware.

29. Towards decentralized system-level security for MPSoC-based embedded applications.

30. New governance of corporate cybersecurity: a case study of the petrochemical industry in the Port of Rotterdam.

31. Cybersecurity Risk in Health Care.

32. Access Control Capabilities and Healthcare Informatics Needs.

33. Healthcare Security Ailments and Treatments the World Needs to Know.

34. Medical Data Sharing: Establishing Trust in Health Information Exchange.

35. Problems Solved.

36. Commercial key Recovery.

37. The Yaksha Security System.

38. Crypto Backup and Key Escrow.

39. A Taxonomy for Key Escrow Encryption Systems.

40. acm forum.

41. SECURE DISTRIBUTED BACKUP MANAGEMENT OF PERSONAL HEALTH RECORDS.

42. Smart Sensor for Defending against Clock Glitching Attacks on the I2C Protocol in Robotic Applications.

43. An ultra-lightweight RFID authentication scheme for mobile commerce.

44. 基于模糊双曲正切模型的车辆路径跟踪算法.

45. Hardware-assisted credential management scheme for preventing private data analysis from cloning attacks.

46. Popular CI/CD tool Jenkins discloses critical CVE.

47. That Russia router malware threat might be worse than feared: What you need to know.

48. Should You Use Smart Contracts?

50. Smartphones Overshare.

Catalog

Books, media, physical & digital resources