Search

Your search keyword '"Data security -- Analysis"' showing total 1,488 results

Search Constraints

Start Over You searched for: Descriptor "Data security -- Analysis" Remove constraint Descriptor: "Data security -- Analysis"
1,488 results on '"Data security -- Analysis"'

Search Results

1. Cybersecurity GenAI features: Are they worth the money?

2. EUROPEAN DATA PROTECTION BOARD'S OPINION ON AI MODELS

3. Research from Zhejiang University of Technology in the Area of Cybersecurity Described (MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs)

6. TECHNICAL DATA ANALYSIS, INC. secures contract for System Services

9. Retrieval-augmented generation, step by step

10. Nanchang University Researchers Update Current Study Findings on Applied Sciences (AFF_CGE: Combined Attention-Aware Feature Fusion and Communication Graph Embedding Learning for Detecting Encrypted Malicious Traffic)

11. Studies from Nanjing University of Aeronautics and Astronautics Yield New Data on Information and Data Encoding and Encryption (Leveraging Gpu In Homomorphic Encryption: Framework Design and Analysis of Bfv Variants)

14. Studies from Chang'an University Provide New Data on Information and Data Encoding and Encryption (Vcsa: Verifiable and Collusion-resistant Secure Aggregation for Federated Learning Using Symmetric Homomorphic Encryption)

15. Research on Data Protection Described by Researchers at Sumy State University (Targeted Advertising and Protection of Personal Data: Implementation in the Conditions of European Integration)

16. School of Computer and Information Engineering Researcher Yields New Data on Information Security and Privacy (A Multi-Scale Temporal Feature Extraction Approach for Network Traffic Anomaly Detection)

17. New Findings Reported from Kongu Engineering College Describe Advances in Terrorism (Cybersecurity and Cyber-terrorism Challenges To Energy-related Infrastructures - Cybersecurity Frameworks and Economics - Comprehensive Review)

18. NOUS GROUP PTY LTD secures contract for Data Model Review

20. RCM IT MAKEDONIA secures contract for Audit of information systems and evaluation of potential function integration and secure data exchange services

21. Interior Minister reviews cyber security, other measures at NADRA

23. ABPmer secures contract for Marine Data Handling and Analysis

25. Taking Taiwan Through Cyber

26. Universidad Internacional Researcher Reports on Findings in Electronics (Assessing the Effectiveness of Cyber Domain Controls When Conducting Cybersecurity Audits: Insights from Higher Education Institutions in Canada)

27. University of Le Havre Researcher Targets Cybersecurity and Privacy (An Approach for Anomaly Detection in Network Communications Using k-Path Analysis)

28. Reports Outline Library Science Research from Technical University Wien (TU Wien) (Trusted Research Environments: Analysis of Characteristics and Data Availability)

29. Comenius University in Bratislava Researcher Provides New Insights into Artificial Intelligence (Artificial Intelligence-Driven Facial Image Analysis for the Early Detection of Rare Diseases: Legal, Ethical, Forensic, and Cybersecurity ...)

30. Data on Data Sharing Discussed by Researchers at Xi'an Jiaotong University (A Secure and Efficient Data Sharing Scheme for Uav Networks: Integration of Blockchain and Prospect Theory)

31. New Education Data Have Been Reported by Researchers at National Research Council (Shaping the foundation of the SuperCyberKids Learning Framework: a comprehensive analysis of cybersecurity education initiatives)

32. CJEU - C-470/21 - La Quadrature Du Net And Others: Balancing Personal Data Protection With Counterfeiting Combat Measures

33. Hillstone Networks Recognized in the Gartner Voice of the Customer for Network Firewalls for 5th Consecutive Year

35. Studies from Institute of Information Engineering in the Area of Cybersecurity Described (Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy)

36. Cloud Security Alliance Announces Additional Mappings Between Cloud Controls Matrix (CCM) and National Institute of Standards and Technology's (NIST) Cybersecurity Framework (CFT)

37. ATR Network: Decentralized Private Data Multimodal Supercomputing Network

38. ATR Network: Decentralized private data multimodal supercomputing network

39. ATR Network: Decentralized private data multimodal supercomputing network

40. EU Contract Notice: CNRS Delegation Ile de France Gif sur Yvette Issues contract notice|solicitation for 'Renewal of Firewalls for the CNRS Campus of Gif-sur-Yvette'

41. NIVI Spa secures contract for Data Management Services - International notification service of the verbal verbals of assessment of administrative violations deriving from the municipal police activity of the Municipality of Palermo

43. KPMG LLP secures contract for Metis Data Modelling Support

44. The Council of the City of Sydney T/A City of Sydney secures contract for Reports containing data and analysis regarding the improvements of energy performance in office tenancies in locations around Australia

45. KPMG LLP secures contract for Metis Data Modelling Support

46. Characterizing Cybersecurity Threats to Organizations in Support of Risk Mitigation Decisions

47. Enterprise Cybersecurity: Pivoting From Traditional Measures To Innovative Strategies

49. AI increases cybersecurity challenges manifold for financial institutions: Shaktikanta Das

50. EU Contract Notice: GRDF Issues contract notice|solicitation for 'Cybersecurity - Integration on Projects (ISP) and Integration on Evolutions (ISE)'

Catalog

Books, media, physical & digital resources