Search

Your search keyword '"Q300-390"' showing total 3,971 results

Search Constraints

Start Over You searched for: Descriptor "Q300-390" Remove constraint Descriptor: "Q300-390"
3,971 results on '"Q300-390"'

Search Results

1. Safeguarding Online Communications using DistilRoBERTa for Detection of Terrorism and Offensive Chats

2. Securing the Web

3. Adopting Automated Penetration Testing Tools

4. Cyber Security Incident Response

5. Enhancing Malware Detection by Integrating Machine Learning with Cuckoo Sandbox

6. Cybersecurity and Forensic Analysis of IP-Cameras Used in Saudi Arabia

7. Intelligenza artificiale e protezione dei dati personali: il rapporto tra Regolamento europeo sull’intelligenza artificiale e GDPR

8. Participative and Deliberative Democracy facing Technology: A Study on Digital Democratic Innovations

9. Il diritto d'accesso civico generalizzato (c.d. FOIA): paradigmi, modelli e percorsi applicativi

10. Il credit scoring e la protezione dei dati personali: commento alle sentenze della Corte di giustizia dell’Unione europea del 7 dicembre 2023

11. Le Linee-guida dell’Agcom sugli influencer nella prospettiva dell’attività di informazione e del costituzionalismo digitale

12. An Improved Parallel Biobjective Hybrid Real-Coded Genetic Algorithm with Clustering-Based Selection

13. Maximal Generalized Network Flow Accounting for Motivation

14. A Recommender System for Educational Planning

15. An Approach to Hopfield Network-Based Energy-Efficient RFID Network Planning

16. A Novel Deep Transfer Learning-Based Approach for Face Pose Estimation

17. Securing Decentralized Storage in Blockchain: A Hybrid Cryptographic Framework

18. Quality of Blended Learning Implementation in HEIs: Tool for Monitoring the Use of e-Learning Management Systems

19. Decentralized Application (dApp) Development and Implementation

20. African Vulture Optimization-Based Decision Tree (AVO-DT): An Innovative Method for Malware Identification and Evaluation through the Application of Meta-Heuristic Optimization Algorithm

21. Feature Selection Using Hybrid Metaheuristic Algorithm for Email Spam Detection

22. Evaluating the Impact of Controlled Ultraviolet Light Intensities on the Growth of Kale Using IoT-Based Systems

23. Investigating Radio Frequency Vulnerabilities in the Internet of Things (IoT)

24. Multi-Hospital Management: Combining Vital Signs IoT Data and the Elasticity Technique to Support Healthcare 4.0

25. Towards 6G Technology: Insights into Resource Management for Cloud RAN Deployment

26. Efficient by Precision Algorithms for Approximating Functions from Some Classes by Fourier Series

27. The Main Aspects of Wireless Sensor Nodes for Digital Agriculture

28. Linear Discrete Game Under Quadratic Constraints on Controls

29. Mathematical Models of the Problem of Constructing Delivery Routes of Cargo in the Internal Zones of Trunk Nodes of a Hierarchical Transport Network

30. Methods of Combating the Accumulation of Rounding Error When Solving Problems of Trans-Computational Complexity

31. On One Implementation of a Natural Approach to Solving the Traveling Salesman Problem

32. Using Support Vector Machine for Determining the Need for Artificial Watering Based on the Chlorophyll Fluorescence Induction

33. Optimization of the Microprogram Mealy Machine Circuit Based on LUT and EMB

34. Improved Decoding Algorithms for Convolutional Codes

35. Il contributo dei livelli di governo substatali al raggiungimento degli obiettivi del ddl Cybersicurezza

36. Cybersicurezza e appalti pubblici: verso un nuovo (e incerto) quadro regolatorio

37. Vulnerability disclosure e penetration testing: questioni da normare

38. Rassegna sul tema dell’accesso ad Internet in carcere a livello comparato: tra riconoscimenti teorici e difficoltà pratiche

39. DDL Cybersicurezza: tra l’inasprimento della risposta penale del legislatore nazionale e il modello preventivo-amministrativo della direttiva NIS2

40. L'estensione dello statuto penale della criminalità organizzata di stampo mafioso alla cybercriminalità diretta contro sistemi informatici e telematici 'pubblici'

41. Un’occasione (forse) mancata. Considerazioni sulla revisione dei reati informatici proposta con il DDL Cybersicurezza

42. Il ransomware nel DDL Cybersicurezza: dalla fattispecie di estorsione 'informatica' al coordinamento tra indagini e incident response

43. Le applicazioni di Intelligenza artificiale a supporto dell’automazione del procedimento amministrativo

44. L’armonizzazione degli obblighi di notifica: il DDL Cybersicurezza verso la NIS 2

46. Sviluppi recenti in tema di Intelligenza Artificiale e diritto. Una rassegna di legislazione, giurisprudenza e dottrina (gennaio-aprile 2024)

47. Development, Implementation and Evaluation of An Epidemic Communication System

48. Integration of IoT Technologies for Enhanced Monitoring and Control in Hybrid-Powered Desalination Systems: A Sustainable Approach to Freshwater Production

49. Smart Agriculture Drone for Crop Spraying Using Image-Processing and Machine Learning Techniques: Experimental Validation

50. Addressing Vulnerabilities in CAN-FD: An Exploration and Security Enhancement Approach

Catalog

Books, media, physical & digital resources