Search

Your search keyword '"SECURITY systems"' showing total 14,542 results

Search Constraints

Start Over You searched for: Descriptor "SECURITY systems" Remove constraint Descriptor: "SECURITY systems"
14,542 results on '"SECURITY systems"'

Search Results

1. Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective.

2. A protection gambit for a double-line transmission system employing a wavelet transient protection strategy.

3. A security alert system for women with location tracking and calling features.

4. Securing the cloud: An in-depth review of security threats in cloud computing.

5. Cloud computing security challenges and related mitigation strategies.

6. The LHCb ultra-fast simulation option, Lamarr design and validation.

7. Adversarial waypoint injection attacks on Maritime Autonomous Surface Ships (MASS) collision avoidance systems.

8. Optimizing Security Systems with an Optimum Design of a Hybrid Renewable Energy System.

9. Older Adults' Preferences Regarding Firearm Locking Device Use: Results of a National Survey.

10. The role of science in resilience planning for military-civilian domains in the U.S. and NATO.

11. Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems.

12. The Role of Rescue Services in the Structures of the Maritime Transport Safety Systems in Poland.

13. Personal and Contextual Predictors of Information Security Policy Compliance: Evidence from a Low-Fidelity Simulation.

14. A decentralized blockchain-based authentication scheme for cross-communication in IoT networks.

15. Identifying points for therapeutic intervention from the lived experiences of people seeking help for retroactive jealousy.

16. Computational Imaging Encryption with a Steganographic and Holographic Authentication Strategy.

17. International journal of information security: a bibliometric study, 2007–2023.

18. BLISS: blockchain-based integrated security system for internet of things (IoT) applications.

19. Advanced biometric system security: a novel hybrid approach integrating optical asymmetric PTFT and symmetric cipher techniques.

20. CIAMS—Checkpoint‐intrigued adversary mitigation scheme for industrial internet of things.

21. Internet of Things Security Early Warning Model Based on Deep Learning in Edge Computing Environment.

22. IoT Ecosystem Security via Distributed Ledger Technology (Blockchain versus IOTA): A Bibliometric Analysis Research.

23. Accelerated Stochastic Variance Reduction Gradient Algorithms for Robust Subspace Clustering.

24. Multi-Attack Intrusion Detection for In-Vehicle CAN-FD Messages.

25. ResNet1D-Based Personal Identification with Multi-Session Surface Electromyography for Electronic Health Record Integration.

26. Built and natural environment correlates of physical activity of adults living in rural areas: a systematic review.

27. Navigating Privacy and Security in Telemedicine for Primary Care.

28. Chaos Synchronization of Integrated Five-Section Semiconductor Lasers.

29. Understanding Shadow IT usage intention: a view of the dual-factor model.

30. Überlegungen zum Täterkreis von § 75a Abs. 1 IfSG — Zugleich Besprechung von BGH v. 18.10.2023 – 1 StR 146/23, GesR 2024, 325 (in diesem Heft).

31. Security enhancement of amplitude-shift keying-type asymmetric quantum communication systems.

32. Device-independent quantum secure direct communication under non-Markovian quantum channels.

33. Practical Security of Continuous Variable Quantum Key Distribution Ascribable to Imperfect Modulator for Fiber Channel.

34. NDNOTA: NDN One-Time Authentication.

35. Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures.

36. A Survey on Satellite Communication System Security.

37. Evaluating Trust Management Frameworks for Wireless Sensor Networks.

38. Security measures and intrusion detection systems for preventing and mitigating SSL renegotiation denial of service attacks.

39. Investigation of intrusion detection systems in vehicular ad hoc networks.

40. Military base smart security system.

41. Design and build Kindergarten student security devices using RFID and based on IoT.

42. Reinventing sustainable food security: A problem structuring method.

43. Data protection in digital learning space: An overview.

44. A review on cloud computing security challenges, attacks and its countermeasures.

45. Influence of cyber-physical power system elements on each other.

46. Facial recognition with IoT based alert system using OpenCV.

47. High performance packet classification algorithm for network security systems using modified grid-of-tries.

48. A low-cost multi-agent system for physical security in smart buildings.

49. A deep learning framework to identify abnormal activity in closed space.

50. Data security and data transmission delay trade-offs inhealthcare blockchain techniques.

Catalog

Books, media, physical & digital resources