-
1
المصدر: CAAI Transactions on Intelligence Technology, Vol 6, Iss 1, Pp 25-45 (2021)
مصطلحات موضوعية: Computer Networks and Communications, Computer science, Computer security, computer.software_genre, Human-Computer Interaction, Adversarial system, QA76.75-76.765, Artificial Intelligence, Computational linguistics. Natural language processing, Computer Vision and Pattern Recognition, Computer software, P98-98.5, computer, Information Systems
-
2كتاب إلكتروني
المؤلفون: Chris Hughes, Tony Turner, Steve Springett
نوع المادة: eBook.
الموضوعات: Computer security, Computer software
-
3كتاب إلكتروني
المؤلفون: Adam Shostack
نوع المادة: eBook.
-
4
المؤلفون: Sutharshan Rajasegarar, Frank Jiang, Chee Keong Ng, Lei Pan, Leo Yu Zhang
مصطلحات موضوعية: Honeypot, Computer Networks and Communications, Computer science, media_common.quotation_subject, Static analysis, Computer security, computer.software_genre, 0801 Artificial Intelligence and Image Processing, 0803 Computer Software, 0805 Distributed Computing, Computer Science Applications, Theoretical Computer Science, Computational Theory and Mathematics, Voting, Ransomware, Malware, Distributed Computing, computer, Software, media_common
وصف الملف: application/pdf
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a9e2cb7467fed2d59d5fea4137f220db
https://hdl.handle.net/10453/149376 -
5
المؤلفون: Jiale Zhang, Michael Blumenstein, Shui Yu, Junjun Chen, Ying Zhao, Di Wu
المصدر: Concurrency and Computation: Practice and Experience. 34
مصطلحات موضوعية: Computer Networks and Communications, Computer science, Computer security, computer.software_genre, 0801 Artificial Intelligence and Image Processing, 0803 Computer Software, 0805 Distributed Computing, Federated learning, Computer Science Applications, Theoretical Computer Science, Adversarial system, Computational Theory and Mathematics, Distributed Computing, computer, Software, Generative grammar
وصف الملف: application/pdf
-
6كتاب إلكتروني
المؤلفون: Roger A. Grimes
نوع المادة: eBook.
الموضوعات: Computer security, Business enterprises--Computer networks--Security measures, Computer crimes--Prevention, Computer fraud, Malware (Computer software)
-
7
المؤلفون: Huawei Zhao, Peidong Bai, Xu Ruzhi, Peng Yun
المصدر: CAAI Transactions on Intelligence Technology (2018)
مصطلحات موضوعية: Scheme (programming language), Information privacy, appropriate key management schemes, Blockchain, Computer Networks and Communications, Computer science, Cryptography, 02 engineering and technology, Computer security, computer.software_genre, Artificial Intelligence, Backup, Health care, 0202 electrical engineering, electronic engineering, information engineering, health blockchain, Key management, computer.programming_language, privacy data, lcsh:Computer software, data privacy, cryptography, business.industry, body sensor networks, 020206 networking & telecommunications, lcsh:P98-98.5, healthcare system, health care, Human-Computer Interaction, lcsh:QA76.75-76.765, 020201 artificial intelligence & image processing, Computer Vision and Pattern Recognition, efficient key management scheme, lcsh:Computational linguistics. Natural language processing, business, Wireless sensor network, computer, Information Systems, blockchain blocks
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6bd56365a80f19ccfc1f84c3a2f9f667
https://digital-library.theiet.org/content/journals/10.1049/trit.2018.0014 -
8
المؤلفون: Jonathan Paul Marshall
المصدر: Global Networks. 13:290-309
مصطلحات موضوعية: Computer science, business.industry, Computer failure, General Social Sciences, Public relations, Computer security, computer.software_genre, Order (exchange), Computer software, Misinformation, Information society, business, computer, Network society
-
9كتاب إلكتروني
المؤلفون: Dafydd Stuttard, Marcus Pinto, Michael Hale Ligh, Steven Adair, Blake Hartstein, Ozh Richard
نوع المادة: eBook.
-
10كتاب إلكتروني
المؤلفون: Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
نوع المادة: eBook.
الموضوعات: Malware (Computer software), Computer networks--Security measures, Computer crimes, Computer security