Search Results

Filter
  • 1-10 of  42,997 results for ""COMPUTERS""
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis.

  • Authors : Socha P; Department of Digital Design, Faculty of Information Technology, Czech Technical University in Prague, 160 00 Prague, Czech Republic.; Miškovský V

Subjects: Computer Security* ; Computers*; Software

  • Source: Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Oct 22; Vol. 22 (21). Date of Electronic Publication: 2022 Oct 22.Publisher: MDPI Country of Publication: Switzerland NLM ID: 101204366 Publication Model: Electronic Cited Medium: Internet ISSN: 1424-8220

Record details

×
Academic Journal

User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes.

  • Authors : Wang X; Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China.; Shi Y

Subjects: Computer Security* ; Computers* ; Movement*

  • Source: Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Sep 01; Vol. 22 (17). Date of Electronic Publication: 2022 Sep 01.Publisher: MDPI Country of Publication: Switzerland NLM ID: 101204366 Publication Model: Electronic Cited Medium: Internet ISSN: 1424-8220

Record details

×
Academic Journal

SE-PSI: Fog/Cloud server-aided enhanced secure and effective private set intersection on scalable datasets with Bloom Filter.

  • Authors : Qiu S; School of Software Engineering, Jinling Institute of Technology, Nanjing 211169, China.; Zhang Z

Subjects: Computer Security* ; Computers*

  • Source: Mathematical biosciences and engineering : MBE [Math Biosci Eng] 2022 Jan; Vol. 19 (2), pp. 1861-1876. Date of Electronic Publication: 2021 Dec 20.Publisher: American Institute of Mathematical Sciences;; _b Beihang University Country of Publication: United States NLM ID: 101197794 Publication Model:

Record details

×
Academic Journal

Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems.

  • Authors : Johnson AP; Department of Engineering and Technology, Centre for Planning, Autonomy and Representation of Knowledge (PARK), School of Computing and Engineering, University of Huddersfield, Queensgate, Huddersfield HD1 3DH, UK.; Al-Aqrabi H

Subjects: Computers*; Computer Security/Computer Security/Computer Security/*trends ; Internet/Internet/Internet/*trends

  • Source: Sensors (Basel, Switzerland) [Sensors (Basel)] 2020 Feb 05; Vol. 20 (3). Date of Electronic Publication: 2020 Feb 05.Publisher: MDPI Country of Publication: Switzerland NLM ID: 101204366 Publication Model: Electronic Cited Medium: Internet ISSN: 1424-8220

Record details

×
Academic Journal

To what extent does time perspective predict online security behaviour?

Subjects: PRIVACY; COMPUTERS; TIME

  • Source: Behaviour & Information Technology. Aug2023, Vol. 42 Issue 10, p1525-1533. 9p. 4 Charts, 1 Graph.

Record details

×
Academic Journal

Security protection using two different image shadows with authentication.

  • Authors : Liu YJ; Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan.; Chang CC

Subjects: Computer Security* ; Computers*; Image Processing, Computer-Assisted/Image Processing, Computer-Assisted/Image Processing, Computer-Assisted/*methods

  • Source: Mathematical biosciences and engineering : MBE [Math Biosci Eng] 2019 Mar 07; Vol. 16 (4), pp. 1914-1932.Publisher: American Institute of Mathematical Sciences;; _b Beihang University Country of Publication: United States NLM ID: 101197794 Publication Model: Print

Record details

×
Periodical

Don’t fear the cloud – embrace it.

Subjects: *COMPUTER input-output equipment; *COMPUTERS; *BUSINESS success

  • Source: Corridor Business Journal. 10/7/2019, Vol. 16 Issue 12, p24-25. 2p.

Record details

×
Academic Journal

Cyberattacks on Devices Threaten Data and Patients: Cybersecurity Risks Come with the Territory. Three Experts Explain What You Need to Know.

Subjects: Computer Security* ; Computers* ; Equipment Safety*

  • Source: IEEE pulse [IEEE Pulse] 2018 May-Jun; Vol. 9 (3), pp. 25-28.Publisher: Institute of Electrical and Electronics Engineers Country of Publication: United States NLM ID: 101541727 Publication Model: Print Cited Medium:

Record details

×
Academic Journal

Examination of China's performance and thematic evolution in quantum cryptography research using quantitative and computational techniques.

  • Authors : Olijnyk NV; United States Military Academy, West Point, NY, United States of America.

Subjects: Computers* ; Quantum Theory*; Computer Security/Computer Security/Computer Security/*trends

  • Source: PloS one [PLoS One] 2018 Jan 31; Vol. 13 (1), pp. e0190646. Date of Electronic Publication: 2018 Jan 31 (Print Publication: 2018).Publisher: Public Library of Science Country of Publication: United States NLM ID: 101285081 Publication Model: eCollection Cited Medium: Internet

Record details

×
  • 1-10 of  42,997 results for ""COMPUTERS""