Sökresultat - "malware"
Rekommenderade teman
Rekommenderade teman
- Computer security 6
- Artificial intelligence 5
- Computer networks 5
- History of engineering & technology 5
- Computer Engineering and Networks 4
- Computer engineering 4
- Computer vision 4
- Artificial Intelligence 3
- Computer Communication Networks 3
- Data protection 3
- Technology: general issues 3
- Application software 2
- Coding theory & cryptology 2
- Computer Imaging, Vision, Pattern Recognition and Graphics 2
- Computer and Information Systems Applications 2
- Computer networking & communications 2
- Computing & information technology 2
- Cryptography 2
- Data and Information Security 2
- Data encryption 2
- Data mining 2
- Digital techniques 2
- Games development & programming 2
- Image processing 2
- Information retrieval 2
- Information technology industries 2
- Network hardware 2
- Network security 2
- Systems analysis & design 2
- Cloud computing 1
-
41
The Huawei and Snowden Questions Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? /
Publicerad 2018Innehållsförteckning: “…-- 4 Development of ICT Systems -- 5 Theoretical Foundation -- 6 Reverse Engineering of Code -- 7 Static Detection of Malware -- 8 Dynamic Detection Methods -- 9 Formal Methods -- 10 Software Quality and Quality Management -- 11 Containment of Untrusted Modules -- 12 Summary and Way Forward.…”
Link to Metadata
Elektronisk E-bok -
42
-
43
Perancangan Jaringan Di SMA Muhammadiyah 1 Surakarta
Publicerad 2013Connect to this object online
Bok -
44
-
45
SISTEM INFORMASI PERSEDIAAN OBAT PADA PUSKESMASSERPONG 2 BERBASIS WEB
Publicerad 2022Link Metadata
Bok -
46
-
47
-
48
-
49
-
50
Nordic Artificial Intelligence Research and Development 4th Symposium of the Norwegian AI Society, NAIS 2022, Oslo, Norway, May 31 - June 1, 2022, Revised Selected Papers /
Publicerad 2022Innehållsförteckning: “…Robotics and Intelligent Systems -- Knowledge Infused Representations through Combination of Expert Knowledge and Original Input -- Cognitive Robotics -- towards the development of next-generation robotics and intelligent systems -- Pattern Based Software Architecture for Predictive Maintenance -- AI in Cyber and Digital Sphere -- An overview of artificial intelligence used in malware -- Fake News Detection by Weakly Supervised Learning Based on Content-Features -- Improving the Usability of Tabular Data through Data Annotation, Repair and Augmentation -- AI in Biological Applications and Medicine -- Detecting human embryo cleavage stages using YOLO v5 object detection algorithm -- Phenotyping of Cervical Cancer Risk Groups via Generalized Low-Rank Models using Medical Questionnaires -- Automatic unsupervised clustering of videos of the intracytoplasmic sperm injection (ICSI) procedure -- Towards New AI Methods -- The Kernelized Taylor Diagram -- Simulating University Application Data for Fair Matchings.…”
Link to Metadata
Elektronisk E-bok -
51
-
52
-
53
-
54
-
55