Ngā hua rapu - Attack: Part 1
Ngā kaupapa kua whakahuatia i roto i tō rapu.
Ngā kaupapa kua whakahuatia i roto i tō rapu.
- Computer science 5
- Data protection 5
- Artificial Intelligence 4
- Artificial intelligence 4
- Computer vision 4
- Data and Information Security 4
- History 4
- Image processing 4
- Software Engineering 4
- Software engineering 4
- Computer Engineering and Networks 3
- Computer engineering 3
- Computer networks 3
- Computers 3
- Machine learning 3
- Political Sociology 3
- Political sociology 3
- Theory of Computation 3
- Archaeology 2
- Buddhism 2
- Computer security 2
- Crime & criminology 2
- Criminology: legal aspects 2
- Electronic digital computers 2
- Ethical issues & debates 2
- Evaluation 2
- Image Processing 2
- Imaging systems & technology 2
- International law 2
- Law 2
-
61
Smart Urban Water Networks
I whakaputaina 2021DOAB: download the publication
DOAB: description of the publication
Tāhiko Wāhanga pukapuka -
62
-
63
Umberto Eco and Emotions in The Time of Internet
I whakaputaina 2017Connect to this object online.
Pukapuka -
64
-
65
-
66
-
67
Security of Ubiquitous Computing Systems Selected Topics /
I whakaputaina 2021Rārangi ihirangi: “…Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics.…”
Link to Metadata
Tāhiko īPukapuka -
68
-
69
Insurrectionary Infrastructures
I whakaputaina 2018DOAB: download the publication
DOAB: description of the publication
Tāhiko Wāhanga pukapuka -
70
-
71
Intercultural curriculum in neo-nationalist Europe
I whakaputaina 2014Connect to this object online.
Pukapuka -
72
-
73
Insurrectionary Infrastructures
I whakaputaina 2018OAPEN Library: download the publication
OAPEN Library: description of the publication
Tāhiko Wāhanga pukapuka -
74
-
75
-
76
PERANAN ISOROKU YAMAMOTO DALAM PERANG PASIFIK (1939-1943)
I whakaputaina 2018Link Metadata
Pukapuka -
77
The Parry: An Essential Free-Fighting Tool
I whakaputaina 2012Connect to this object online.
Pukapuka -
78
-
79
-
80