Search ResultsElectronic Resources 
Limit Search Results
by
Mohammed, Alamin, author.
Format:
Excerpt:
In environments such as smart communities and electronic health systems, security and privacy are
by
Rocha, Álvaro. editor.
Format:
Excerpt:
experimentation and Virtual Laboratories; G) Multimedia Systems and Applications; H) Security and Privacy; I
by
Graña, Manuel. editor.
Format:
Excerpt:
Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour
by
Bhatt, Chintan. editor.
Format:
Excerpt:
framework and computationally intelligent model to measure possible security vulnerabilities in the context
by
Ghayvat, Hemant. author.
Format:
Excerpt:
mitigation, errors, security and large data handling. As such, it offers a valuable resource for researchers
by
Hosseinian-Far, Amin. editor.
Format:
Excerpt:
-- Theoretical Concepts and Models -- Systems Safety and Security -- Part II: Systemic Modelling, Analysis and
by
Verde, Cristina. editor.
Format:
Excerpt:
computational monitoring of pipelines and pipe networks. It discusses how to improve the systems’ security
by
Luntovskyy, Andriy. author.
Format:
Excerpt:
decades in distributed systems and networks. Important architecture transformations of distributed systems
by
Park, James J. (Jong Hyuk). editor.
Format:
Excerpt:
Ubiquitous Systems and Applications -- 4 Ubiquitous Security, Privacy and Trust -- CSA2016 -- 1 Mobile and
by
Laouiti, Anis. editor.
Format:
Excerpt:
dissemination, processing, and aggregation in vehicular networks -- Security, privacy in vehicular networks
by
Martindale, Wayne, 1965- author.
Format:
Excerpt:
, including food. The impact of new technologies and management systems can therefore improve efficiencies and
by
Ackermann, Tobias. author.
Format:
Excerpt:
. Additionally, the effects of security risks on negative and positive attitudinal evaluations in IT executives

Select an Action




