Suchergebnisse - "COMPUTER security vulnerabilities"
-
1
Autoren:
Quelle: Journal of Management Information Systems. 2025, Vol. 42 Issue 4, p1149-1176. 28p.
-
2
Autoren:
Quelle: Communications of the ACM. Aug2025, Vol. 68 Issue 8, p20-23. 4p.
-
3
Autoren:
Quelle: Communications of the ACM. Sep2025, Vol. 68 Issue 9, p34-36. 3p.
-
4
Quelle: Communications of the ACM. Dec2025, Vol. 68 Issue 12, p7-7. 1p.
Schlagwörter: *COMPUTER security vulnerabilities, *COMPUTER security, *DATA security failures
-
5
Autoren: et al.
Quelle: ACM Computing Surveys. Jul2025, Vol. 57 Issue 7, p1-36. 36p.
-
6
Autoren: et al.
Quelle: Cluster Computing. Dec2025, Vol. 28 Issue 16, p1-15. 15p.
Schlagwörter: *FEDERATED learning, *COMPUTER security vulnerabilities, *ARTIFICIAL intelligence
-
7
Autoren:
Quelle: Public Library Quarterly. Nov2025, p1-9. 9p.
-
8
Autoren: Shibahara, Toshiki1
Quelle: NTT Technical Review. Nov2025, Vol. 23 Issue 11, p54-58. 5p.
-
9
Autoren: et al.
Quelle: Cluster Computing. Oct2025, Vol. 28 Issue 10, p1-12. 12p.
Schlagwörter: *COMPUTER security vulnerabilities, *BLOCKCHAINS, *PROGRAMMING languages, *SECURITY systems, *DATA integrity, *DETECTION algorithms
-
10
Autoren: Thien, Tran Chi1 (AUTHOR) tranchithien@tdtu.edu.vn
Quelle: Programming & Computer Software. Oct2025, Vol. 51 Issue 5, p349-356. 8p.
Schlagwörter: *COMPUTER security vulnerabilities, *COMPUTER software, *LIBRARY software, *COMPUTER programming, *SOURCE code
-
11
Autoren:
Quelle: Computer Journal. Oct2025, Vol. 68 Issue 10, p1450-1462. 13p.
-
12
Autoren:
Quelle: Energies (19961073). Oct2025, Vol. 18 Issue 19, p5076. 77p.
Schlagwörter: *DATA privacy, *COMPUTER security vulnerabilities, *ENERGY storage, *DATA protection, *INTERNET security, *SMART power grids, *CRYPTOGRAPHY, *SUPPLY & demand
-
13
Autoren: et al.
Quelle: Sensors (14248220). Oct2025, Vol. 25 Issue 19, p6144. 33p.
-
14
Autoren: Cox, Russ
Quelle: Communications of the ACM; Oct2025, Vol. 68 Issue 10, p88-95, 8p
Schlagwörter: OPEN source software, COMPUTER software security, COMPUTER security vulnerabilities, KERNEL operating systems
Firma/Körperschaft: HONEYWELL International Inc.
-
15
Autoren: et al.
Quelle: International Journal of Software Engineering & Knowledge Engineering. May2025, Vol. 35 Issue 5, p609-656. 48p.
-
16
Autoren: et al.
Quelle: International Journal of Software Engineering & Knowledge Engineering. Apr2025, Vol. 35 Issue 4, p469-501. 33p.
-
17
Autoren:
Quelle: Sensors (14248220). Sep2025, Vol. 25 Issue 18, p5900. 18p.
Schlagwörter: *SMARTPHONES, *COMPUTER security vulnerabilities, *TELECOMMUNICATION, *SOUND recording & reproducing, *BIT error rate, *MOBILE apps, *MODULATION theory
Reviews & Products: ANDROID (Operating system)
-
18
Autoren: et al.
Quelle: Journal of Software: Evolution & Process. Sep2025, Vol. 37 Issue 9, p1-17. 17p.
-
19
Autoren:
Quelle: Land Forces Academy Review. Sep2025, Vol. 30 Issue 3, p454-465. 12p.
-
20
A comprehensive survey of deep face verification systems adversarial attacks and defense strategies.
Autoren:
Quelle: Scientific Reports. 8/22/2025, Vol. 15 Issue 1, p1-22. 22p.
Full Text Finder
Nájsť tento článok vo Web of Science