Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 284
- Security measures 132
- Dissertations, Academic 97
- Computer networks 80
- Dissertations 62
- Data protection 50
- Congresses 33
- Cryptography 27
- Internet 25
- Privacy, Right of 22
- Data encryption (Computer science) 18
- Cloud computing 15
- Computer crimes 14
- Digital watermarking 11
- Computers 10
- Data processing 10
- Information technology 10
- Access control 9
- Electronic data processing departments 8
- Law and legislation 8
- Mobile computing 8
- Computer network protocols 7
- Cyberspace 7
- Forensic sciences 7
- Information storage and retrieval systems 7
- Management 7
- Operating systems (Computers) 7
- Business enterprises 6
- Firewalls (Computer security) 6
- Electronic data processing 5
-
441
Ανάπτυξη διαδικτυακής πλατφόρμας για τη διδασκαλία της Ασφάλειας Υπολογιστών
Published 2017Subjects: Get full text
Get full text
-
442
Σύγκριση προτύπων και μεθόδων διαχείρισης κινδύνων ασφάλειας πληροφοριακών συστημάτων
Published 2023Subjects: Get full text
-
443
Σύγκριση των συστημάτων ανίχνευσης εισβολών Zeek και Suricata με χρήση κακόβουλης κίνησης δικτύου
Published 2023Subjects: “…Intrusion detection systems (Computer security)…”
Get full text
-
444
-
445
Επιθέσεις δηλητηρίασης SQL κώδικα: απειλές και προστασία
Published 2015Subjects: Get full text
Get full text
-
446
Ηλεκτρονικές επιθέσεις σε ελληνικές επιχειρήσεις
Published 2018Subjects: “…Penetration testing (Computer security) (URL: http://id.loc.gov/authorities/subjects/sh2011003137)…”
Get full text
-
447
Adversarial machine learning: evaluation of attack models & defense mechanisms
Published 2020Subjects: Get full text
-
448
-
449
Blockchain-Based Decentralized Public Key Infrastructure (PKI) using Smart Contracts
Published 2022Subjects: “…Public key infrastructure (Computer security)…”
Get full text
-
450
-
451
-
452
Analysis and empirical evaluation of IEEE 802.1AE (MAC Security) standard
Published 2021Subjects: Get full text
-
453
-
454
-
455
Ανίχνευση κακόβουλων επιθέσεων με τη χρήση τεχνικών μηχανικής μάθησης και νευρωνικών δικτύων
Published 2023Subjects: “…Intrusion detection systems (Computer security)…”
Get full text
-
456
-
457
-
458
A host and cloud-based mechanism for preserving mobile users privacy :
Published 2013Subjects: Get full text
Thesis Book -
459
Anomaly-Based intrusion detection and prevention systems for mobile devices :
Published 2013Subjects: Get full text
Thesis Book -
460