Suggested Topics within your search.
Suggested Topics within your search.
- Dissertations, Academic 53
- Dissertations 35
- Security measures 14
- History 7
- Cloud computing 6
- Computer security 6
- Internet 5
- Philosophy 5
- Social aspects 5
- Ethnology 4
- Examinations 4
- Study guides 4
- Data encryption (Computer science) 3
- Data protection 3
- Decision making 3
- English language 3
- Jazz 3
- Mobile communication systems 3
- Privacy, Right of 3
- Risk management 3
- Risk-taking (Psychology) 3
- Social life and customs 3
- Social media 3
- Technological innovations 3
- Algorithms 2
- Attitudes 2
- Case studies 2
- Cities and towns 2
- Computer networks 2
- Computer software 2
-
281
Data anonymization: k-anonymity and de-anonymization attacks
Published 2022“…However, the release of data may cause several issues if we don’t take the appropriate actions. There is high risk of disclosure of confidential information concerning individuals. …”
Get full text
Get full text
-
282
-
283
-
284
-
285
-
286
-
287
-
288
-
289
-
290
Automated cloud cyber range deployments
Published 2021“…Cybersecurity Ranges are platforms that take advantage of modern technologies such as virtualization and provide a high fidelity and realistic simulation, experimental, environment, which enables one to test and assess the overall security of the simulated information systems. …”
Get full text
-
291
Αποτίμηση επιχειρήσεων με βάση την οικονομική τους διάρθρωση και χρήση στατιστικών μεθόδων ταξινόμησης σε ομάδες...
Published 2021“…In order to proceed to this, we will study thirty Greek SA Companies with different economic structure. We then take the initiate to choose six financial ratios, the four of them are the most important financial ratios witch belong in the category of investment valuation ratios while respectively the two others belong in the category of the economic structure financial ratios. …”
Get full text
-
292
-
293
-
294
-
295
Μελέτη και ανασκόπηση κακόβουλου λογισμικού για κινητές συσκευές :
Published 2012Get full text
Thesis Book -
296
Έλεγχος πρόσβασης σε ηλεκτρονικές πηγές κατάτη διάρκεια εξετάσεων :
Published 2013Get full text
Thesis Book -
297
-
298
-
299
-
300