Suggested Topics within your search.
Suggested Topics within your search.
- Privacy, Right of 88
- Dissertations, Academic 74
- Dissertations 53
- Data protection 35
- Computer security 33
- Security measures 32
- Law and legislation 26
- Online social networks 12
- Computer networks 11
- Internet 11
- Data encryption (Computer science) 6
- Congresses 5
- Electronic monitoring in the workplace 5
- Electronic surveillance 5
- Government policy 5
- Cloud computing 4
- Cyberspace 4
- Forensic sciences 4
- Mobile computing 4
- Video surveillance 4
- Access control 3
- Computer crimes 3
- Electronic commerce 3
- Medical informatics 3
- Mobile communication systems 3
- Wiretapping 3
- Confidential communications 2
- Consumer protection 2
- Copyright and electronic data processing 2
- Data mining 2
-
261
-
262
-
263
-
264
-
265
-
266
-
267
-
268
Logistics 4.0: technologies, trends, applications and challenges
Published 2020“…Resistance to change, high investment costs, HR-related issues, data privacy issues, IT infrastructure requirements, the public’s opinion about revolutionary technologies and regulations are challenges that must be dealt with for the implementation to be smoothly completed. …”
Get full text
-
269
-
270
Ασφαλής αποθήκευση και ανάκτηση δεδομένων σε μη-αξιόπιστο διακομιστή :
Published 2014Get full text
Thesis Book -
271
Intrusion detection in wireless networks using nature-inspired algorithms :
Published 2014Get full text
Thesis Book -
272
-
273
-
274
-
275
Defining smart cities in a changing world-modern trends
Published 2025“…Issues including urbanization, resource scarcity, overpopulation, data ethics, inclusiveness, interoperability of systems, Big Data storage, the creating and coordinating operation control centers, cybersecurity, privacy, public funding, high costs of new technologies, difficulties in public-private partnerships, even public safety contingency plans, (i.e. 2009 Economic Crisis, COVID -19 pandemic, Russia-Ukraine and Israel-Palestine wars, “Daniel” Flood in Thessaly, Greece, “Armageddon” in Valencia, Spain, hurricane disasters in the USA, etc.) seem to pose some major obstacles to city evolution. …”
Get full text
-
276
Let's Meet! a participatory-based discoveryand rendezvous system for mobile users :
Published 2014Get full text
Thesis Book -
277
-
278
-
279
-
280
Υλοποίηση και αξιολόγηση της αποτελεσματικότητας επιθέσεων τύπου παρεμπόδισης επικοινωνιών - παρεμβολών(Jamming ) σε δίκτυα IEEE 802.11...
Published 2015“…Λόγω της γρήγορης εξέλιξης τους, που επέβαλε την θέσπιση των διαφόρων παραλλαγών του 802.11 πρωτοκόλλου και του εύθραυστου WEP (Wired Equivalent Privacy) αλγορίθμου, τα ασύρματα δίκτυα δέχονται πάμπολλες επιθέσεις και πολλά εύκολα στην χρήση εργαλεία εισβολής έχουν κυκλοφορήσει (DoS Tools). …”
Get full text
Get full text