Listing 1 - 10 of 54 | << page >> |
Sort by
|
Choose an application
Computer security --- Seguretat informàtica --- Xifratge (Informàtica) --- Protecció de dades
Choose an application
Computer crimes --- Prevention. --- Protecció de dades --- Delictes informàtics --- Prevenció del delicte
Choose an application
Computer security --- Data mining --- Data protection --- Protecció de dades --- Seguretat informàtica --- Mineria de dades
Choose an application
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2022, held in Paris, France, during September 21-23, 2022.The 25 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections as follows: Privacy models; tabular data; disclosure risk assessment and record linkage; privacy-preserving protocols; unstructured and mobility data; synthetic data; machine learning and privacy; and case studies.
Data protection --- Database security --- Bases de dades --- Seguretat informàtica --- Protecció de dades --- Estadística
Choose an application
Computer security --- Data protection --- Database security --- Seguretat informàtica --- Internet --- Protecció de dades
Choose an application
Choose an application
Data protection --- Computer science --- Law and legislation. --- Mathematics. --- Computer mathematics --- Electronic data processing --- Mathematics --- Habeas data --- Privacy, Right of --- Xifratge (Informàtica) --- Protecció de dades --- Protecció de dades personals --- Protecció de la informació (Informàtica) --- Regulació de dades --- Processament de dades --- Seguretat informàtica --- Delegats de protecció de dades --- Dret a l'oblit --- Identitat digital --- Criptografia (Informàtica) --- Criptografia (Matemàtica) --- Criptologia --- Encriptació (Informàtica) --- Encriptació de dades (Informàtica) --- Esteganografia --- Llenguatges xifrats --- Xifratge de dades (Informàtica) --- Signatures electròniques --- Criptografia --- Generadors de nombres aleatoris --- Nombres primers --- Símbols
Choose an application
Choose an application
This volume constitutes the papers of several workshops which were held in conjunction with the 4th International Conference on Science of Cyber Security Workshops, SciSec 2022, held in Matsue, Japan, in August 10-12, 2022. The 15 revised full papers and 3 posters were presented in this book were carefully reviewed and selected from 30 submissions.They were organized in topical sections as follows: AI Crypto and Security Workshop (AI-CryptoSec); Theory and Application of Blockchain and NFT Workshop (TA-BC-NFT); and Mathematical Science of Quantum Safety and its Application Workshop (MathSci-Qsafe).
Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- informatica --- computerbeveiliging --- KI (kunstmatige intelligentie) --- AI (artificiële intelligentie) --- Computer security. --- Computer security --- Data encryption (Computer science) --- Seguretat informàtica --- Xifratge (Informàtica) --- Protecció de dades
Choose an application
{f CRITICAL INFRASTRUCTURE PROTECTION XVI} Edited by: Jason Staggs and Sujeet Shenoi The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. {f Critical Infrastructure Protection XVI} describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: egin{itemize} item Themes and Issues item Industrial Control Systems Security item Additive Manufacturing Systems item Infrastructure Device Security item Telecommunications Systems Security end{itemize} This book is the sixteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of eleven edited papers from the Sixteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, which was held virtually in the spring of 2022. {f Critical Infrastructure Protection XVI} is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. {f Jason Staggs} is an Adjunct Assistant Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA. {f Sujeet Shenoi} is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.
Computer. Automation --- informatica --- computerbeveiliging --- computercriminaliteit --- Data protection. --- Computer engineering. --- Computer networks. --- Computers --- Information technology --- Data and Information Security. --- Computer Engineering and Networks. --- Legal Aspects of Computing. --- Protecció de dades --- Seguretat informàtica --- Enginyeria d'ordinadors --- Law and legislation.
Listing 1 - 10 of 54 | << page >> |
Sort by
|