Showing 21 - 40 results of 42 for search '"Computer security."', query time: 0.07s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25
  6. 26

    Secure federated learning scheme based on adaptive Byzantine defense by ZHOU Yousheng, GAO Jingkun, ZUO Xiangjian, LIU Yuanni

    Published 2024-08-01
    Subjects: “…federated learning;edge computing;security and privacy protection;Byzantine attack…”
    Get full text
    Article
  7. 27

    CLOUD COMPUTING SECURITY by Ştefan IOVAN, Alina Anabela IOVAN

    Published 2016-05-01
    Subjects: “…cloud computing; security; public services; composite services; best practices;…”
    Get full text
    Article
  8. 28

    Formal Description of Trusted Bebavior Oriented Security System for Big Data by Zhi Yan, Jing Zhan

    Published 2014-07-01
    Subjects: “…big data;cloud computing security;formalization;Z…”
    Get full text
    Article
  9. 29

    Mobile Application Security / by Dwivedi, Himanshu

    Published 2010
    Subjects:
    View in OPAC
    Book
  10. 30
  11. 31
  12. 32
  13. 33
  14. 34
  15. 35
  16. 36

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    Subjects: “…physical layer security;edge computing;secure data offloading;successive convex approximation;pair-wise stable…”
    Get full text
    Article
  17. 37
  18. 38
  19. 39
  20. 40