Showing 1 - 20 results of 21 for search '"security data"', query time: 0.07s Refine Results
  1. 1

    Research on data encryption system and technology for cloud storage by Peiyi HAN, Chuanyi LIU, Jiahui WANG, Shaoming DUAN, Hezhong PAN, Binxing FANG

    Published 2020-08-01
    Subjects: “…cloud security;data security;data encryption…”
    Get full text
    Article
  2. 2

    Virtualization Security, Key Issues of Public Cloud Computing Security by Jiaren Jiang

    Published 2015-12-01
    Subjects: “…public cloud;virtualization security;data security…”
    Get full text
    Article
  3. 3

    Characteristics of security risks of large industrial investments and their management principles by Frigyes Gubics

    Published 2025-01-01
    Subjects: “…Industrial investment, risk assessment, asset security, data protection…”
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Survey of data possession provability proving on cloud storage by Wei FU, Qing YE, Ze-mao CHEN, Xiao-ping WU

    Published 2012-11-01
    Subjects: “…cloud computing;cloud storage;cloud security;data possession provability…”
    Get full text
    Article
  7. 7

    Data circulation security governance from the perspective of data socialization: a five-sphere framework by HUANG Keman, XU Duo, DU Xiaoyong

    Published 2024-11-01
    Subjects: “…data circulation security;data circulation security governance;five-sphere framework…”
    Get full text
    Article
  8. 8

    Módulo de Dados Dinâmicos - MDD: o emprego prático da inteligência territorial by Rodrigo de Freitas Amorim, Thiago França Simonetti

    Published 2023-10-01
    Subjects: “…spatio-temporal scale; water resources management; water security; Data integration…”
    Get full text
    Article
  9. 9

    Network Attack Detection for Business Safety by Fadia Abduljabbar Saeed, Ghalia Nassreddine, Joumana Younis

    Published 2024-03-01
    Subjects: “…Machine learning, Networks attack, Network security, Data privacy, Deep learnig, Support vector machine, Artificial Neural network…”
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    Subjects: “…physical layer security;edge computing;secure data offloading;successive convex approximation;pair-wise stable…”
    Get full text
    Article
  18. 18
  19. 19
  20. 20