Font Size:
a
A
A
Keyword [Security systems]
Result: 61 - 72 | Page: 4 of 4
61.
New techniques for analyzing applied computer security systems
62.
Authentication for humans: The design and evaluation of usable security systems
63.
Assured identity for the cloud
64.
Information security analysis: A study to analyze the extent to which information security systems can be utilized to prevent intoxicated individuals from driving
65.
Human detection and tracking enhancing security systems at ports of entry
66.
Integrating secure hardware into modern security systems: Authentication, secure storage, and secure bootstrap
67.
Establishing a methodology for designing real-time network security systems
68.
DATA SECURITY: OPERATING SYSTEMS AND COMPUTER NETWORKS
69.
Information Security Systems Policy Violation: An Analysis of Management Employee Interpersonal Relationship and the Impact on Deterrence
70.
Multiple Security Domain Nondeducibility in Cyber-Physical Systems
71.
Automated Event-driven Security Assessment
72.
Design Of Intelligent Security System For Elderly People At Home Based On Internet Of Thing
<<First
<Prev
Next>
Last>>
Jump to