Font Size: a A A
Keyword [Sensitive Data]
Result: 41 - 60 | Page: 3 of 4
41. Static Analysis of Android Apps with Text Analysis and Bi-directional Propagatio
42. Hide-and-seek: Concealment and detection of sensitive data exfiltration in network traffic
43. Active learning in cost-sensitive environments
44. Program Transformation Techniques for Erasing Sensitive Data in Sequential and Concurrent Applications
45. Control of Sensitive Data in Systems with Novel Functionality
46. A Study of Privacy and Fairness in Sensitive Data Analysis
47. Securing the use of sensitive data on remote devices using a hardware-software architecture
48. Content-sensitive data prefetching
49. Distribution-sensitive data structures
50. Data Integrity Verification in Cloud Computing
51. Compiler-Based Mitigations of Vulnerabilities in Systems Softwar
52. Multi-Step Tokenization of Automated Clearing House Payment Transaction
53. Protect Sensitive Computing Using Program Transformation And Trusted Execution Environment
54. Analysis Of Sensitive Data Leakage And Sensitive Behaviors In Android Applications
55. Research On Sensitive Data Protection And Access Control Scheme Based On Double Chain
56. Research On Federatedlearning Methods For Unbalanced Data
57. Research On Android Application Sensitive Data Access Control Based On Security Wrapper
58. Research On Data Masking Technology For Internet Of Things
59. Research On Android Malware And Privacy Leak Detection Method Based On Sensitive Data Flow
60. Design And Implementation Of Relational Sensitive Data Protection System
  <<First  <Prev  Next>  Last>>  Jump to