Article RDF
pages:- 357
- 358
- 359
- 360
- 361
- 362
- 363
- 364
- 365
- 366
- 367
- 368
- 369
- 370
- 371
- 372
- 373
- 374
- 375
- 376
- 377
- 378
- 379
- 380
- 381
- 382
- 383
- 384
- 385
- 386
- 387
- 388
- 389
- 390
- 391
- 392
- 393
- 394
- 395
- 396
- 397
- more...
- Secure Transmission in NOMA Systems: An Efficient Resource Allocation Strategy Using Deep Learning Conference Paper
- Secured and Trusted Service Provision in Pervasive Environment Conference Paper
- Securely outsourcing the ciphertext-policy attribute-based encryption Academic Article
- Securing Named Data Networking: Attribute-Based Encryption and Beyond Academic Article
- Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption Blog Posting
- Securing Stack Smashing Protection in WebAssembly Applications Blog Posting
- Securities Prices are Set by Those at the Market's Margins Academic Article
- Security and Privacy in Emerging Wireless Networks Academic Article
- Security and privacy in IoT communication Academic Article
- Security and Privacy in Smart Cities Academic Article
- Security and privacy issues in cloud computing Academic Article
- Security and trust in ubiquitous systems Academic Article
- Security assurance of local data stored by HTML5 web application Conference Paper
- Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey Academic Article
- Security enhancement of HTML5 Local Data Storage Conference Paper
- Security establishment for IoT environments in 5G: Direct MTC-UE communications Conference Paper
- Security in Transformer Visual Trackers: A Case Study on the Adversarial Robustness of Two Models Blog Posting
- Security in Transformer Visual Trackers: A Case Study on the Adversarial Robustness of Two Models Academic Article
- Security Issues and Solutions in Smart Grid: FUSE-IT European Project Use-case Academic Article
- Security of continuous-variable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase space Academic Article
- Security Protocol Testing Using Attack Trees Conference Paper
- Security requirements for automotive on-board networks Conference Paper
- Security Rules Specification and Analysis Based on Passive Testing Conference Paper
- Security SLA Based Monitoring in Clouds Conference Paper
- SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL Academic Article
- Seeing is Believing Academic Article
- Seeing without sight : an automatic cognition system dedicated to blind and visually impaired people Conference Paper
- SEEOF: Smart energy efficient objective function: Adapting RPL objective function to enable an IPv6 meshed topology solution for battery operated smart meters Conference Paper
- Segmentation conjointe d'images et copules Conference Paper
- Segmentation de stents dans des données médicales à rayons-X corrompues par les artéfacts Conference Paper