Treffer 181 - 200 von 34.625

181

A Match Made in Heaven? AI-driven Matching of Vulnerabilities and Security Unit Tests
Iannone, Emanuele ; Bui, Quang-Cuong ; Scandariato, Riccardo

Software Engineering Cryptography and Securit... Machine Learning D.2.5; D.2.7
Report
182

Advanced OSGi Security Layer
Huang, Chi-Chih ; Wang, Pang-Chieh ; Hou, Ting-Wei
21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07) Advanced Information Networking and Applications Workshops, 2007, AINAW '07. 21st International Conference on. 2:518-523 May, 2007

Konferenz
183

Two ways to bake your pizza : Translating parameterised types into Java
ODERSKY, Martin ; RUNNE, Enno ; WADLER, Philip
Generic programming (Dagstuhl Castle, 27 April - 1 May 1998)Lecture notes in computer science. :114-132

Computer science Informatique Sciences exactes et tech... Exact sciences and techn... Sciences appliquees Applied sciences
Konferenz
184

Low Level Security in Java
Frank Yellin ; The Pennsylvania State University CiteSeerX Archives
http://www.net.uom.gr/Books/Manuals/llsij.pdf.

Java HotJava Security Remote execution
Fachzeitschrift
185

Dieses Ergebnis kann Gästen nicht angezeigt werden.

186

A Security PaaS Container with a Customized JVM
Lin, Rongheng ; Wu, Budan ; Su, Sen ; et al.
2014 IEEE 7th International Conference on Cloud Computing Cloud Computing (CLOUD), 2014 IEEE 7th International Conference on. :960-961 Jun, 2014

Konferenz
187

An Open Data and Methods Framework for Comparative Evaluation of DICOM De-Identification Tools.
Seyderhelm F ; Bowden J ; Zaschke P ; et al.
Publisher: IOS Press Country of Publication: Netherlands NLM ID: 9214582 Publication Model: Print Cited Medium: Internet ISSN: 1879-8365 (Electronic) Linking ISSN: 09269630 NLM ISO Abbreviation: Stud Health Technol Inform Subsets: MEDLINE

Humans Software Radiology Information Sy... Confidentiality standard... Data Anonymization stand... Computer Security standa...
Fachzeitschrift
189

Dieses Ergebnis kann Gästen nicht angezeigt werden.

190

CHERI JNI ; Sinking the Java Security Model into the C
Chisnall, David ; Davis, Brooks ; Gudka, Khilan ; et al.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems ; page 569-583

Konferenz
191

Java Card for PayTv Application
Dutta, Pallab

Computer Science - Crypt...
Report
192

Dieses Ergebnis kann Gästen nicht angezeigt werden.

194

Deep convolutional neural network based archimedes optimization algorithm for heart disease prediction based on secured IoT enabled health care monitoring system.
S S ; A V SB ; S JJ ; et al.
Publisher: Nature Publishing Group Country of Publication: England NLM ID: 101563288 Publication Model: Electronic Cited Medium: Internet ISSN: 2045-2322 (Electronic) Linking ISSN: 20452322 NLM ISO Abbreviation: Sci Rep Subsets: MEDLINE

Humans Convolutional Neural Net... Monitoring, Physiologic... Computer Security Heart Diseases diagnosis Internet of Things
Fachzeitschrift
195

Enhancing Security
Coffin, David ; Coffin, David
Expert Oracle and Java Security : Programming Secure Oracle Database Applications with Java. :267-328

E-Book
196

Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data
Cristalli, Stefano ; Vignati, Edoardo ; Bruschi, Danilo ; et al.
Lecture Notes in Computer Science ISBN: 9783030004699

Sandbox Anomaly detection Java security Software protection
Buch
197

Dieses Ergebnis kann Gästen nicht angezeigt werden.

198

Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs
Hammer, Christian

QA75.5-76.95 information flow control software security program slicing program dependence graph path conditions
E-Book
199

Java ME Virtual Machines
Debbabi, Mourad ; Saleh, Mohamed ; Talhi, Chamseddine ; et al.
Embedded Java Security : Security for Mobile Devices. :17-36

E-Book
200

Dieses Ergebnis kann Gästen nicht angezeigt werden.


Filter