*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 2*number_thousands_separator*390*number_thousands_separator*935

1

Design of Computer Network Security Defense System Based on Deep Learning
Hu, Yichao
2025 IEEE 7th International Conference on Civil Aviation Safety and Information Technology (ICCASIT) Civil Aviation Safety and Information Technology (ICCASIT), 2025 IEEE 7th International Conference on. :1019-1023 Oct, 2025

*Conference*
2

Dependency Network Structure and Security Vulnerabilities in Software Supply Chains.
Yoo, Eunae ; Craighead, Christopher W. ; Samtani, Sagar
Journal of Management Information Systems. 2025, Vol. 42 Issue 4, p1149-1176. 28p.

COMPUTER security vulner... SUPPLY chains STATISTICAL correlation COMPUTER software develo... COMPUTATIONAL complexity
*Academic Journal*
3

Security and Privacy in IoT-Enabled EEG Brain–Computer Interfaces: A Survey and Comparative Analysis
Baghestan, Ali Baghban ; Rabbani, Mahdi
2025 9th International Conference on Internet of Things and Applications (IoT) Internet of Things and Applications (IoT), 2025 9th International Conference on. :1-6 Oct, 2025

*Conference*
4

Research on Computer Information Security Optimization Based on Deep Learning
Zhang, Qingbin
2025 International Conference on Smart & Sustainable Technology (INCSST) Smart & Sustainable Technology (INCSST), 2025 International Conference on. :1-7 Jul, 2025

*Conference*
5

Computer Security and Protection Mechanism Design in Automotive Electronic Systems
Liu, Yongtao
2025 2nd International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS) Intelligent Algorithms for Computational Intelligence Systems (IACIS), 2025 2nd International Conference on. :1-6 Aug, 2025

*Conference*
6

Ensemble Convolutional Neural Networks for Computer Network Security Situation Assessment
Luo, Yongsheng
2025 2nd International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS) Intelligent Algorithms for Computational Intelligence Systems (IACIS), 2025 2nd International Conference on. :1-6 Aug, 2025

*Conference*
7

Data to Infinity and Beyond: Examining Data Sharing and Reuse Practices in the Computer Security Community
Crowder, Anna ; Lu, Allison ; Childs, Kevin ; et al.
2025 IEEE Symposium on Security and Privacy (SP) SP Security and Privacy (SP), 2025 IEEE Symposium on. :2678-2696 May, 2025

*Conference*
8

*This result is not displayed to guests*

9

Computer Network Security and Analysis of the Use of Artificial Intelligence in Protection
Kubas, Jan ; Hraska, Michal ; Papan, Jozef ; et al.
2025 35th International Conference Radioelektronika (RADIOELEKTRONIKA) Radioelektronika (RADIOELEKTRONIKA), 2025 35th International Conference. :1-7 May, 2025

*Conference*
10

Fifty Years of Open Source Software Supply-Chain Security.
Cox, Russ
Communications of the ACM. Oct2025, Vol. 68 Issue 10, p88-95. 8p.

OPEN source software COMPUTER security vulner... COMPUTER software securi... KERNEL operating systems HONEYWELL International...
*Periodical*
11

Visual security defense for industrial inspection based on computer vision.
Jiang Z ; Yuan H ; Zeng C ; et al.
Publisher: Public Library of Science Country of Publication: United States NLM ID: 101285081 Publication Model: eCollection Cited Medium: Internet ISSN: 1932-6203 (Electronic) Linking ISSN: 19326203 NLM ISO Abbreviation: PLoS One Subsets: MEDLINE

Humans Algorithms Image Processing, Comput... Computer Security
*Academic Journal*
12

*This result is not displayed to guests*

13

Optimization of Computer Network Security Strategies in Port Operations
Li, Yuepeng
2024 International Conference on Computer Communication, Networks and Information Science (CCNIS) CCNIS Computer Communication, Networks and Information Science (CCNIS), 2024 International Conference on. :60-64 Oct, 2024

*Conference*
14

Factors Influencing Gen Z Awareness of Computer Security Using Protection Motivation Theory (PMT)
Sahwahita, Rahma ; Utomo, Rio Guntur
2024 International Conference on Information Technology Systems and Innovation (ICITSI) Information Technology Systems and Innovation (ICITSI), 2024 International Conference on. :374-379 Dec, 2024

*Conference*
15

What is Quantum Computer Security?
Deshpande, Sanjay ; Szefer, Jakub

Quantum Physics Cryptography and Securit...
*Report*
16

Implementation of YOLO and Face Recognition on a Security Camera System for Visitor Detection in the Computer and Network Lab of UNS
Saputra, Baharuddin Dias ; Rahutomo, Faisal ; Sutrisno ; et al.
2024 IEEE 2nd International Conference on Electrical Engineering, Computer and Information Technology (ICEECIT) Electrical Engineering, Computer and Information Technology (ICEECIT), 2024 IEEE 2nd International Conference on. :12-17 Nov, 2024

*Conference*
17

*This result is not displayed to guests*

18

Computer Security: Principles and Practice, Global Edition
William Stallings ; Lawrie Brown ; William Stallings ; et al.

Computer networks--Secur... Computer security
*eBook*
19

Computer vision for enhancing security and surveillance in a public space
Jadhav, Deepak Dilip ; Debnath, Saswati ; Reddy, Revanuru Harinath ; et al.
2024 International Conference on Computing and Intelligent Reality Technologies (ICCIRT) Computing and Intelligent Reality Technologies (ICCIRT), 2024 International Conference on. :1-5 Dec, 2024

*Conference*
20

*This result is not displayed to guests*


*Filter*