DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 66
21.
Celotno besedilo

PDF
22.
  • Configuring Private Data Ma... Configuring Private Data Management as Access Restrictions: From Design to Enforcement
    Faravelon, Aurélien; Chollet, Stéphanie; Verdier, Christine ... Service-Oriented Computing 7636
    Book Chapter
    Recenzirano
    Odprti dostop

    Service-Oriented Computing (SOC) is a major trend in designing and implementing distributed computer-based applications. Dynamic late biding makes SOC a very promising way to realize pervasive ...
Celotno besedilo
23.
  • Query-Based Access Control ... Query-Based Access Control for Ontologies
    Knechtel, Martin; Stuckenschmidt, Heiner Web Reasoning and Rule Systems
    Book Chapter
    Recenzirano

    Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies representing ...
Celotno besedilo
24.
  • Statistical Monitoring of Keyboard Handwriting for Continuous Authentication
    Khitsenko, Vladimir E.; Krutokhvostov, Dmitry S. 2018 XIV International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering (APEIE), 2018-October
    Conference Proceeding

    A method of continuous authentication by keyboard handwriting is proposed, where differences in preferences of alternative keys are revealed, and there is a constant comparison of the reference and ...
Celotno besedilo
Dostopno za: UL
25.
  • A Protecting Mechanism Against Double Spending Attack in Blockchain Systems
    Xing, Zexi; Chen, Zhengxin 2021 IEEE World AI IoT Congress (AIIoT), 2021-May-10
    Conference Proceeding

    In this research we focus on how to prevent Double Spending Attack (also called 51 % hash rate attack), a particular security issue related to blockchain technology in the current cryptocurrency ...
Celotno besedilo
Dostopno za: UL
26.
  • About the Method of Protecting Information in Financial Portals based on Neural Networks
    Meskhidze, Zurab; Donadze, Mikheil 2021 IEEE East-West Design & Test Symposium (EWDTS), 2021-Sept.-10
    Conference Proceeding

    The paper discusses the security aspects of financial portal information, and proposes a mechanism for creating an information protection module in the information system in financial institutions ...
Celotno besedilo
Dostopno za: UL
27.
  • AI-based content filtering system using an age prediction algorithm
    Upadhyay, Ashutosh; S, Karthikeyan 2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA), 2021-Sept.-2
    Conference Proceeding

    Computer vision mainly focuses on the automatic extraction, analysis, and understanding of useful information from a single image or video. On the other hand, authenticity is emerging as one of the ...
Celotno besedilo
Dostopno za: UL
28.
  • Decentralized urban freight... Decentralized urban freight management through market based mechanisms
    Bhuiyan, M F H; Awasthi, A; Wang, C ... 2010 IEEE International Conference on Systems, Man and Cybernetics, 2010-Oct.
    Conference Proceeding

    Freight trucks provide an essential service to industrialized societies by transporting foods, raw materials and finished goods over land, typically to and from manufacturing plants, retail and ...
Celotno besedilo
Dostopno za: UL
29.
  • Youth Tobacco Access Restri... Youth Tobacco Access Restrictions: Time to Shift Resources to Other Interventions?
    Craig, Michael J.; Boris, Neil W. Health promotion practice, 01/2007, Letnik: 8, Številka: 1
    Journal Article
    Recenzirano

    There is limited data to guide policy makers as to whether youth tobacco access restriction is an effective strategy. Analysis of the limited data on youth access restriction suggests that (a) ...
Celotno besedilo
Dostopno za: UL
30.
  • De-Randomizing the Code Segment with Timing Function Attack
    Zhang, Tianning; Cai, Miao; Zhang, Diming ... 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
    Conference Proceeding

    Recently, many effective defensive methods (e.g., ASLR, execute-only-memory) have been proposed to defeat the code reuse attack in the software system. These approaches provide strong system ...
Celotno besedilo
Dostopno za: UL
1 2 3 4 5
zadetkov: 66

Nalaganje filtrov