Linked e-resources

Details

The Effectiveness of Outsourcing Cybersecurity Practices: A Study of the Italian Context
Evaluation of System Features Used for Malware Detection
Security Analysis of Zhang et al. Authenticated Encryption Scheme
Efficient Secret Sharing-based Partial Matching Search using Error Correction Code
Double-extortion Ransomware: A Technical Analysis of Maze Ransomware
Best Practices for Cloud Data Protection and Key Management
Hybrid Firefly and Swarm Algorithms for Breast Cancer Mammograms Classification based on Rough Set Theory Features Selection.

Browse Subjects

Show more subjects...

Statistics

from
to
Export