-
1Academic Journal
المؤلفون: Baker-Eveleth, Lori, Stone, Robert, Eveleth, Daniel
المصدر: Information & Computer Security, 2021, Vol. 30, Issue 3, pp. 324-345.
-
2Academic Journal
المصدر: Bulletin of Electrical Engineering and Informatics; Vol 12, No 1: February 2023; 587-596 ; 2302-9285 ; 2089-3191 ; 10.11591/eei.v12i1
مصطلحات موضوعية: information security, computer privacy, information systems, Privacy, COVID-19, Bibliometric, Contact tracing app, Privacy preserving
وصف الملف: application/pdf
-
3Academic Journal
المصدر: Information & Computer Security, 2021, Vol. 29, Issue 2, pp. 283-313.
-
4
المؤلفون: Alaqra, Ala Sarah, Wästlund, Erik, 1969
المصدر: HCI for Cybersecurity, Privacy and Trust Lecture Notes in Computer Science. :355-370
مصطلحات موضوعية: Behavior, Incentive, Motivation, Privacy, Privacy paradox, Reciprocity, Behavioral research, Data privacy, Human computer interaction, Information dissemination, Surveys, Extrinsic motivation, Focus groups, Human behaviors, Information sharing, Privacy intrusion, Computer privacy, Computer Science, Datavetenskap, Psykologi, Psychology
وصف الملف: electronic
-
5
المؤلفون: Senavirathne, Navoda, Torra, Vicenç
المصدر: Data Privacy Management, Cryptocurrencies and Blockchain Technology Lecture Notes in Computer Science. :22-38
مصطلحات موضوعية: Descriptive statistics, Privacy-preserving statistics, Privacy-preseving data analysis, Blockchain, Computational efficiency, Computer privacy, Electronic money, Information analysis, Sampling, Statistics, Data distribution, Differential privacies, Empirical analysis, Privacy preserving, Privacy requirements, Relative frequencies, Sensitive informations, Data privacy, Skövde Artificial Intelligence Lab (SAIL)
وصف الملف: electronic
-
6
المؤلفون: Torra, Vicenç, Salas, Julián
المصدر: Data Privacy Management, Cryptocurrencies and Blockchain Technology Lecture Notes in Computer Science. :121-137
مصطلحات موضوعية: Data privacy, Edge removal, Graphs, Noise addition, Social networks, Blockchain, Computer privacy, Electronic money, Perturbation techniques, Social networking (online), Anonymization, Data protection techniques, Data utilities, Information loss, Sanitization, Skövde Artificial Intelligence Lab (SAIL)
وصف الملف: electronic
-
7eBook
المساهمون: Knijnenburg, Bart P., Page, Xinru, Wisniewski, Pamela, Lipford, Heather Richter, Proferes, Nicholas, Romano, Jennifer
مصطلحات موضوعية: Open Access, Human and societal aspects of security and privacy, Information systems applications, Privacy policies, Social networks, Social network security and privacy, Privacy-enhancing technologies, Social aspects of computer privacy, bic Book Industry Communication::U Computing & information technology::UR Computer security::URD Privacy & data protection, bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval, bic Book Industry Communication::G Reference, information & interdisciplinary subjects::GT Interdisciplinary studies::GTC Communication studies, bic Book Industry Communication::U Computing & information technology::UB Information technology: general issues::UBJ Ethical & social aspects of IT
وصف الملف: application/pdf
-
8Academic Journal
المؤلفون: Bella, Giampaolo
المصدر: Journal of Intellectual Capital, 2020, Vol. 21, Issue 2, pp. 291-307.
-
9Academic Journal
المؤلفون: Bruno Lepri, Nuria Oliver, Alex Pentland
المصدر: iScience, Vol 24, Iss 3, Pp 102249- (2021)
مصطلحات موضوعية: Algorithms, Artificial Intelligence, Computer Privacy, Science
وصف الملف: electronic resource
-
10Dissertation/ Thesis
المؤلفون: Колтушкин, Г. И., Koltushkin, G.
Thesis Advisors: Медведев, М. А., Балунгу, Д. М., Medvedev, M. A., Balungu, D. M., УрФУ. Институт радиоэлектроники и информационных технологий-РТФ, Базовая кафедра «Аналитика больших данных и методы видеоанализа»
مصطلحات موضوعية: MASTER'S THESIS, COMPUTER SCIENCE, COMPUTER SECURITY, COMPUTER PRIVACY, ANALYSIS OF ALGORITHMS, MACHINE LEARNING, SPAM FILTERING, DEEP LEARNING, NEURAL NETWORKS, SUPPORT VECTOR MACHINES, NAÏVE BAYES, МАГИСТЕРСКАЯ ДИССЕРТАЦИЯ, КОМПЬЮТЕРНЫЕ НАУКИ, КОМПЬЮТЕРНАЯ БЕЗОПАСНОСТЬ, КОМПЬЮТЕРНАЯ КОНФИДЕНЦИАЛЬНОСТЬ, АНАЛИЗ АЛГОРИТМОВ, МАШИННОЕ ОБУЧЕНИЕ, ФИЛЬТРАЦИЯ СПАМА, ГЛУБОКОЕ ОБУЧЕНИЕ, НЕЙРОННЫЕ СЕТИ, ВЕКТОРНЫЕ МАШИНЫ ПОДДЕРЖКИ, НАИВНЫЙ БАЙЕС
وصف الملف: application/pdf
-
11Academic Journal
المؤلفون: Diamantopoulou, Vasiliki, Mouratidis, Haralambos
المصدر: Information & Computer Security, 2018, Vol. 26, Issue 4, pp. 382-400.
-
12Academic Journal
المؤلفون: Foley, Simon N., Rooney, Vivien
المصدر: Information & Computer Security, 2018, Vol. 26, Issue 4, pp. 454-471.
-
13Academic Journal
المؤلفون: Emmanuel Gbenga Dada, Joseph Stephen Bassi, Haruna Chiroma, Shafi'i Muhammad Abdulhamid, Adebayo Olusola Adetunmbi, Opeyemi Emmanuel Ajibuwa
المصدر: Heliyon, Vol 5, Iss 6, Pp e01802- (2019)
مصطلحات موضوعية: Computer science, Computer security, Computer privacy, Analysis of algorithms, Machine learning, Spam filtering, Science (General), Q1-390, Social sciences (General), H1-99
وصف الملف: electronic resource
-
14Academic Journal
المؤلفون: Harris, Mark A., Chin, Amita G.
المصدر: Information & Computer Security, 2016, Vol. 24, Issue 5, pp. 474-495.
-
15Academic Journal
المؤلفون: Gurung, Anil, Raja, M.K.
المصدر: Information & Computer Security, 2016, Vol. 24, Issue 4, pp. 348-371.
-
16Academic Journal
المؤلفون: Amara Korba, Abdelaziz, Nafaa, Mehdi, Ghanemi, Salim
المصدر: Information & Computer Security, 2016, Vol. 24, Issue 4, pp. 298-325.
-
17Academic Journal
المؤلفون: Thomas Hughes-Roberts
المصدر: Information & Computer Security, 2015, Vol. 23, Issue 4, pp. 382-393.
-
18Academic Journal
المؤلفون: Desai, Mayur S., Desai, Kiran J., Phelps, Lonnie D.
المصدر: Information Management & Computer Security, 2012, Vol. 20, Issue 3, pp. 222-244.
-
19Academic Journal
المؤلفون: Grammatikakis Miltos D.(), Παπαδημητριου Κυπριανος(http://users.isc.tuc.gr/~kpapadimitriou), Papadimitriou Kyprianos(http://users.isc.tuc.gr/~kpapadimitriou), Petrakis Polydoros (), Papagrigoriou Antonis(), Κορναρος Γεωργιος(http://users.isc.tuc.gr/~gkornaros), Kornaros Georgios(http://users.isc.tuc.gr/~gkornaros), Christoforakis Ioannis(), Tomoutzoglou Othon(), Tsamis George (), Coppola Marcello()
Relation: info:eu-repo/grantAgreement/EC/FP7/246686; http://purl.tuc.gr/dl/dias/BDE2D864-BC91-4C2C-92EA-00EB363ABAAE; http://users.isc.tuc.gr/~kpapadimitriou/publications/2015tcad-SecMPSoCsNoCfwEvalFram.pdf
-
20Academic Journal
المؤلفون: Read, Huw, Sutherland, Iain, Xynos, Konstantinos, Drange, Tom, Sundt, Ernst
المصدر: Research outputs 2014 to 2021
مصطلحات موضوعية: Curriculum, education, standards, accreditation, computer forensics, computer operating systems, computer privacy, computer programming, computer systems programming, digital forensics, engineering education, forensic science, human computer interaction, security of data, students, cyber security, degree program, educational needs, information assurance, penetration testing, standards and guidelines, technological concept, traditional computers, curricula, Computer Sciences, Information Security