*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 1 - 20 *of* 6*number_thousands_separator*059*number_thousands_separator*734

1

Visual security defense for industrial inspection based on computer vision.
Jiang Z ; Yuan H ; Zeng C ; et al.
Publisher: Public Library of Science Country of Publication: United States NLM ID: 101285081 Publication Model: eCollection Cited Medium: Internet ISSN: 1932-6203 (Electronic) Linking ISSN: 19326203 NLM ISO Abbreviation: PLoS One Subsets: MEDLINE

Humans Algorithms Image Processing, Comput... Computer Security
*Academic Journal*
2

Quality and Security as Key Factors in the Development of Computer Audits in Higher Education Institutions
Daisy Imbaquingo ; Javier Díaz ; José Jácome
25

Computer Security Audits (Verification) Information Security Risk Higher Education Institutional Evaluation
*Academic Journal*
3

What is Quantum Computer Security?
Deshpande, Sanjay ; Szefer, Jakub

Quantum Physics Cryptography and Securit...
*Report*
4

Digital forensics in next generation internet for medical things: balancing security and sustainability
Saini, Hemant Kumar, edt, HerausgeberIn ; Rani, Sita, edt, HerausgeberIn ; Ouaissa, Mariya, edt, HerausgeberIn ; et al.
2026

*Book*
6

[Extended] Ethics in Computer Security Research: A Data-Driven Assessment of the Past, the Present, and the Possible Future
Ramulu, Harshini Sri ; Schmitt, Helen ; Rerich, Bogdan ; et al.

Cryptography and Securit...
*Report*
7

Data Poisoning Vulnerabilities Across Health Care Artificial Intelligence Architectures: Analytical Security Framework and Defense Strategies.
Abtahi F ; Seoane F ; Pau I ; et al.
Publisher: JMIR Publications Country of Publication: Canada NLM ID: 100959882 Publication Model: Electronic Cited Medium: Internet ISSN: 1438-8871 (Electronic) Linking ISSN: 14388871 NLM ISO Abbreviation: J Med Internet Res Subsets: MEDLINE

Humans Neural Networks, Compute... Artificial Intelligence Computer Security Delivery of Health Care
*Academic Journal*
8

State, security and cyberwar: the quest for digital peace
Singh, Thangjam K., VerfasserIn, aut ; 1\p, Jha, Sanjay K., (DE-588)1142160971, (DE-627)1002436966, (DE-576)494714743, aut, VerfasserIn ; Singh, Thangjam K., VerfasserIn, aut
2026

*Book*
9

Systematic security: a CISO's playbook
Qader, Timur, VerfasserIn, aut ; Qader, Timur, VerfasserIn, aut
2026

*Book*
10

A holistic framework for strengthening security of healthcare data through encryption utilizing blockchain technology.
Venkataradhakrishnamurty P ; Malathi K
Publisher: Nature Publishing Group Country of Publication: England NLM ID: 101563288 Publication Model: Electronic Cited Medium: Internet ISSN: 2045-2322 (Electronic) Linking ISSN: 20452322 NLM ISO Abbreviation: Sci Rep Subsets: MEDLINE

Humans Confidentiality Neural Networks, Compute... Electronic Health Record... Algorithms Computer Security
*Academic Journal*
11

Research on network security vulnerability risk contagion in software supply chain based on system dynamics.
Cai H ; Xiong Q ; Lian S
Publisher: Public Library of Science Country of Publication: United States NLM ID: 101285081 Publication Model: eCollection Cited Medium: Internet ISSN: 1932-6203 (Electronic) Linking ISSN: 19326203 NLM ISO Abbreviation: PLoS One Subsets: MEDLINE

Humans Computer Simulation Models, Theoretical Computer Security Software
*Academic Journal*
12

SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors
Wei, Miranda ; Mink, Jaron ; Eiger, Yael ; et al.
Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024)

Computer Science - Crypt... Computer Science - Compu... Computer Science - Human...
*Report*
13

Good Examples Help; Bad Tools Hurt: Lessons for Teaching Computer Security Skills to Undergraduates
Sharman, Jonathan ; Acemyan, Claudia Ziegler ; Kortum, Philip ; et al.
14

Teaching Methods Computer Science Educati... Undergraduate Students Computer Software Computer Security Usability
*Academic Journal*
14

BBAS: A blockchain-based authentication system for e-health with multi-factor authentication, access control, and post-quantum security.
Latif R ; Yakubu BM ; Jamail NSM ; et al.
Publisher: Nature Publishing Group Country of Publication: England NLM ID: 101563288 Publication Model: Electronic Cited Medium: Internet ISSN: 2045-2322 (Electronic) Linking ISSN: 20452322 NLM ISO Abbreviation: Sci Rep Subsets: MEDLINE

Humans Algorithms Telemedicine standards Computer Security Blockchain
*Academic Journal*
15

A novel adaptive hybrid intrusion detection system with lightweight optimization for enhanced security in internet of medical things.
Saeed H ; Naseer M ; Rasool A ; et al.
Publisher: Nature Publishing Group Country of Publication: England NLM ID: 101563288 Publication Model: Electronic Cited Medium: Internet ISSN: 2045-2322 (Electronic) Linking ISSN: 20452322 NLM ISO Abbreviation: Sci Rep Subsets: MEDLINE

Humans Decision Trees Algorithms Neural Networks, Compute... Computer Security Internet of Things
*Academic Journal*
16

The U.S. Department of Education's Federal Information Security Modernization Act of 2014 Report: For Fiscal Year 2025. ED-OIG/A25IT0212
Office of Inspector General (OIG) (ED)
68

Public Agencies Federal Legislation Educational Legislation Information Security Information Technology Information Systems
*Report*
17

Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models
Crumrine, Garrett ; Alsmadi, Izzat ; Guerrero, Jesus ; et al.

Computer Science - Compu... Computer Science - Crypt... Computer Science - Compu... Computer Science - Machi... B.8.0 I.2.7
*Report*
18

Next-generation security for big data analytics in healthcare IoT using hybrid cryptographic techniques.
Alharbi A ; Alosaimi W ; Ahmad M ; et al.
Publisher: SAGE Publications Country of Publication: England NLM ID: 100883604 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1741-2811 (Electronic) Linking ISSN: 14604582 NLM ISO Abbreviation: Health Informatics J Subsets: MEDLINE

Humans Algorithms Data Analytics Computer Security trends Computer Security standa... Computer Security instru...
*Academic Journal*
20

Society of Family Planning Research Practice Support: Digital and data security for abortion research in a post-Dobbs era-A primer for qualitative researchers.
Madera M ; Bennett A ; Bertash K ; et al.
Publisher: Elsevier Country of Publication: United States NLM ID: 0234361 Publication Model: Print-Electronic Cited Medium: Internet ISSN: 1879-0518 (Electronic) Linking ISSN: 00107824 NLM ISO Abbreviation: Contraception Subsets: MEDLINE

Female Humans Pregnancy Confidentiality Family Planning Services Qualitative Research
*Academic Journal*

*Filter*