Gotowa bibliografia na temat „Security and Privacy issues and its approaches”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Security and Privacy issues and its approaches”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Security and Privacy issues and its approaches"
Kanika*1, Alka Agrawal2 &. R.A. Khan3. "AN OVERVIEW OF PRIVACY PRESERVATION IN BIG DATA." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 61–71. https://doi.org/10.5281/zenodo.822970.
Pełny tekst źródłaBaig, Ahmed Fraz, and Sigurd Eskeland. "Security, Privacy, and Usability in Continuous Authentication: A Survey." Sensors 21, no. 17 (2021): 5967. http://dx.doi.org/10.3390/s21175967.
Pełny tekst źródłaRamakrishnan, Mr R. "Privacy Challenges and Solutions in Big Data Analytics: A Comprehensive Review." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 2435–40. http://dx.doi.org/10.22214/ijraset.2024.62103.
Pełny tekst źródłaMylavathi, G. A., N. M. Mallika, and K. Mohanraj. "Survey of Security and Privacy Issues in Big Data Analytics." Asian Journal of Computer Science and Technology 8, S1 (2019): 33–35. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1972.
Pełny tekst źródłaAbdulsalam, Yunusa Simpa, and Mustapha Hedabou. "Security and Privacy in Cloud Computing: Technical Review." Future Internet 14, no. 1 (2021): 11. http://dx.doi.org/10.3390/fi14010011.
Pełny tekst źródłaTiwari,, Arun. "Security and Privacy Analysis in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31055.
Pełny tekst źródłaMassis, Bruce. "The Internet of Things and its impact on the library." New Library World 117, no. 3/4 (2016): 289–92. http://dx.doi.org/10.1108/nlw-12-2015-0093.
Pełny tekst źródłaSivan, Remya, and Zuriati Ahmad Zukarnain. "Security and Privacy in Cloud-Based E-Health System." Symmetry 13, no. 5 (2021): 742. http://dx.doi.org/10.3390/sym13050742.
Pełny tekst źródłaTareq, Imad, Bassant M. Elbagoury, Salsabil El-Regaily, and El-Sayed M. El-Horbaty. "A survey about deep learning and federated Learning in cyberse-curity." Periodicals of Engineering and Natural Sciences (PEN) 12, no. 1 (2024): 75–100. https://doi.org/10.21533/pen.v12.i1.23.
Pełny tekst źródłaReddy, Manjunath, Nur Mohammad Ali Chisty, and Anusha Bodepudi. "A Review of Cybersecurity and Biometric Authentication in Cloud Network." Engineering International 10, no. 1 (2022): 9–18. http://dx.doi.org/10.18034/ei.v10i1.652.
Pełny tekst źródłaRozprawy doktorskie na temat "Security and Privacy issues and its approaches"
Cho, Jihoon. "Cryptographic approaches to security and privacy issues in pervasive computing." Thesis, Royal Holloway, University of London, 2014. http://repository.royalholloway.ac.uk/items/7272f105-8c80-462d-95eb-36f3de8ddaad/1/.
Pełny tekst źródłaKsiążki na temat "Security and Privacy issues and its approaches"
Sloot, Bart, and Aviva Groot, eds. The Handbook of Privacy Studies. Amsterdam University Press, 2018. http://dx.doi.org/10.5117/9789462988095.
Pełny tekst źródłaArtemov, V., N. Golovanova, A. Gravina, et al. Criminal law and economic activity (ratio of private and public interests). INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1160944.
Pełny tekst źródłaDurakova, Irina, Svetlana Pugach, Aleksandra Mitrofanova, et al. HR Management in Russia: the Policy of diversity and inclusiveness. Book 10. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1876366.
Pełny tekst źródłaOrtiz, Juan Carlos. Private Armed Forces and Global Security. ABC-CLIO, LLC, 2010. http://dx.doi.org/10.5040/9798216001409.
Pełny tekst źródłaCadwalader, George. Homeland Security. Edited by Derek S. Reveron, Nikolas K. Gvosdev, and John A. Cloud. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780190680015.013.21.
Pełny tekst źródłaOjanperä, Sanna, Eduardo López, and Mark Graham, eds. Human Development and the Data Revolution. Oxford University PressOxford, 2025. https://doi.org/10.1093/oso/9780198879145.001.0001.
Pełny tekst źródłaBaggett, Ryan K., and Brian K. Simpkins. Homeland Security and Critical Infrastructure Protection. Praeger, 2018. http://dx.doi.org/10.5040/9798400666155.
Pełny tekst źródłaGuitton, Clement. Inside the Enemy's Computer. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190699994.001.0001.
Pełny tekst źródłaLind, Nancy S., and Erik T. Rankin, eds. Privacy in the Digital Age. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798216001386.
Pełny tekst źródłaSpinello, Richard A. Regulating Cyberspace. Greenwood Publishing Group, Inc., 2002. http://dx.doi.org/10.5040/9798216006688.
Pełny tekst źródłaCzęści książek na temat "Security and Privacy issues and its approaches"
García, Natalia Borgoñós, María Hernández Padilla, and Antonio Fernando Skarmeta Gómez. "Privacy Preserving Enablers for Data Space Ecosystems." In Communications in Computer and Information Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-78572-6_5.
Pełny tekst źródłaSchachter, Christel. "Intelligenza Artificiale in Higher Education: applicazioni, sfide e rischi." In Studies on Adult Learning and Education. Firenze University Press, 2024. http://dx.doi.org/10.36253/979-12-215-0504-7.35.
Pełny tekst źródłaChoudhry, Mani Deepak, M. Sundarrajan, S. Jeevanandham, and V. Saravanan. "Security and Privacy Issues in AI-based Biometric Systems." In AI Based Advancements in Biometrics and its Applications. CRC Press, 2024. http://dx.doi.org/10.1201/9781032702377-5.
Pełny tekst źródłaBonura, Susanna, Davide dalle Carbonare, Roberto Díaz-Morales, Ángel Navia-Vázquez, Mark Purcell, and Stephanie Rossello. "Increasing Trust for Data Spaces with Federated Learning." In Data Spaces. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98636-0_5.
Pełny tekst źródłaMacwan, Kamalkumar, and Sankita Patel. "Privacy Preservation Approaches for Social Network Data Publishing." In Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72236-4_9.
Pełny tekst źródłaOhkubo, Miyako, Koutarou Suzuki, and Shingo Kinoshita. "Cryptographic Approaches for Improving Security and Privacy Issues of RFID Systems." In RFID Systems. John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470665251.ch17.
Pełny tekst źródłaMohan, Saranga, Sunita Panda, Ambar Bajpai, and Manoj Tolani. "Proactive Security Approaches for IoT in Health Monitoring Applications." In Security and Privacy Issues for IoT and WSN-based Real-time Applications. Chapman and Hall/CRC, 2025. https://doi.org/10.1201/9781003491910-8.
Pełny tekst źródłaTakabi, Hassan, James B. D. Joshi, and Gail-Joon Ahn. "Security and Privacy in Cloud Computing." In Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2854-0.ch007.
Pełny tekst źródłaMahanty, Rasmita Kumari, Amrita Budarapu, Nayan Rai, and C. Bhagyashree. "Innovative Approaches in Early Detection of Depression." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-6996-8.ch010.
Pełny tekst źródłaVikash, Lalita Mishra, and Shirshu Varma. "Middleware Approach to Enhance the Security and Privacy in the Internet of Things." In Security and Privacy Issues in Sensor Networks and IoT. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0373-7.ch007.
Pełny tekst źródłaStreszczenia konferencji na temat "Security and Privacy issues and its approaches"
Marcillo, Pablo, Ángel Leonardo Valdivieso Caraguay, and Myriam Hernandez-Alvarez. "Security in Vehicle-to-Infrastructure Communications." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002210.
Pełny tekst źródłaS, Divya, and Gini R. "Enhancing Data Security in Cloud Computing using Block chain." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/kjqt5979/ngcesi23p26.
Pełny tekst źródłaGupta, Aarya, and Eshaan Sarda. "Empirical Study on the Role of AI in Modern Education." In Transforming Knowledge: A Multidisciplinary Research on Integrative Learning Across Disciplines. The Bhopal School of Social Sciences, 2025. https://doi.org/10.51767/ic250458.
Pełny tekst źródłaGupta, Aarya, and Eshaan Sarda. "Empirical Study On The Role of AI In Modern Education." In Transforming Knowledge: A Multidisciplinary Research on Integrative Learning Across Disciplines. The Bhopal School of Social Sciences, 2025. https://doi.org/10.51767/ic250461.
Pełny tekst źródłaVićentijević, Kosana. "RIZICI PRIMENE VEŠTAČKE INTELIGENCIJE U KONTEKSTU ESG IZVEŠTAVANJA." In 5. naučni skup Računovodstvena znanja kao činilac ekonomskog i društvenog napretka. Ekonomski fakultetUniverziteta u Kragujevcu, 2025. https://doi.org/10.46793/rz25.569v.
Pełny tekst źródłaDing, Ding, Mauro Conti, and Agusti Solanas. "A smart health application and its related privacy issues." In 2016 Smart City Security and Privacy Workshop (SCSP-W). IEEE, 2016. http://dx.doi.org/10.1109/scspw.2016.7509558.
Pełny tekst źródłaAlmeida, Cristiano Paschoalim de, Heder Soares Bernardino, Jairo Francisco de Souza, and Luciana Conceição Dias Campos. "Real-Time Heart Failure Prediction: An Approach for Ambient Assisted Living." In Simpósio Brasileiro de Sistemas de Informação. Sociedade Brasileira de Computação, 2025. https://doi.org/10.5753/sbsi.2025.245972.
Pełny tekst źródłaKoba, Olena. "ECONOMIC SECURITY AND LEVELS OF ITS FORMATION: CONCEPTUAL APPROACHES." In Current issues of economic development: problems, perspectives, international experiences. Publishing House “Baltija Publishing”, 2023. http://dx.doi.org/10.30525/978-9934-26-296-8-11.
Pełny tekst źródłaShin, Kang G. "Research Issues and Approaches for Connected and Automated Vehicles." In CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy. ACM, 2017. http://dx.doi.org/10.1145/3029806.3029846.
Pełny tekst źródłaPankomera, Richard, and Darelle van Greunen. "Privacy and security issues for a patient-centric approach in public healthcare in a resource constrained setting." In 2016 IST-Africa Week Conference. IEEE, 2016. http://dx.doi.org/10.1109/istafrica.2016.7530664.
Pełny tekst źródłaRaporty organizacyjne na temat "Security and Privacy issues and its approaches"
Eastman, Brittany. Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights. SAE International, 2022. http://dx.doi.org/10.4271/epr2022016.
Pełny tekst źródłaSabatino, Ester, Gustavo Müller, and Gustavo Ramírez Buchheister. The EU’s Approach to Nexus Issues in Conflict Prevention, Mediation and Resolution: Climate, Development and Gender. EsadeGeo. Center for Global Economy and Geopolitics, 2023. https://doi.org/10.56269/202310es.
Pełny tekst źródłaDesmidt, Sophie, Oriol Puig, Adrien Detges, Pia van Ackern, and Fabien Tondel. Climate change and resilience in the Central Sahel. European Centre for Development Policy Management, 2021. http://dx.doi.org/10.55317/casc011.
Pełny tekst źródłaHarangozó, Dániel. Croatia’s defence policy in the shadow of COVID-19 and the Russia-Ukraine war (2020-2023). Magyar Külügyi Intézet, 2023. http://dx.doi.org/10.47683/kkielemzesek.ke-2023.29.
Pełny tekst źródłaÖjendal, Joakim, Monin Nong, Chanmony Sean, Zoe Sidana Bunnath, and Chanrith Ngin. The Political Economy of Land-Water Resource Governance in the Context of Food Security in Cambodia. Cambodia Development Resource Institute, 2023. https://doi.org/10.64202/wp.142.202311.
Pełny tekst źródłaKira, Beatriz, Rutendo Tavengerwei, and Valary Mumbo. Points à examiner à l'approche des négociations de Phase II de la ZLECAf: enjeux de la politique commerciale numérique dans quatre pays d'Afrique subsaharienne. Digital Pathways at Oxford, 2022. http://dx.doi.org/10.35489/bsg-dp-wp_2022/01.
Pełny tekst źródłaLewis, Dustin, Radhika Kapoor, and Naz Modirzadeh. Advancing Humanitarian Commitments in Connection with Countering Terrorism: Exploring a Foundational Reframing concerning the Security Council. Harvard Law School Program on International Law and Armed Conflict, 2021. http://dx.doi.org/10.54813/uzav2714.
Pełny tekst źródłaLambie-Mumford, Hannah, Rachel Loopstra, and Alex Okell. Household food insecurity in the UK: data and research landscape. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.hee561.
Pełny tekst źródłaPrivate sector and food security. Commercial Agriculture for Smallholders and Agribusiness (CASA), 2023. http://dx.doi.org/10.1079/20240191178.
Pełny tekst źródłaCybersecurity: Are We Ready in Latin America and the Caribbean? Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0006517.
Pełny tekst źródła