ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Public health
Medicine / Sub specialtie
Technology
Social Sciences
Research
Economy
Literature
Computing
Communication
all records (73)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
USA
Pakistan
Brazil
South Africa
Canada
Austria
Norway
Ukraine
United Kingdom
all records (79)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
31.132  Articles
1 of 3.114 pages  |  10  records  |  more records»
The growth of distributed computer networks (DCN) is simple for the user to share information and computing capabilities with the host. User identification is an essential access control mechanism for the client-server networking architecture. The percept... see more

The article surveys the necessity of taking the measures to neutralize threats to national security in cyberspace, which are specified with the rapid growth of dependence of state and military authorities on the using of various automated control systems,... see more

Context. Unauthorized access to well-protected information and telecommunication systems is a topical problem in the information security field [1]. For this problem solving, it is proposed to use the deniable encryption mechanisms, which allows itsm... see more

The article surveys the necessity of taking the measures to neutralize threats to national security in cyberspace, which are specified with the rapid growth of dependence of state and military authorities on the using of various automated control systems,... see more

Large Hadron Collider (LHC) is the largest scientific instrument ever created. It was built with the intention of testing the most extreme conditions of the matter. Taking into account the significant dangers of LHC operations, European Organization for N... see more

Warehousing is a product storage management activity to ensure product availability, so inventory management is needed to oversee the movement of logistics and equipment. Some things need to be considered in the storage process, such as the suitability of... see more

Abstrak - Dishub Bandung merupakan kantor dilingkungan Pemkot Bandung, kantor ini memiliki komputer yang masih terdapat user yang terpisah secara fisik dari jaringan Lan dan teknisi setiap monitoring komunikasi data dengan mengakses mikrotik dan access po... see more

We research an interesting quality based admittance control circumstance where different customers having assorted trait sets can collaborate to get access approval if the information proprietor allows their joint exertion in the passage procedure. At tha... see more

Visibility data (providing details about supply chain activities in e.g. production, logistics, and quality processes) is of highly sensitive nature – not just in the food sector, but also beyond. Amongst other things, unauthorized data access can be (mis... see more

1 of 3.114 pages  |  10  records  |  more records»