Home > Papers > Data-Security-and-Computer-Security

 
  There are 77 papers published in subject: > since this site started.
  Results per page: 77 Total, 8 Pages | 1 2 3 4 Next > Last >>
Select Subject
   All (8835)
Agronomy (158)
Animal Husbandry,... (64)
Aquatic Science (16)
Astronomy (36)
Aviation (22)
Basic Medicine (184)
Biology (504)
Chemical Engineering (103)
Chemistry (635)
Civil and Archite... (105)
Clinical Medicine (236)
Computer Science ... (924)
Dynamic and Elect... (121)
Earth Science (119)
Economics (67)
Education (31)
Electrics, Commun... (927)
Energy Science an... (67)
Engineering and T... (15)
Environmental Sci... (140)
Food Science and ... (63)
Forestry (36)
Hydraulic Enginee... (40)
Mechanics (240)
Metallurgical Eng... (32)
Mine Engineering ... (38)
Nuclear Science a... (21)
Pharmacy (98)
Physics (920)
Preventive Medici... (37)
Psychology (20)
Security Science ... (17)
Sports Science (6)
Surveying and Map... (15)
Textile Science a... (16)
Traditional Chine... (56)
Transportation En... (57)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list
1. GPALzz: A state-leading fuzzing framework via basic network communication interface
  HAO Wen-Peng,GUO Yan-Hui
  Computer Science and Technology 25 March 2024
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
2. DTAME: A Unified Approach for ABAC Policy Mining and Efficient Evaluation Using Decision Trees
  LAN Ze-Jun, GUAN Jian-Feng
  Computer Science and Technology 28 February 2024
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
3. User Authentication from Smartwatch Photoplethysmography sensor
  TAN ZhiHao,HUANG Qinlong,YANG Yixian
  Computer Science and Technology 22 March 2021
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
4. PPMT: Privacy-Preserving Genomic Data Sharing with Personalized Medicine Testing in Cloud Computing
  YUE Wei,HUANG Qinlong,YANG Yixian
  Computer Science and Technology 09 January 2020
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)