Showing
1 - 12
results of
12
Skip to content
Warning:
Full texts of licensed resources are only available from the TBU university network. You are currently outside this network.
Please log in to access full texts
×
Portal K.UTB
Čeština
Login
TBU Catalog
e-resources
E-THESES
All Fields
Title
Author
Subject
Find
Advanced Search
Page will reload when a filter is removed.
Applied Filters:
Limit to articles with full text available
Page will reload when a filter is removed.
Show filters (1)
Limit to articles with full text available
Search Results - "Proceedings of the 15th International Conference on Availability, Reliability and Security"
Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Showing
1 - 12
results of
12
Refine Results
Sort
Relevance
Date Descending
Date Ascending
1
Loading…
How do app vendors respond to subject access requests? A longitudinal privacy study on iOS and Android Apps
Published in
Proceedings of the 15th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
2
Loading…
Post-mortem digital forensic artifacts of TikTok Android App
Published in
Proceedings of the 15th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
3
Loading…
Cyber-risk identification for a digital substation
Published in
Proceedings of the 15th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
4
Loading…
Automated modelling of security incidents to represent logging requirements in software systems
Published in
Proceedings of the 15th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
5
Loading…
A device identification method based on LED fingerprint for visible light communication system
Published in
Proceedings of the 15th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
6
Loading…
Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries
Published in
Proceedings of the 15th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
7
Loading…
Formalising fault injection and countermeasures
Published in
Proceedings of the 15th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
8
Loading…
IoT dataset generation framework for evaluating anomaly detection mechanisms
Published in
Proceedings of the 15th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
9
Loading…
AntiPatterns regarding the application of cryptographic primitives by the example of ransomware
Published in
Proceedings of the 15th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
10
Loading…
Distinguishability of adversarial examples
Published in
Proceedings of the 15th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
11
Loading…
Negative filtering of CCTV Content - forensic video analysis framework
Published in
Proceedings of the 15th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
12
Loading…
Building a testing environment for SDN networks analysis for electrical grid applications
Published in
Proceedings of the 15th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
RSS Feed
Email Search
Save Search
Search History
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit to articles from scholarly journals
Clear Filter
Limit to articles with full text available
Limit to Open Access content
Exclude newspaper articles
Include articles at other libraries
Expand results using synonyms
Format
Conference Proceeding
12 results
12
Subject Area
computer science
12 results
12
medicine
12 results
12
Topic
computer science
12 results
12
computer science, information systems
12 results
12
computer science, interdisciplinary applications
12 results
12
science & technology
12 results
12
technology
12 results
12
applied computing -- computer forensics -- evidence collection, storage and analysis
2 results
2
See more
Language
English
12 results
12
Year of Publication
From:
To:
Database
IEEE Electronic Library (IEL)
12 results
12
Unpaywall
12 results
12