Listing 1 - 10 of 27 | << page >> |
Sort by
|
Choose an application
Choose an application
Self in literature. --- Kleist, Heinrich von, --- Criticism and interpretation.
Choose an application
Die Amtsträger der Verwaltung im alten Ägypten und in Assyrien waren vom König abhängig, während sie in Athen und Rom vom Volk bestimmt wurden und nach dessen Gesetzen tätig waren. Im Stadtstaat von Athen gab es sogar Ansätze zu einem Verwaltungsrecht. Thomas Groß vergleicht diese Herrschaftsordnungen und ihre frühen Verwaltungsmechanismen jenseits der Einteilung in Monarchie, Aristokratie und Demokratie.
Choose an application
Choose an application
Choose an application
Choose an application
The open access volume LNCS 11739 constitutes the proceedings of the 9th International Workshop on Socio-Technical Aspects in Security, STAST 2019, held in Luxembourg, in September 2019. The total of 9 full papers together with 1 short paper was carefully reviewed and selected from 28 submissions. The papers were organized in topical sections named as follows: Methods for Socio-Technical Systems focused on instruments, frameworks and re ections on research methodology and also System Security considered security analyses and attacks on security systems. Finally, Privacy Control incorporated works on privacy protection and control as well as human factors in relation to these topics.
Computer security. --- Computer organization. --- Data encryption (Computer science). --- Artificial intelligence. --- Application software. --- Systems and Data Security. --- Computer Systems Organization and Communication Networks. --- Cryptology. --- Security Services. --- Artificial Intelligence. --- Information Systems Applications (incl. Internet). --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Organization, Computer --- Electronic digital computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Protection --- Security measures --- Computer networks --- Social aspects --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing
Choose an application
Computer networks --- Security measures --- Social aspects --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
The open access volume LNCS 11739 constitutes the proceedings of the 9th International Workshop on Socio-Technical Aspects in Security, STAST 2019, held in Luxembourg, in September 2019. The total of 9 full papers together with 1 short paper was carefully reviewed and selected from 28 submissions. The papers were organized in topical sections named as follows: Methods for Socio-Technical Systems focused on instruments, frameworks and re ections on research methodology and also System Security considered security analyses and attacks on security systems. Finally, Privacy Control incorporated works on privacy protection and control as well as human factors in relation to these topics.
Programming --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- veiligheidsdiensten --- cryptografie --- applicatiebeheer --- apps --- informatica --- computerbeveiliging --- KI (kunstmatige intelligentie) --- architectuur (informatica)
Choose an application
This book constitutes the refereed post-conference proceedings of the 10th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2020, held as a virtual event, in September 2020. The 8 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions and are organized in the following topical sections: personality and behavior; behavior in face of adversaries; smart environments; decentralized systems and digital ledgers; and reflections on socio-technical aspects of security. The Chapter "Statistical Reliability of 10 Years of Cyber Security User Studies" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- cryptografie --- applicatiebeheer --- apps --- informatica --- programmeren (informatica) --- computerbeveiliging --- computernetwerken --- architectuur (informatica)
Listing 1 - 10 of 27 | << page >> |
Sort by
|