Narrow your search

Library

KU Leuven (7)

ULiège (5)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

UCLL (4)

ULB (4)

VIVES (4)

KBR (1)

UCLouvain (1)

More...

Resource type

book (7)


Language

English (7)


Year
From To Submit

2021 (1)

2020 (1)

2016 (1)

2014 (1)

2010 (1)

More...
Listing 1 - 7 of 7
Sort by

Book
Cybersecurity
Author:
ISBN: 0262365448 9780262365444 9780262542548 0262542544 Year: 2021 Publisher: Cambridge, Massachusetts The MIT Press


Book
Security engineering : a guide to building dependable distributed systems
Author:
ISBN: 9781119642787 1119642787 Year: 2020 Publisher: Indianapolis, Indiana John Wiley & Sons, Inc.

Loading...
Export citation

Choose an application

Bookmark

Abstract

In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020. The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop?


Book
Secure System Design and Trustable Computing
Authors: ---
ISBN: 3319149709 3319149717 9783319149707 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions, and networking services.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.

Keywords

Electrical Engineering --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Embedded computer systems --- Computer security. --- Data encryption (Computer science) --- Security measures. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Embedded systems (Computer systems) --- Security measures --- Protection of computer systems --- Protection --- Engineering. --- Electronics. --- Microelectronics. --- Electronic circuits. --- Circuits and Systems. --- Systems and Data Security. --- Electronics and Microelectronics, Instrumentation. --- Data protection --- Security systems --- Hacking --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Microminiature electronic equipment --- Microminiaturization (Electronics) --- Microtechnology --- Semiconductors --- Miniature electronic equipment --- Electrical engineering --- Physical sciences --- Construction --- Industrial arts --- Technology --- Computer security --- Cryptography --- Architecture Analysis and Design Language --- Systems engineering. --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Design and construction --- Computer Security --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer

Implementing secure heaalthcare telematics applications in Europe
Author:
ISSN: 09269630 ISBN: 9051994893 9789051994896 Year: 2001 Volume: 66 Publisher: Ohmsha Ios Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Medical telematics --- Data protection --- Telecommunication in medicine --- Computer Communication Networks. --- Computer Security. --- Telemedicine. --- Medical Records Systems, Computerized. --- -Medical telematics --- -Telecommunication in medicine --- -Telecare (Medicine) --- Telemedicine --- Medicine --- Clinical telematics --- Health telematics --- Telehealth --- Medical informatics --- Telematics --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Automated Medical Record System --- Automated Medical Record Systems --- Automated Medical Records System --- Computerized Medical Record --- Computerized Medical Record System --- Computerized Medical Record Systems --- Computerized Medical Records --- Computerized Medical Records System --- Computerized Patient Medical Records --- Medical Record System, Automated --- Medical Record System, Computerized --- Medical Record Systems, Automated --- Medical Record Systems, Computerized --- Medical Record, Computerized --- Medical Records System, Automated --- Medical Records System, Computerized --- Medical Records Systems, Automated --- Medical Records, Computerized --- Automated Medical Records Systems --- Computerized Medical Records Systems --- Record, Computerized Medical --- Records, Computerized Medical --- Forms and Records Control --- Mobile Health --- eHealth --- mHealth --- Health, Mobile --- Telemetry --- Compromising of Data --- Computer Hackers --- Computer Worms --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Hacker, Computer --- Hackers, Computer --- Protection, Information --- Security, Computer --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Computer Network Management --- Databases, Distributed --- Distributed Systems --- Extranets --- Intranets --- Network Communication Protocols --- Telecommunication Networks --- Communication Network, Computer --- Communication Networks, Computer --- Communication Protocol, Network --- Communication Protocols, Network --- Computer Communication Network --- Database, Distributed --- Distributed Database --- Distributed Databases --- Distributed System --- Extranet --- Intranet --- Management, Computer Network --- Network Communication Protocol --- Network Management, Computer --- Network, Computer Communication --- Network, Telecommunication --- Networks, Computer Communication --- Networks, Telecommunication --- Protocol, Network Communication --- Protocols, Network Communication --- System, Distributed --- Systems, Distributed --- Telecommunication Network --- Telecommunications --- Education, Distance --- Europe. --- Northern Europe --- Southern Europe --- Western Europe --- Cyber Security --- Cybersecurity --- Data Encryption --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Security, Cyber --- -Europe. --- Computer Communication Networks --- Computer Security --- Medical Records Systems, Computerized --- Telecare (Medicine) --- Europe --- Security measures --- Medical records --- Access control --- Tele-ICU --- Tele-Intensive Care --- Tele-Referral --- Virtual Medicine --- Medicine, Virtual --- Tele ICU --- Tele Intensive Care --- Tele Referral --- Tele-Referrals --- Medical telematics - Europe. --- Data protection - Europe. --- Telecommunication in medicine - Europe.


Book
Security and privacy for implantable medical devices
Authors: ---
ISBN: 1461416736 1461416744 9781461416739 Year: 2014 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

 This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD).  It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from engineering introduce to some IMD systems that have  recently been proposed and developed. Experts from Computer Security and Cryptography present new research, which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in Computer Science privacy research, as well as lightweight solutions appropriate for implementation in IMDs.   ·         Describes problems of security and privacy in implantable medical devices and proposes technological solutions; ·         Includes basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures;  ·         Provides state-of-the-art research of interest to a multidisciplinary audience in electrical, computer and bioengineering, computer networks and cryptography and medical and health sciences.                        .

Keywords

Engineering. --- Data encryption (Computer science) --- Systems engineering. --- Biomedical engineering. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Clinical engineering --- Medical engineering --- Engineering systems --- System engineering --- Construction --- Design and construction --- Data encryption (Computer science). --- Electronic circuits. --- Circuits and Systems. --- Data Encryption. --- Biomedical Engineering. --- Engineering --- Industrial engineering --- System analysis --- Computer security --- Cryptography --- Bioengineering --- Biophysics --- Medicine --- Industrial arts --- Technology --- Cryptology. --- Biomedical Engineering and Bioengineering. --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Implants, Artificial --- Biomedical engineering --- Confidential communications --- Prostheses and Implants --- Computer Security --- Confidentiality --- Privacy --- Biomedical Technology --- Biomedical Technologies --- Technology, Biomedical --- Technology, Health --- Technology, Health Care --- Health Care Technology --- Health Technology --- Biomedical Engineering --- Medical Informatics --- PL 93-579 --- PL93-579 --- Privacy Act --- Public Law 93-579 --- Act, Privacy --- Law 93-579, Public --- PL 93 579 --- PL93 579 --- Public Law 93 579 --- Confidential Information --- Secrecy --- Patient Data Privacy --- Privacy of Patient Data --- Privileged Communication --- Communication, Privileged --- Communications, Privileged --- Data Privacy, Patient --- Information, Confidential --- Privacy, Patient Data --- Privileged Communications --- Duty to Warn --- Disclosure --- Anonymous Testing --- Parental Notification --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Cybersecurity --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Endoprostheses --- Endoprosthesis --- Prostheses --- Prosthetic Implants --- Prosthesis --- Artificial Implant --- Artificial Implants --- Implant, Artificial --- Implant, Prosthetic --- Implants and Prostheses --- Implants, Prosthetic --- Prosthetic Implant --- Prosthesis Retention --- Communications, Confidential --- Confidential relationships --- Privileged communications (Confidential communications) --- Professional secrets --- Secrets, Professional --- Confession --- Criminal law --- Evidence (Law) --- Objections (Evidence) --- Personality (Law) --- Professional ethics --- Privacy, Right of --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Artificial implants --- Implants, Surgical --- Surgical implants --- Biomedical materials --- Surgery --- Law and legislation --- Protection --- Security measures --- Implants, Artificial. --- Computer security.


Book
Electronic Healthcare Information Security
Authors: --- ---
ISBN: 0387848177 9786612980831 038784919X 1282980831 Year: 2010 Publisher: New York, NY : Springer US : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The adoption of Information and Communication Technologies (ICT) in healthcare is driven by the need to contain costs while maximizing quality and efficiency. However, ICT adoption for healthcare information management has brought far-reaching effects and implications on the spirit of the Hippocratic Oath, patient privacy and confidentiality. A wave of security breaches have led to pressing calls for opt-in and opt-out provisions where patients are free to choose to or not have their healthcare information collected and recorded within healthcare information systems. Such provisions have negative impact on cost, efficiency and quality of patient care. Thus determined efforts to gain patient trust is increasingly under consideration for enforcement through legislation, standards, national policy frameworks and implementation systems geared towards closing gaps in ICT security frameworks. The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency in patient care services are driving innovation in healthcare information management. Key among the main innovations is the introduction of new healthcare practice concepts such as shared care, evidence-based medicine, clinical practice guidelines and protocols, the cradle-to-grave health record and clinical workflow or careflow. Central to these organizational re-engineering innovations is the widespread adoption of Information and Communication Technologies (ICT) at national and regional levels, which has ushered in computer-based healthcare information management that is centred on the electronic healthcare record (EHR).

Keywords

Electronic books. -- local. --- Health services administration -- Data processing. --- Medical informatics. --- Medical Records Systems, Computerized --- Security Measures --- Information Science --- Medical Records --- Organization and Administration --- Health Services Administration --- Records as Topic --- Data Collection --- Health Care --- Epidemiologic Methods --- Investigative Techniques --- Analytical, Diagnostic and Therapeutic Techniques and Equipment --- Computer Security --- Electronic Health Records --- Medicine --- Engineering & Applied Sciences --- Health & Biological Sciences --- Medical & Biomedical Informatics --- Computer Science --- Electronic Health Record --- Electronic Medical Record --- Electronic Medical Records --- Health Record, Electronic --- Health Records, Electronic --- Medical Record, Electronic --- Medical Records, Electronic --- Record, Electronic Health --- Record, Electronic Medical --- Records, Electronic Health --- Records, Electronic Medical --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Cybersecurity --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Investigative Technics --- Investigative Technic --- Investigative Technique --- Technic, Investigative --- Technics, Investigative --- Technique, Investigative --- Techniques, Investigative --- Epidemiologic Method --- Epidemiological Methods --- Methods, Epidemiologic --- Epidemiological Method --- Method, Epidemiologic --- Method, Epidemiological --- Methods, Epidemiological --- Epidemiology --- Community-Based Distribution --- Contraceptive Distribution --- Delivery of Healthcare --- Dental Care Delivery --- Distribution, Non-Clinical --- Distribution, Nonclinical --- Distributional Activities --- Healthcare --- Healthcare Delivery --- Healthcare Systems --- Non-Clinical Distribution --- Nonclinical Distribution --- Delivery of Dental Care --- Health Care Delivery --- Health Care Systems --- Activities, Distributional --- Activity, Distributional --- Care, Health --- Community Based Distribution --- Community-Based Distributions --- Contraceptive Distributions --- Deliveries, Healthcare --- Delivery, Dental Care --- Delivery, Health Care --- Delivery, Healthcare --- Distribution, Community-Based --- Distribution, Contraceptive --- Distribution, Non Clinical --- Distributional Activity --- Distributions, Community-Based --- Distributions, Contraceptive --- Distributions, Non-Clinical --- Distributions, Nonclinical --- Health Care System --- Healthcare Deliveries --- Healthcare System --- Non Clinical Distribution --- Non-Clinical Distributions --- Nonclinical Distributions --- System, Health Care --- System, Healthcare --- Systems, Health Care --- Systems, Healthcare --- Data Aggregation --- Data Collection Methods --- Dual Data Collection --- Aggregation, Data --- Collection Method, Data --- Collection Methods, Data --- Collection, Data --- Collection, Dual Data --- Data Collection Method --- Method, Data Collection --- Methods, Data Collection --- Forms as Topic --- Personal Identification Systems --- Travel Documents --- Document, Travel --- Documents, Travel --- Forms as Topics --- Identification System, Personal --- Identification Systems, Personal --- Personal Identification System --- Records as Topics --- System, Personal Identification --- Systems, Personal Identification --- Travel Document --- Administration, Health Services --- Health Services --- Administration and Organization --- Administrative Technics --- Administrative Techniques --- Coordination, Administrative --- Logistics --- Supervision --- Technics, Administrative --- Techniques, Administrative --- Administration --- Administrative Coordination --- Administrative Technic --- Administrative Technique --- Technic, Administrative --- Technique, Administrative --- Records, Medical --- Transcription, Medical --- Health Diaries --- Medical Transcription --- Diaries, Health --- Diary, Health --- Health Diary --- Medical Record --- Medical Transcriptions --- Record, Medical --- Transcriptions, Medical --- Information Sciences --- Science, Information --- Sciences, Information --- National Security --- Measure, Security --- Measures, Security --- Security Measure --- Security, National --- Automated Medical Record System --- Automated Medical Record Systems --- Automated Medical Records System --- Computerized Medical Record --- Computerized Medical Record System --- Computerized Medical Record Systems --- Computerized Medical Records --- Computerized Medical Records System --- Computerized Patient Medical Records --- Medical Record System, Automated --- Medical Record System, Computerized --- Medical Record Systems, Automated --- Medical Record Systems, Computerized --- Medical Record, Computerized --- Medical Records System, Automated --- Medical Records System, Computerized --- Medical Records Systems, Automated --- Medical Records, Computerized --- Automated Medical Records Systems --- Computerized Medical Records Systems --- Record, Computerized Medical --- Records, Computerized Medical --- methods --- organization & administration --- Computer science. --- Health administration. --- Computer security. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Health Administration. --- Information Systems Applications (incl. Internet). --- e-Commerce/e-business. --- Health services administration --- Data processing. --- Clinical informatics --- Health informatics --- Medical information science --- Information science --- Data processing --- Practice of medicine. --- Medical practice --- Practice of medicine --- Physician practice acquisitions --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Application software. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Advances in Biometrics : Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings
Authors: --- ---
ISBN: 3642017924 3642017932 Year: 2009 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Third International Conference on Biometrics, ICB 2009, held in Alghero, Italy, June 2-5, 2009. The 36 revised full papers and 93 revised poster papers presented were carefully reviewed and selected from 250 submissions. Biometric criteria covered by the papers are assigned to face, speech, fingerprint and palmprint, multibiometrics and security, gait, iris, and other biometrics. In addition there are 4 papers on challenges and competitions that currently are under way, thus presenting an overview on the evaluation of biometrics.

Keywords

Biometry --- Computer Security --- Computer Communication Networks --- Pattern Recognition, Automated --- Security Measures --- Information Science --- Statistics as Topic --- Epidemiologic Measurements --- Computer Systems --- Epidemiologic Methods --- Public Health --- Organization and Administration --- Computing Methodologies --- Environment and Public Health --- Investigative Techniques --- Health Services Administration --- Health Care --- Analytical, Diagnostic and Therapeutic Techniques and Equipment --- Computer Science --- Electrical Engineering --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Community-Based Distribution --- Contraceptive Distribution --- Delivery of Healthcare --- Dental Care Delivery --- Distribution, Non-Clinical --- Distribution, Nonclinical --- Distributional Activities --- Healthcare --- Healthcare Delivery --- Healthcare Systems --- Non-Clinical Distribution --- Nonclinical Distribution --- Delivery of Dental Care --- Health Care Delivery --- Health Care Systems --- Activities, Distributional --- Activity, Distributional --- Care, Health --- Community Based Distribution --- Community-Based Distributions --- Contraceptive Distributions --- Deliveries, Healthcare --- Delivery, Dental Care --- Delivery, Health Care --- Delivery, Healthcare --- Distribution, Community-Based --- Distribution, Contraceptive --- Distribution, Non Clinical --- Distributional Activity --- Distributions, Community-Based --- Distributions, Contraceptive --- Distributions, Non-Clinical --- Distributions, Nonclinical --- Health Care System --- Healthcare Deliveries --- Healthcare System --- Non Clinical Distribution --- Non-Clinical Distributions --- Nonclinical Distributions --- System, Health Care --- System, Healthcare --- Systems, Health Care --- Systems, Healthcare --- Administration, Health Services --- Health Services --- Investigative Technics --- Investigative Technic --- Investigative Technique --- Technic, Investigative --- Technics, Investigative --- Technique, Investigative --- Techniques, Investigative --- High Performance Computing --- Methodologies, Computing --- Computing Methodology --- Computing, High Performance --- Methodology, Computing --- Performance Computing, High --- Administration and Organization --- Administrative Technics --- Administrative Techniques --- Coordination, Administrative --- Logistics --- Supervision --- Technics, Administrative --- Techniques, Administrative --- Administration --- Administrative Coordination --- Administrative Technic --- Administrative Technique --- Technic, Administrative --- Technique, Administrative --- Environment, Preventive Medicine & Public Health --- Environment, Preventive Medicine and Public Health --- Health, Public --- Epidemiologic Method --- Epidemiological Methods --- Methods, Epidemiologic --- Epidemiological Method --- Method, Epidemiologic --- Method, Epidemiological --- Methods, Epidemiological --- Epidemiology --- Organization, Computer Systems --- Computer Architecture --- Computer Systems Development --- Computer Systems Evaluation --- Computer Systems Organization --- Real-Time Systems --- Architecture, Computer --- Architectures, Computer --- Computer Architectures --- Computer System --- Computer Systems Evaluations --- Development, Computer Systems --- Evaluation, Computer Systems --- Evaluations, Computer Systems --- Real Time Systems --- Real-Time System --- System, Computer --- System, Real-Time --- Systems, Computer --- Systems, Real-Time --- Measurements, Epidemiologic --- Epidemiologic Measurement --- Measurement, Epidemiologic --- Area Analysis --- Correlation Studies --- Correlation Study --- Correlation of Data --- Data Analysis --- Estimation Technics --- Estimation Techniques --- Indirect Estimation Technics --- Indirect Estimation Techniques --- Multiple Classification Analysis --- Service Statistics --- Statistical Study --- Statistics, Service --- Tables and Charts as Topic --- Analyses, Area --- Analyses, Data --- Analyses, Multiple Classification --- Analysis, Area --- Analysis, Data --- Analysis, Multiple Classification --- Area Analyses --- Classification Analyses, Multiple --- Classification Analysis, Multiple --- Data Analyses --- Data Correlation --- Data Correlations --- Estimation Technic --- Estimation Technic, Indirect --- Estimation Technics, Indirect --- Estimation Technique --- Estimation Technique, Indirect --- Estimation Techniques, Indirect --- Indirect Estimation Technic --- Indirect Estimation Technique --- Multiple Classification Analyses --- Statistical Studies --- Studies, Correlation --- Studies, Statistical --- Study, Correlation --- Study, Statistical --- Technic, Estimation --- Technic, Indirect Estimation --- Technics, Estimation --- Technics, Indirect Estimation --- Technique, Estimation --- Technique, Indirect Estimation --- Techniques, Estimation --- Techniques, Indirect Estimation --- Information Sciences --- Science, Information --- Sciences, Information --- National Security --- Measure, Security --- Measures, Security --- Security Measure --- Security, National --- Automated Pattern Recognition --- Pattern Recognition System --- Pattern Recognition Systems --- Computer Network Management --- Databases, Distributed --- Distributed Systems --- Extranets --- Intranets --- Network Communication Protocols --- Telecommunication Networks --- Communication Network, Computer --- Communication Networks, Computer --- Communication Protocol, Network --- Communication Protocols, Network --- Computer Communication Network --- Database, Distributed --- Distributed Database --- Distributed Databases --- Distributed System --- Extranet --- Intranet --- Management, Computer Network --- Network Communication Protocol --- Network Management, Computer --- Network, Computer Communication --- Network, Telecommunication --- Networks, Computer Communication --- Networks, Telecommunication --- Protocol, Network Communication --- Protocols, Network Communication --- System, Distributed --- Systems, Distributed --- Telecommunication Network --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Cybersecurity --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- organization & administration --- methods --- Computer science. --- Image processing. --- Pattern recognition. --- Application software. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Pattern Recognition. --- Computer Applications. --- Computers and Society. --- Image Processing and Computer Vision. --- Management of Computing and Information Systems. --- Computer Appl. in Administrative Data Processing. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Informatics --- Science --- Communication systems --- Optical pattern recognition. --- Computer vision. --- Information Systems. --- Information systems. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Pattern perception --- Perceptrons --- Visual discrimination --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Computers --- Optical equipment

Listing 1 - 7 of 7
Sort by