Search Result "password theft or"
Cyber Fraud Use Cases in the Metaverse
Ebook: Beyond the Realms: Navigating the Metaverse
Volume: 1 Year: 2024
Author(s):
Doi: 10.2174/9789815238457124010007
Control Flow
Ebook: Basics of Python Programming: A Quick Guide for Beginners
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815179637123010005
Cyber Cruelty: Understanding and Preventing the New Bullying
Journal: Adolescent Psychiatry
Volume: 1 Issue: 1 Year: 2011 Page: 67-71
Author(s): Ruth Gerson, Nancy Rappaport
Smart Wireless Sensor Network to Detect and Protect Sheep and Goats to Wolf Attacks
Journal: Recent Advances in Communications and Networking Technology (Discontinued)
Volume: 2 Issue: 2 Year: 2013 Page: 91-101
Author(s): Sandra Sendra,Ferran Llario,Lorena Parra,Jaime Lloret
Securing the Infinite: Traversing Cybersecurity Challenges in the Metaverse
Ebook: Beyond the Realms: Navigating the Metaverse
Volume: 1 Year: 2024
Author(s):
Doi: 10.2174/9789815238457124010008
The Analytical Algorithmic Pathway
Ebook: Dominant Algorithms to Evaluate Artificial Intelligence: From the view of Throughput Model
Volume: 1 Year: 2022
Author(s):
Doi: 10.2174/9789815049541122010008
Progress and Review of 3D Biological Characteristics Image Recognition
Journal: Recent Patents on Computer Science
Volume: 10 Issue: 1 Year: 2017 Page: 34-42
Author(s): Jinhua Zhang,Wengang Zhou
IoT-Based Medical Ecosystem
Ebook: Emerging Technologies for Digital Infrastructure Development
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815080957123010015
Networked Embedded System Security: Technologies, Analysis and Implementation
Journal: Recent Advances in Communications and Networking Technology (Discontinued)
Volume: 5 Issue: 2 Year: 2016 Page: 90-107
Author(s): Veeresh Eshwarappa Dandur,Ning Weng
The Global Perspective Algorithmic Pathway
Ebook: Dominant Algorithms to Evaluate Artificial Intelligence: From the view of Throughput Model
Volume: 1 Year: 2022
Author(s):
Doi: 10.2174/9789815049541122010011