熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 8 筆, 頁數 1 / 1
呈現:
Honeypots and Routers: Collecting Internet Attacks
An effective approach to securing information on the Internet is to analyze the signature of attacks... more |
|||
Honeypots and Routers: Collecting Internet Attacks
As the number of Internet-based consumer transactions continues to rise, the need to protect these t... more |
|||
Federated Learning Systems: Towards Privacy-Preserving Distributed AI
|
|||
Federated Learning Systems: Towards Next-Generation AI
Federated Learning Research: Trends and Bibliometric Analysis.- A Review of Privacy-preserving Feder... more |
|||
Federated Learning Systems: Towards Next-Generation AI
Federated Learning Research: Trends and Bibliometric Analysis.- A Review of Privacy-preserving Feder... more |
|||
Characterization of Pakistani groundnut seeds through GC-MS
|
|||
Trust Models for Next-Generation Blockchain Ecosystems
This book discusses the trust models for next-generation Blockchain ecosystems. The book provides a ... more |
|||
Trust Models for Next-Generation Blockchain Ecosystems
This book discusses the trust models for next-generation Blockchain ecosystems. The book provides a ... more |