搜索资源列表
Protectingdatafrommalicioussoftware
- 关于恶意代码分析保护的专业英文文章,介绍了恶意代码的行为和保护措施-malicious code analysis on the protection of the professional article in English, introduced the malicious code of conduct and protection measures
Stateoftheartinprivacypreservingdatamining
- 基于隐私保护的数据挖掘是数据库技术重要的一部分,本文是对其发展的概述。-Privacy protection based on data mining is an important part of database technology, this article is an overview of their development.
beihangnetworksecurity
- 北航研究生网络安全防护讲义,内容丰富,参考了国外的大量资料-Beihang University graduate network security protection notes, rich in content, with reference to the wealth of information overseas
RoutingSecurity
- propose a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the r
review_of_eu_dp_directive
- Review of the European Data Protection Directive OBJECTIVE: In April 2008, the Information Commissioner’s Office (ICO) commissioned a review of the 1995 EU Data Protection Directive (95/46/EC, hereafter “the Directive”). In the 13 years since
3Dyx
- 转载,保护著作权人版权。关于3D游戏开发的chm文档-Reproduced, the copyright protection of the copyright owner. 3D game development on the chm documentation
TPS-Thermal
- Thermal protection system design
open-tolerant(Open-DR)
- 当下最流行的美国飞康持续数据保护文档PPT,可以对客户进行详解或者演讲。-The currently most popular FalconStor continuous data protection document PPT, customers can Detailed or speaking.
mining-anomalies-s
- 一个基于熵的大流量攻击检测论文,对于研究网络防护有重要意义-A large flow of entropy-based attack detection papers, research network protection for significant
RZA
- Bool about digital Relay protection on russian lenguage
cours
- des cours sur la protection
A-Copyright-Protection-using-Watermarking-Algorit
- Research Paper on Digital Watermarking
I07_97_P-518
- The main frequency is an important parameter of an electrical power system. The frequency can change over a small range due to generation-load mismatches. Some power system protection and control applications The paper presents a new method
industrial206
- • Pre Driver vs. Driver • H-bridge Theory • Protection Circuits / Control Interfaces • Intro to the DRV8x Motor Driver Family • Were to find additional Information
Copyright-Protection-of-Digital-Image
- Power point presentation on copyright protection of images.
Survey-of-Privacy-Protection-for-Medical-Data
- Powerpoint presentation on a survey done for protection of medical images.
Protection-technology-and-trends-for-the-issue.zi
- Protection technology and trends for the issue of smartphone banking application integrity and verification.pdf
Study-of-centralized-protection
- 最新电力设备研究,基于数字化变电站的集中式保护研究-Study of centralized protection based on digital substation
wind-farm-protection
- 本文主要对当前风电场保护方面做了详细的总结,介绍了风电场保护当前的研究概况,希望对大家有所帮助。-This paper focuses on the protection of the current wind farm to do a detailed summary describes the wind farms to protect overview of current research, we hope to help.
Cathodic-Protection
- Cathodic Protection Cathodic Protection-Cathodic Protection Cathodic Protection Cathodic Protection