Treffer 21 - 40 von 793

21

Static Analysis for AWS Best Practices in Python Code
Mukherjee, Rajdeep ; Tripp, Omer ; Liblit, Ben ; et al.

Computer Science - Progr... Computer Science - Forma... Computer Science - Logic...
Report
Zu den Favoriten
22

Hands-On Enterprise Automation with Python.
Aly, Bassem ; Aly, Bassem ; Aly, Bassem ; et al.

E-Ressource
Zu den Favoriten
23

Enhancing IoT scalability and security through SDN
Diyar HAMAD ; Khirota YALDA ; Nicolae TAPUS ; et al.
Revista Română de Informatică și Automatică, Vol 34, Iss 2, Pp 113-126 (2024)

sdn iot floodlight metrics security scalability
Fachzeitschrift
Zu den Favoriten
24

A novel (n, n) multi-secret image sharing scheme harnessing RNA cryptography and 1-D group cellular automata.
Abdul, Yasmin ; Ramasamy, Venkatesan ; Kukaram, Gaverchand
Indonesian Journal of Electrical Engineering & Computer Science; Jul2025, Vol. 39 Issue 1, p700-709, 10p

IMAGE encryption CELLULAR automata RNA CELL imaging DIFFERENTIAL entropy
Fachzeitschrift
Zu den Favoriten
25

Building a Home Automation and Security System with Python.
Steiter, Fred
Linux Journal. Feb2006, Issue 142, p56-60. 5p. 3 Color Photographs, 4 Diagrams.

SECURITY systems PROGRAMMING languages COMPUTER operating syste... COMPUTER systems COMPUTER software HOME automation
Zeitschrift
Zu den Favoriten
26

Bringing the ATLAS HammerCloud setup to the next level with containerization.
Rottler, Benjamin ; Böhler, Michael ; Duckeck, Günter ; et al.
EPJ Web of Conferences; 5/6/2024, Vol. 295, p1-8, 8p

CLOUD computing DISTRIBUTED computing WORKFLOW AUTOMATION PYTHON programming langu...
Konferenz
Zu den Favoriten
27

Network Traffic Tracer: Analyzing and Monitoring Network Traffic Using Python and Wireshark
Dr. Suma
INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT. :1-9

Fachzeitschrift
Zu den Favoriten
28

Implementation of VANET Security using SHA3-256 for Blockchain with Digital Signature in Python.
Mezher, Liqaa Saadi ; Saleh, Muna Hadi
Journal of International Crisis & Risk Communication Research (JICRCR); 2024, Vol. 7 Issue 3, p383-399, 17p

BLOCKCHAINS CRYPTOGRAPHY DIGITAL signatures TRAVELER attitudes BITCOIN
Fachzeitschrift
Zu den Favoriten
29

Python-driven security automation pipeline for enterprise financial reporting
null Preeta Pillai
World Journal of Advanced Engineering Technology and Sciences. 15:2233-2239

Fachzeitschrift
Zu den Favoriten
31

Unleashing the Giants: Enabling Advanced Testing for Infrastructure as Code.
Sokolowski, Daniel ; Spielmann, David ; Salvaneschi, Guido
ICSE: International Conference on Software Engineering; 2024, p300-301, 2p

PYTHON programming langu... AUTOMATION COMPUTER security vulner... QUALITY assurance CONFIGURATION management
Konferenz
Zu den Favoriten
33

Optimizing resource allocation for secure SDN-based virtual network migration
Charmet, Fabien ; Blanc, Gregory ; Kiennert, Christophe ; et al.
NCA 2019: 18th International Symposium on Network Computing and Applications. :1-10

Cambridge, MA, United St... Markov decision process Resource allocation Security Optimization SDN
Konferenz
Zu den Favoriten
34

Navigating the complex terrain of security challenges and crafting robust solutions in Mec-enabled IOT ecosystems for future societies.
Krishnamoorthy, Suguna ; Ramesh, Lekhavani ; Subbarayalu, Ramalakshmi ; et al.
Peer-to-Peer Networking & Applications; Nov2025, Vol. 18 Issue 6, p1-19, 19p

Fachzeitschrift
Zu den Favoriten
35

APPLICATION OF SMART CONTRACTS IN ELECTRONIC SYSTEMS BASED ON BLOCKCHAIN TECHNOLOGIES.
Jumagaliyeva, A. M. ; Tulegulov, A. D. ; Murzabekova, G. E. ; et al.
Vestnik KazUTB; 2024, Vol. 2 Issue 23, p156-168, 13p

KAZAKHSTAN SMART cities BLOCKCHAINS ELECTRONIC systems INFORMATION technology PYTHON programming langu...
Fachzeitschrift
Zu den Favoriten
36

Intelligent IoT forensics: Secure evidence acquisition and autonomous intrusion detection.
Abdulaziz, Alanazi
International Journal of Innovative Research & Scientific Studies; 2025, Vol. 8 Issue 5, p1167-1181, 15p

MACHINE learning FORENSIC sciences DIGITAL forensics ANOMALY detection (Compu... DATA integrity
Fachzeitschrift
Zu den Favoriten
37

End-to-End Analysis Automation over Distributed Resources with Luigi Analysis Workflows.
Rieger, Marcel
EPJ Web of Conferences; 5/6/2024, Vol. 295, p1-8, 8p

COMPUTER software VISUAL perception INFRASTRUCTURE (Economic... DATA security ARCHITECTURE
Konferenz
Zu den Favoriten
38

Design of a Voice Recognition System Using Artificial Neural Network.
Daniel, Mayowa O. ; Olajide, Ibukunoluwa A.
International Journal of Electrical & Computer Engineering Research (IJECER); 2024, Vol. 4 Issue 1, p1-7, 7p

AUTOMATIC speech recogni... ARTIFICIAL neural networ... PYTHON programming langu... COMPUTER network securit... WEB-based user interface... LIBRARY information netw...
Fachzeitschrift
Zu den Favoriten
39

Methodologies for Data Collection and Analysis of Dark Web Forum Content: A Systematic Literature Review.
de-Marcos, Luis ; Medina-Merodio, José-Amelio ; Stapic, Zlatko
Electronics (2079-9292); Nov2025, Vol. 14 Issue 21, p4191, 23p

MACHINE learning NATURAL language process... ACQUISITION of data SOCIAL network analysis INFORMATION technology INTERNET security
Fachzeitschrift
Zu den Favoriten
40

HAL -- An Open-Source Framework for Gate-Level Netlist Analysis
Speith, Julian ; Langheinrich, Jörn ; Fyrbiak, Marc ; et al.

Cryptography and Securit...
Report
Zu den Favoriten

Filter