Treffer 21 - 40 von 793

21

Enhancing IoT scalability and security through SDN
Diyar HAMAD ; Khirota YALDA ; Nicolae TAPUS ; et al.
Revista Română de Informatică și Automatică, Vol 34, Iss 2, Pp 113-126 (2024)

sdn iot floodlight metrics security scalability
Fachzeitschrift
Zu den Favoriten
22

Building a Home Automation and Security System with Python.
Steiter, Fred
Linux Journal. Feb2006, Issue 142, p56-60. 5p. 3 Color Photographs, 4 Diagrams.

SECURITY systems PROGRAMMING languages COMPUTER operating syste... COMPUTER systems COMPUTER software HOME automation
Zeitschrift
Zu den Favoriten
23

PyTrim: A Practical Tool for Reducing Python Dependency Bloat
Karakatsanis, Konstantinos ; Alexopoulos, Georgios ; Karyotakis, Ioannis ; et al.

Software Engineering
Report
Zu den Favoriten
24

Hands-On Enterprise Automation with Python.
Aly, Bassem ; Aly, Bassem ; Aly, Bassem ; et al.

E-Ressource
Zu den Favoriten
25

Bringing the ATLAS HammerCloud setup to the next level with containerization.
Rottler, Benjamin ; Böhler, Michael ; Duckeck, Günter ; et al.
EPJ Web of Conferences; 5/6/2024, Vol. 295, p1-8, 8p

CLOUD computing DISTRIBUTED computing WORKFLOW AUTOMATION PYTHON programming langu...
Konferenz
Zu den Favoriten
26

Network Traffic Tracer: Analyzing and Monitoring Network Traffic Using Python and Wireshark
Dr. Suma
INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT. :1-9

Fachzeitschrift
Zu den Favoriten
27

Python-driven security automation pipeline for enterprise financial reporting
null Preeta Pillai
World Journal of Advanced Engineering Technology and Sciences. 15:2233-2239

Fachzeitschrift
Zu den Favoriten
28

A novel (n, n) multi-secret image sharing scheme harnessing RNA cryptography and 1-D group cellular automata.
Abdul, Yasmin ; Ramasamy, Venkatesan ; Kukaram, Gaverchand
Indonesian Journal of Electrical Engineering & Computer Science; Jul2025, Vol. 39 Issue 1, p700-709, 10p

IMAGE encryption CELLULAR automata RNA CELL imaging DIFFERENTIAL entropy
Fachzeitschrift
Zu den Favoriten
30

Unleashing the Giants: Enabling Advanced Testing for Infrastructure as Code.
Sokolowski, Daniel ; Spielmann, David ; Salvaneschi, Guido
ICSE: International Conference on Software Engineering; 2024, p300-301, 2p

PYTHON programming langu... AUTOMATION COMPUTER security vulner... QUALITY assurance CONFIGURATION management
Konferenz
Zu den Favoriten
32

Optimizing resource allocation for secure SDN-based virtual network migration
Charmet, Fabien ; Blanc, Gregory ; Kiennert, Christophe ; et al.
NCA 2019: 18th International Symposium on Network Computing and Applications. :1-10

Cambridge, MA, United St... Markov decision process Resource allocation Security Optimization SDN
Konferenz
Zu den Favoriten
33

Navigating the complex terrain of security challenges and crafting robust solutions in Mec-enabled IOT ecosystems for future societies.
Krishnamoorthy, Suguna ; Ramesh, Lekhavani ; Subbarayalu, Ramalakshmi ; et al.
Peer-to-Peer Networking & Applications; Nov2025, Vol. 18 Issue 6, p1-19, 19p

Fachzeitschrift
Zu den Favoriten
34

Implementation of VANET Security using SHA3-256 for Blockchain with Digital Signature in Python.
Mezher, Liqaa Saadi ; Saleh, Muna Hadi
Journal of International Crisis & Risk Communication Research (JICRCR); 2024, Vol. 7 Issue 3, p383-399, 17p

BLOCKCHAINS CRYPTOGRAPHY DIGITAL signatures TRAVELER attitudes BITCOIN
Fachzeitschrift
Zu den Favoriten
35

End-to-End Analysis Automation over Distributed Resources with Luigi Analysis Workflows.
Rieger, Marcel
EPJ Web of Conferences; 5/6/2024, Vol. 295, p1-8, 8p

COMPUTER software VISUAL perception INFRASTRUCTURE (Economic... DATA security ARCHITECTURE
Konferenz
Zu den Favoriten
36

APPLICATION OF SMART CONTRACTS IN ELECTRONIC SYSTEMS BASED ON BLOCKCHAIN TECHNOLOGIES.
Jumagaliyeva, A. M. ; Tulegulov, A. D. ; Murzabekova, G. E. ; et al.
Vestnik KazUTB; 2024, Vol. 2 Issue 23, p156-168, 13p

KAZAKHSTAN SMART cities BLOCKCHAINS ELECTRONIC systems INFORMATION technology PYTHON programming langu...
Fachzeitschrift
Zu den Favoriten
37

Methodologies for Data Collection and Analysis of Dark Web Forum Content: A Systematic Literature Review.
de-Marcos, Luis ; Medina-Merodio, José-Amelio ; Stapic, Zlatko
Electronics (2079-9292); Nov2025, Vol. 14 Issue 21, p4191, 23p

MACHINE learning NATURAL language process... ACQUISITION of data SOCIAL network analysis INFORMATION technology INTERNET security
Fachzeitschrift
Zu den Favoriten
38

Design of a Voice Recognition System Using Artificial Neural Network.
Daniel, Mayowa O. ; Olajide, Ibukunoluwa A.
International Journal of Electrical & Computer Engineering Research (IJECER); 2024, Vol. 4 Issue 1, p1-7, 7p

AUTOMATIC speech recogni... ARTIFICIAL neural networ... PYTHON programming langu... COMPUTER network securit... WEB-based user interface... LIBRARY information netw...
Fachzeitschrift
Zu den Favoriten
39

HAL -- An Open-Source Framework for Gate-Level Netlist Analysis
Speith, Julian ; Langheinrich, Jörn ; Fyrbiak, Marc ; et al.

Cryptography and Securit...
Report
Zu den Favoriten
40

Ensemble Machine Learning Approach For Identifying Real-Time Threats In Security Operations Center.
Femi-Oyewole, Favour ; Osamor, Victor ; Okunbor, Daniel
IAENG International Journal of Computer Science. Dec2024, Vol. 51 Issue 12, p2094-2122. 29p.

Computer network traffic Cyberterrorism Web-based user interface... Data security failures Stacking machines
Fachzeitschrift
Zu den Favoriten

Filter