Sfoglia per Rivista ACM COMPUTING SURVEYS
Authentication, access control, and audit
1996 R. Sandhu, P. Samarati
Biometric recognition in automated border control : a survey
2016 R. Donida Labati, A. Genovese, E. Muñoz Ballester, V. Piuri, F. Scotti, G. Sforza
From security to assurance in the cloud: a survey
2015 C.A. Ardagna, R. Asal, E. Damiani, Q.H. Vu
A Manifesto for Future Generation Cloud Computing
2019 R. Buyya, S. Narayana Srirama, G. Casale, R. Calheiros, Y. Simmhan, B. Varghese, E. Gelenbe, B. Javadi, L. Miguel Vaquero, M.A.S. Netto, A. Nadjaran Toosi, M. Alejandra Rodriguez, I.M. Llorente, S. De Capitani di Vimercati, P. Samarati, D. Milojicic, C. Varela, R. Bahsoon, M. Dias De Assuncao, O. Rana, W. Zhou, H. Jin, W. Gentzsch, A.Y. Zomaya, H. Shen
The privacy implications of cyber security systems: A technological survey
2018 E. Toch, C. Bettini, E. Shmueli, L. Radaelli, A. Lanzi, D. Riboni, B. Lepri
A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis
2022 A. Rugo, C.A. Ardagna, N. El Ioini
Semantic trajectories modeling and analysis
2013 P. C., S. S., R. C., A. G., A. N., B. V., M.L. Damiani, G.D. A., M. J., P. N., T. Y., Y. Z.
A survey of unsupervised generative models for exploratory data analysis and representation learning
2021 M. Abukmeil, S. Ferrari, A. Genovese, V. Piuri, F. Scotti
XML data clustering : an overview
2011 A. Algergawy, M. Mesiti, R. Nayak, G. Saake
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile