Research on cloud computing security problem and strategy Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about Research on cloud computing security problem and strategy
Security Entities Building Block Architecture Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about Security Entities Building Block Architecture
Developing a Cloud Computing Security Strategy Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about Developing a Cloud Computing Security Strategy
Intelligent Data Analysis and Applications Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about Intelligent Data Analysis and Applications
New Zealand's Cyber Security Strategy 2019 Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about New Zealand's Cyber Security Strategy 2019
Binder, a logic-based security language Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about Binder, a logic-based security language
LISFLOOD - Distributed Water Balance and Flood Simulation Model - Revised User Manual 2013 Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about LISFLOOD - Distributed Water Balance and Flood Simulation Model - Revised User Manual 2013
Context-Aware Access Control in Ubiquitous Computing (CRAAC) Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about Context-Aware Access Control in Ubiquitous Computing (CRAAC)
A Survey of Artificial Immune System Based Intrusion Detection Submitted by rest1 on Wed, 12/17/2025 - 11:24 Read more about A Survey of Artificial Immune System Based Intrusion Detection