When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. IEEE Xplore - Wikipedia

    en.wikipedia.org/wiki/IEEE_Xplore

    IEEE Xplore (stylized as IEEE Xplore) digital library is a research database for discovery and access to journal articles, conference proceedings, technical standards, and related materials on computer science, electrical engineering and electronics, and allied fields.

  3. List of IEEE publications - Wikipedia

    en.wikipedia.org/wiki/List_of_IEEE_publications

    The publications of the Institute of Electrical and Electronics Engineers (IEEE) constitute around 30% of the world literature in the electrical and electronics engineering and computer science fields, [citation needed] publishing well over 100 peer-reviewed journals. [1]

  4. IEEE Security & Privacy - Wikipedia

    en.wikipedia.org/wiki/IEEE_Security_&_Privacy

    Main page; Contents; Current events; Random article; About Wikipedia; Contact us; Help; Learn to edit; Community portal; Recent changes; Upload file

  5. IEEE Transactions on Software Engineering - Wikipedia

    en.wikipedia.org/wiki/IEEE_Transactions_on...

    The IEEE Transactions on Software Engineering is a monthly peer-reviewed scientific journal published by the IEEE Computer Society. It was established in 1975 and covers the area of software engineering. It is considered the leading journal in this field. [1]

  6. Computer security - Wikipedia

    en.wikipedia.org/wiki/Computer_security

    An example of a physical security measure: a metal lock on the back of a personal computer to prevent hardware tampering. Computer security (also cybersecurity, digital security, or information technology (IT) security) is the protection of computer software, systems and networks from threats that can lead to unauthorized information disclosure, theft or damage to hardware, software, or data ...

  7. Data security - Wikipedia

    en.wikipedia.org/wiki/Data_security

    Data masking of structured data is the process of obscuring (masking) specific data within a database table or cell to ensure that data security is maintained and sensitive information is not exposed to unauthorized personnel. [7]

  8. Cryptographic hash function - Wikipedia

    en.wikipedia.org/wiki/Cryptographic_hash_function

    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of bits) that has special properties desirable for a cryptographic application: [1]

  9. Machine learning - Wikipedia

    en.wikipedia.org/wiki/Machine_learning

    Machine learning and data mining often employ the same methods and overlap significantly, but while machine learning focuses on prediction, based on known properties learned from the training data, data mining focuses on the discovery of (previously) unknown properties in the data (this is the analysis step of knowledge discovery in databases).