When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. IEEE Xplore - Wikipedia

    en.wikipedia.org/wiki/IEEE_Xplore

    IEEE Xplore (stylized as IEEE Xplore) digital library is a research database for discovery and access to journal articles, conference proceedings, technical standards, and related materials on computer science, electrical engineering and electronics, and allied fields.

  3. List of IEEE publications - Wikipedia

    en.wikipedia.org/wiki/List_of_IEEE_publications

    The publications of the Institute of Electrical and Electronics Engineers (IEEE) constitute around 30% of the world literature in the electrical and electronics engineering and computer science fields, [citation needed] publishing well over 100 peer-reviewed journals. [1]

  4. IEEE Transactions on Information Forensics and Security

    en.wikipedia.org/wiki/IEEE_Transactions_on...

    The IEEE Transactions on Information Forensics and Security is a scientific journal published by the IEEE Signal Processing Society (IEEE SPS). [1] The journal is co-sponsored by several of the subject societies that make up the IEEE: IEEE Communications Society, IEEE Computational Intelligence Society, IEEE Computer Society, IEEE Engineering in Medicine and Biology Society, and the IEEE ...

  5. IEEE Security & Privacy - Wikipedia

    en.wikipedia.org/wiki/IEEE_Security_&_Privacy

    Main page; Contents; Current events; Random article; About Wikipedia; Contact us; Help; Learn to edit; Community portal; Recent changes; Upload file

  6. IEEE Transactions on Software Engineering - Wikipedia

    en.wikipedia.org/wiki/IEEE_Transactions_on...

    The IEEE Transactions on Software Engineering is a monthly peer-reviewed scientific journal published by the IEEE Computer Society. It was established in 1975 and covers the area of software engineering. It is considered the leading journal in this field. [1]

  7. Computer security - Wikipedia

    en.wikipedia.org/wiki/Computer_security

    An example of a physical security measure: a metal lock on the back of a personal computer to prevent hardware tampering. Computer security (also cybersecurity, digital security, or information technology (IT) security) is the protection of computer software, systems and networks from threats that can lead to unauthorized information disclosure, theft or damage to hardware, software, or data ...

  8. Data security - Wikipedia

    en.wikipedia.org/wiki/Data_security

    Data masking of structured data is the process of obscuring (masking) specific data within a database table or cell to ensure that data security is maintained and sensitive information is not exposed to unauthorized personnel. [7]

  9. Applications of artificial intelligence - Wikipedia

    en.wikipedia.org/wiki/Applications_of_artificial...

    Cyber security companies are adopting neural networks, machine learning, and natural language processing to improve their systems. [51] Applications of AI in cyber security include: Network protection: Machine learning improves intrusion detection systems by broadening the search beyond previously identified threats. [52]