-
81Por Useche-Peláez, David Esteban; Díaz-López, Daniel Orlando; Sepúlveda-Alzate, Daniela; Cabuya-Padilla, Diego EdisonPublished in 2018Repositorio Universidad Santo Tomás“... about the use of sandboxing and machine learning by security teams in State security agencies are also...”
Get full text
Get full text
-
82Published in 2011Repositorio Repositorio Digital - Universidad CES“...SECURE Consultores es una empresa del campo de la consultora en Seguridad Informática en el medio...”
Get full text
-
83Article of investigationPor Useche-Peláez, David Esteban; Díaz-López, Daniel Orlando; Sepúlveda-Alzate, Daniela; Cabuya-Padilla, Diego EdisonPublished in 2018Repositorio Repositorio Institucional ECIGet full text
Get full text
-
84Por Alvarado, Nathalie; Norza, Ervyn; Perez-Vincent, Santiago M.; Tobón Zapata, Santiago; Vanegas-Arias, MartínPublished in 2021Repositorio Repositorio EAFIT“... and tools to inform citizen security and criminal justice policies....”
Get full text
-
85BookPublished in 2015Repositorio Expeditio: repositorio UTadeo“...In security science, efficient operation depends typically on the interaction between technology...”
Get full text
Get full text
-
86BookPublished in 2020Repositorio Expeditio: repositorio UTadeo“...The Scarcity Slot is the first book to critically examine food security in Africa’s deep past...”
Get full text
Get full text
-
87BookPublished in 2014Repositorio Expeditio: repositorio UTadeo“...For cloud users and providers alike, security is an everyday concern, yet there are very few books...”
Get full text
Get full text
Get full text
-
88Trabajo de grado de pregradoPublished in 2025Repositorio Séneca: repositorio UniandesSubjects: “...Security...”
Get full text
-
89
-
90Por Butte, GiacomoPublished in 2022Repositorio Repositorio Institucional UTBSubjects: “...Water security...”
Get full text
-
91
-
92Published in 2019Repositorio Repositorio EdocUR - U. RosarioSubjects: “...Private military and security companies...”
Get full text
Get full text
-
93Article of journalPublished in 2018Repositorio RED: Repositorio Educativo Digital UAOSubjects: “...Power system security...”
Get full text
Get full text
-
94http://purl.org/coar/resource_type/c_816bPor Nuñez Alvarez, José R.; Zamora Pérez, Yelena; Benitez Pina, Israel Francisco; NORIEGA ANGARITA, ELIANA MARIAPublished in 2020Repositorio REDICUC - Repositorio CUC“... for our application, since it allows efficient exchange of data guaranteeing security and avoiding...”
Get full text
Get full text
-
95Article of investigationPor Zhuravel, Valentyna I.; Epel, Oksana; Yehorova-Lutsenko, Tetyana P.; Didychenko, Maryna A.; Dyachenko, Olha APublished in 2022Repositorio REDICUC - Repositorio CUCSubjects: “...Security system...”
Get full text
Get full text
-
96Article of journalPor Villasmil Molero, Milagros; Romero, Francisco Javier; Chivetta, Luz Elena Dovales; Palacios, AlexisPublished in 2018Repositorio REDICUC - Repositorio CUCSubjects: “...Social security...”
Get full text
Get full text
-
97Article of investigationPor Gómez, Johan; Cadavid, Andrés Navarro; Navarro Cadavid, Andrés; Londoño, Sebastián; Urcuqui, Christian Camilo; Fuentes Amaya, ManuelPublished in 2015Repositorio Repositorio ICESI“... by cybercriminals. To solve the problems caused by malware, Android implements a different architecture and security...”
Get full text
Get full text
-
98Article of investigationPublished in 2017Repositorio Repositorio ICESIGet full text
Get full text
-
99Article of investigationPublished in 2011Repositorio RiUPTC: Repositorio Institucional UPTC“... and security measures works in our country because the law governing is given serious contradictions...”
Get full text
Get full text
-
100Article of investigationPublished in 2022Repositorio RiUPTC: Repositorio Institucional UPTCSubjects: “...Security alimentary...”
Get full text
Get full text
