Data security

Results: 28926



#Item
551Statistics / Statistical classification / Data / Anomaly detection / Data mining / Data security / Machine learning / Support vector machine / Outlier / Decision boundary / Artificial neural network

Enhancing One-class Support Vector Machines for Unsupervised Anomaly Detection Mennatallah Amer1, Markus Goldstein2, Slim Abdennadher1 1 2

Add to Reading List

Source URL: www.outlier-analytics.org

Language: English - Date: 2013-08-13 15:59:38
552Computing / Computer security / Computer networking / Trusted computing / Computer network security / Cyberwarfare / Data security / Firewall / Trusted Execution Technology / Network address translation / Trusted Platform Module / Packet processing

ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

Add to Reading List

Source URL: colindixon.com

Language: English - Date: 2012-04-28 16:29:27
553Privacy / Information privacy / Data security / Data protection / European Data Protection Supervisor / Personally identifiable information / Computer security / Government / General Data Protection Regulation / Data Protection Act

PDF Document

Add to Reading List

Source URL: european-space-solutions.eu

Language: English - Date: 2016-05-24 12:00:15
554Security / Prevention / Safety / Data security / Crime prevention / Cryptography / Information governance / National security / Information security / Vulnerability / Computer security

lead security analyst reporting to – head of information security direct reports – IT security analyst working hours – full time is 35 hours a week. You’ll agree your working pattern with your manager. the purpo

Add to Reading List

Source URL: www.financialombudsman.org.uk

Language: English - Date: 2016-02-24 11:29:57
555Information privacy / Computing / Law / Privacy / Computer security / Internet privacy / HTTP cookie / Personally identifiable information / Personal Information Protection and Electronic Documents Act / Medical privacy / Data Protection Act / Data protection (privacy) laws in Russia

INFORMATION SHEET ACCORDING TO ARTICLE 13 OF THE LEGISLATIVE DECREEPersonal Information Protection Act) WHO PROCESSES THE INFORMATION (“HOLDER”) The personal information that can be processed is the person

Add to Reading List

Source URL: dynamicloset.com

Language: English - Date: 2015-09-29 03:26:21
556Security / Prevention / Safety / National security / Crime prevention / Cryptography / Information governance / Data security / Information security / Systems engineering / Computer security

Master of Science Program in Information Technology Degree RequirementsIT 5413 Software Design and Development IT 5443 Web

Add to Reading List

Source URL: ccse.kennesaw.edu

Language: English - Date: 2015-08-15 14:09:11
557Computing / Privacy / Internet privacy / World Wide Web / Data security / HTTP cookie / Google Analytics / Information privacy / Personally identifiable information / P3P / Privacy concerns regarding Google

Abertay Housing Association Privacy Policy 1. Background to Privacy Policy This Privacy Policy (the “Policy”) applies between you, the user of this website (the “Site”), and Abertay Housing Association, the owner

Add to Reading List

Source URL: www.abertayha.co.uk

Language: English - Date: 2014-10-22 03:57:17
558Security / Computing / Crime prevention / Cryptography / Information governance / National security / Database / Computer security / Data mining / Clinical decision support system

Indexing Overview Chrysalis Data Solutions and Services Inc. (CDSS) provide high-quality data extraction and indexing to support contract management.

Add to Reading List

Source URL: www.chrysalisdss.com

Language: English - Date: 2016-06-11 05:26:30
559Contract law / Computing / Data management / Data security / Personal /  Inc. / Terms of service / Email / Information technology / Internet / Social networking services

Terms and Conditions for Rendity GmbH Rendity GmbH, headquartered in Vienna (hereinafter also known as “Rendity”), operates a crowd-investing platform for real estate projects under the domain “rendity.com” (here

Add to Reading List

Source URL: rendity.com

Language: English - Date: 2015-10-10 10:12:41
560Computing / Cloud computing / Computer security / Cloud infrastructure / Cloud storage / Data security / Cloud computing security / Information security / Cloud Security Alliance / Data center / Cloud computing issues / Crypto cloud computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-17 07:58:59
UPDATE