Results Per Page:

Now showing items 1-100 of 110

Κρυπτογραφία (6)
Cryptography (5)
General Data Protection Regulation (GDPR) (5)
Personal data -- Privacy (5)
Web security (5)
Ασφάλεια διαδικτύου (5)
Ασφάλεια πληροφοριακών συστημάτων (5)
Γενικός Κανονισμός Προστασίας Δεδομένων (GDPR) (5)
Προσωπικά δεδομένα -- Ιδιωτικότητα (5)
Cryptographic algorithms (4)
Cyber ranges (4)
Information systems security (4)
Κρυπτογραφικοί αλγόριθμοι (4)
Artificial intelligence -- Internal threats (3)
Cybersecurity (3)
Privacy (3)
Διαδίκτυο των Αντικειμένων (3)
Ιδιωτικότητα (3)
Κυβερνοασφάλεια (3)
Τεχνητή νοημοσύνη -- Εσωτερικές απειλές (3)
Android (2)
Blockchain (2)
Bootable Linux Distribution (2)
Business information systems (2)
Cyber-security -- Economics (2)
Internet of Things (2)
Network security (2)
Online banking -- Authentication systems (2)
Online banking -- Συστήματα ελέγχου ταυτότητας (2)
Penetration Testing (2)
Red Teaming (2)
SDN architecture (2)
Software Defined Networks (2)
Software Defined Networks -- Security (2)
Web security -- FinTech (2)
Ασφάλεια διαδικτύου -- FinTech (2)
Κυβερνοασφάλεια -- Οικονομικά (2)
Ad blocking (1)
Advanced strategies for development (1)
Analyze malicious software (1)
Authenticated Stream Ciphers (1)
Automatic Risk Assessment Tool (1)
Bitcoin (1)
BlockChain Platform evaluation (1)
Blockchain Technology (1)
BlockChain Technology -- Smart contracts (1)
Cellular devices (1)
Cellular networks (1)
Cloud computing (1)
Cloud forensics challenges -- CADF (1)
Computer forensics (1)
Cookies (1)
Covid-19 -- Track the contacts -- Applications (1)
Covid-19 -- Ιχνηλάτιση επαφών -- Εφαρμογές (1)
Cryptocurrencies (1)
Cryptographic algorithms -- De Bruijn (1)
Cyber Ranges (1)
Cyber ranges federations (1)
Cyber risk assessment box (1)
Cyber threats (1)
Cybersecurity preparedness (1)
Cybersecurity preparedness -- Cyprus (1)
Cybersecurity preparedness -- Small and Medium businesses (1)
Dark Web (1)
Data mining (1)
Decentralized machine learning (1)
Digital commerce (1)
Digital forensics (1)
Distance education (1)
Distributed Ledger Technology (1)
Dynamic analysis (1)
e-health -- Personal data (1)
e-privacy οδηγία (1)
Electronic fingerprints (1)
Electronic phishing -- Detect methods (1)
Encryption (1)
End-to-End Encryption (1)
Environmental analysis (1)
Exchange of Security Information (1)
Federated Learning (1)
Footpriting (1)
General Data Protection Regulation (GDPR) -- Cookies (1)
Ground Positioning System (1)
Hoax Emails (1)
Honeypots enviroments (1)
Information security (1)
Information security --Insider threat (1)
Information systems -- Insider threats (1)
Internal of Things -- Botnets (1)
Internet Of Things (1)
Internet of Things (IoT) (1)
Keystroke dynamics (1)
Linear complexity (1)
Location Based Services (1)
Malware (1)
Microsoft Azure Machine Learning Studio (1)
Mobile Agents (1)
Network intrusion prevention system (1)
Network protocols (1)
Network Traffic Datasets (1)