Found 980 presentations matching your search
Matt Gershoff's presentation from the Columbus Data & Analytics Wednesday meetup on 21-Aug-2...
Research Ethics and Human Subjects 6.1 Ethical principles concerning human subjects: informed conse...
This presentation by Yury Chemerkin at HackMiami 2014 covers various aspects of mobile security and ...
1. Cloud & DevOps Empower your business with secure, automated, and scalable cloud infrastructur...
The convergence of engineering and healthcare has significantly advanced diagnostic and therapeutic ...
6th International Conference on Software Engineering and Managing Information Technology (SEMIT 2025...
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/09/federa...
Informatics is rapidly developing field. The study of informatics involves human-computer interactio...
Mobile Security Framework - MobSF is a free and open source automated mobile application security te...
Smart textiles, also known as electronic textiles (e-textiles), are transforming the landscape of he...
Cyber Frontline - Level 2 - Module 3.pptx
"The cree.py" side of geolocation slides for the presentation in OWASP AppSec Research 201...
Its all about The passwords that are used to secure our phone or laptop etc.... many biometrics we s...
ICT_ITM5_09_0811_Establish_and_Conduct_Business_Relationship.pptx
Dive into the essential tools and methods used in cybersecurity reconnaissance with this insightful ...
This presentation discusses the pros and cons of applying AI to Engineering Applications
In this presentation, we focus on the privacy risks of large language models (LLMs), with respect to...