Search alternatives:
"algorithmics" » "algorithmus", "algorithmes", "algorithmische", "algorithms"
"algorithmic" » "algorithm"

2
by Egbert, Simon
Published 2021
Taylor & Francis
Subjects: ...Algorithmic Policing...

3
by Sonowal, Gunikhan
Published 2022
Apress
Table of Contents: ...: Phishing Detection Based on Technology -- Appendix A: Machine Learning Algorithms -- Appendix B: Deep...

4
by Kuldova, Tereza Østbø
Published 2022
Palgrave Macmillan
Table of Contents: ... of Dissent. 6. Compliance-Industrial Complex and its Experts -- 7. Artificial Intelligence, Algorithms...

5
Published 2022
Springer International Publishing
Table of Contents: ... indices -- 16. Problem solving and SARA -- 17. Analysing descriptive results -- 18. Algorithms -- 19...

6
by Narayan, Shivangi
Published 2023
Palgrave Macmillan
... and algorithmic tools for crime mapping.The book draws on an ethnographic study of Delhi Police's hotspot mapping...

7 Table of Contents: ... Technique; 2.4.2 -- Generic Algorithm-Based Anti-Phishing Technique; 2.4.3 -- An Identity-Based Anti...

8
Published 2021
Springer International Publishing
Table of Contents: ... Comments Using Ensemble Deep Learning Algorithms -- 3. Deep Learning Techniques for Behavioural Malware...

9
by Follis, Luca, Fish, Adam
Published 2020
The MIT Press
... of fake news and algorithmic opacity, they describe the political impact of leaks and hacks, partnerships...

10 Table of Contents: .... Physical Drives -- Hashing Algorithms: SHA-256 As Digital Fingerprints -- Best Practices for Admissibility...

11
Published 2021
Routledge
Table of Contents: ... -- Algorithms of oppression? AU's cybersecurity policy and its enforcement in Africa...

12
by Windley, Phillip J.
Published 2005
O'Reilly
Table of Contents: ... cryptography; 6.3.1.3. Hybrid key systems; 6.3.1.4. Public key cryptosystem algorithms...

13 ... intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms...

14
by Parasram, Shiva V. N.
Published 2017
Packt Publishing
Table of Contents: ... -- Message Digest (MD5) hash -- Secure Hashing Algorithm (SHA) -- Device and data acquisition guidelines...