EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: isPartOf:"Biometrics"
Narrow search

Narrow search

Year of publication
Subject
All
Neuroscience 10 Neurowissenschaften 9 Consumer behaviour 7 Konsumentenverhalten 7 Biometrics 4 Biometrie 4 neuroscience 4 Artificial intelligence 3 Data protection 3 Datenschutz 3 Decision 3 Entscheidung 3 Künstliche Intelligenz 3 Advertising effects 2 EEG 2 Ethics 2 Ethik 2 Neuromarketing 2 Virtual reality 2 Virtuelle Realität 2 Werbewirkung 2 artificial intelligence 2 business 2 decision-making 2 ethics 2 facial expression 2 virtual reality 2 1990-1991 1 Advertising 1 Arbeitsgruppe 1 Beziehungsmarketing 1 Bibliometrics 1 Bibliometrie 1 Biometric data 1 Business ethics 1 Business network 1 Communication 1 Consumer neuroscience 1 Data Mining 1 Data mining 1
more ... less ...
Online availability
All
Undetermined 2,718
Type of publication
All
Article 2,718 Book / Working Paper 1
Type of publication (narrower categories)
All
chapter 18 Aufsatz im Buch 16 Book section 16 Graue Literatur 1 Non-commercial literature 1
Language
All
Undetermined 2,684 English 35
Author
All
Ibrahim, Joseph G. 36 Dunson, David B. 33 Carroll, Raymond J. 25 Molenberghs, Geert 24 Davidian, Marie 23 Lin, Xihong 23 Albert, Paul S. 22 Tsiatis, Anastasios A. 22 Gilbert, Peter B. 17 Thall, Peter F. 17 Cai, Tianxi 15 Ghosh, Debashis 15 Betensky, Rebecca A. 14 Cai, Jianwen 14 Wang, You-Gan 14 Zhou, Xiao-Hua 14 Chatterjee, Nilanjan 13 Heagerty, Patrick J. 13 Ridout, M. S. 13 Li, Yi 12 Lin, D. Y. 12 Müller, Peter 12 Schaubel, Douglas E. 12 Shen, Yu 12 Shih, Joanna H. 12 Taylor, Jeremy M. G. 12 Verbeke, Geert 12 Zeng, Donglin 12 Agresti, Alan 11 Commenges, Daniel 11 Hudgens, Michael G. 11 Kosorok, Michael R. 11 Lipsitz, Stuart R. 11 Rosner, Gary L. 11 Yuan, Ying 11 Zheng, Yingye 11 Carlin, Bradley P. 10 Cook, Richard J. 10 Coull, Brent A. 10 Frangakis, Constantine E. 10
more ... less ...
Published in...
All
Biometrics 2,684 Cryptography, Biometrics, and Anonymity in Cybersecurity Management 18 Biometrics and neuroscience research in business and management : advances and applications 16 Research report 1
Source
All
RePEc 2,684 Other ZBW resources 18 ECONIS (ZBW) 17
Showing 1 - 10 of 2,719
Cover Image
Enhancing IoT Security RPL Attack Detection Using Sine Cosine Algorithm With XGBoost
Al-Na'amneh, Qais; Hazaymih, Rahaf; Al-Harasis, Tasnim; … - In: Cryptography, Biometrics, and Anonymity in …, (pp. 1-28). 2025
The most widely used routing protocol for Internet of Things (IoT) networks with limited resources is the (RPL). Network security is a significant issue because of the exponential growth of Internet of Things (IoT) devices and their growing ubiquity in safety-critical settings like healthcare...
Persistent link: https://www.econbiz.de/10015540466
Saved in:
Cover Image
Shedding Light on the Dark Web: A Novel Approach to Detect and Track URL Hopping
Anilkumar, K. G.; Mubarak, D. Muhammad Noorul - In: Cryptography, Biometrics, and Anonymity in …, (pp. 29-40). 2025
The Dark Web, a hidden corner of the internet, poses a significant challenge to Law Enforcement Agencies (LEAs) due to its anonymous nature and encrypted networks. While it provides a secure platform for legitimate users, it also enables illicit activities such as cybercrime, drug trade, and...
Persistent link: https://www.econbiz.de/10015540467
Saved in:
Cover Image
Open-Source Forensics Tools for Recovery of Deleted Data in Unconventional Ways
Al-Makkawi, Tuqa; Alsarhan, Ayoub; Al-Na'amneh, Qais; … - In: Cryptography, Biometrics, and Anonymity in …, (pp. 41-60). 2025
Nowadays, technology is propagation rapidly that it is virtually completely replacing the real world with a “virtual world.” Electronic forensics important as medical forensics to investigate electronic crime” which increases with time”, to prevent unwanted file recovery, many computer...
Persistent link: https://www.econbiz.de/10015540468
Saved in:
Cover Image
Impact of Decreased Rank Attack on Network Topology of RPL Using Contiki-NG
Al-Na'amneh, Qais; Dhifallah, Walid; Hazaymih, Rahaf; … - In: Cryptography, Biometrics, and Anonymity in …, (pp. 61-76). 2025
The Internet of Things (IoT) refers to the widespread use of smart objects connected to the internet. This innovative technology serves as the foundation for various intelligent gadgets, including smartphones, smart homes, and electric equipment. Furthermore, these devices are uniquely...
Persistent link: https://www.econbiz.de/10015540469
Saved in:
Cover Image
Face Recognition: Unveiling Identity Through Machine Learning
Yadav, Brijesh; Jain, Vishal - In: Cryptography, Biometrics, and Anonymity in …, (pp. 77-112). 2025
individual. It is part of biometrics, which includes fingerprint, eye scanning, palm print, voice, and signature recognition. It …
Persistent link: https://www.econbiz.de/10015540470
Saved in:
Cover Image
Protecting Data in the 5G Era: A Critical Review of Cryptographic Techniques for Mobile Cloud Computing
Al-Majali, Malak; Aljaidi, Mohammad; Al-Naamneh, Qais; … - In: Cryptography, Biometrics, and Anonymity in …, (pp. 113-126). 2025
The surge in smartphone users has fueled the development of mobile Cloud Computing (MCC), a technology integrating cloud computing's power with mobile device mobility. MCC offers on-demand access to cloud resources like storage, processing power, and software, enhancing mobile device...
Persistent link: https://www.econbiz.de/10015540471
Saved in:
Cover Image
A Case Study on Cyber Attack Detection Using Machine Learning: IDS for Detecting Cyber Attacks Using Machine Learning
Indra Priyadharshini, S.; Padmavathy, T. V.; Shiny Irene, D. - In: Cryptography, Biometrics, and Anonymity in …, (pp. 127-144). 2025
This chapter focusses on leveraging machine learning (ML) for cyber-attack prevention, addressing a range of threats and assaults. Machine learning is a crucial component of modern cybersecurity, offering a flexible approach to defend information systems against the constantly evolving tactics...
Persistent link: https://www.econbiz.de/10015540472
Saved in:
Cover Image
Advanced Encryption-Based Keylogger for System Security
Balasaraswathi, V. R.; Sudheer, Ashiq Noor; … - In: Cryptography, Biometrics, and Anonymity in …, (pp. 145-164). 2025
Our research presents a paradigm shift in network security, combining advanced technology to transcend conventional keyloggers. This software aims to revolutionize monitoring capabilities, specifically targeting keystrokes, while concurrently implementing text encryption mechanisms for log...
Persistent link: https://www.econbiz.de/10015540473
Saved in:
Cover Image
Survey and Analysis of RGB Image Encryption Using DNA Cryptography: Exploring Novel Approaches for Enhanced Security
Veeramani, Karthika; Gupta, Shalini; Dhar, Anuj - In: Cryptography, Biometrics, and Anonymity in …, (pp. 165-198). 2025
The digital age necessitates robust security measures for RGB image transmission and storage. DNA cryptography, inspired by the unique properties of DNA molecules, offers a promising avenue for achieving this goal. This paper provides a comprehensive analysis of the state-of-the-art in RGB image...
Persistent link: https://www.econbiz.de/10015540474
Saved in:
Cover Image
KK Approach to Increase Resilience in Internet of Things: A T-Cell Security Concept
Kazi, Kutubuddin Sayyad Liyakat - In: Cryptography, Biometrics, and Anonymity in …, (pp. 199-228). 2025
This technique for identifying malicious nodes is known by the inventor as the “KK approach.” We compare the throughput and delay of the system with the proposed KK Approach, and the results are superior compared to the earlier techniques. Its abilities to learn, adapt, collaborate, and act...
Persistent link: https://www.econbiz.de/10015540475
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...