Device protection through physical and software means. Security examples include software encryption, keys, and secure protocols for data transfer

Aus 19892 Bewertungen, bewerten Kunden unsere Security Engineers 4.8 von 5 Sternen.
Erfahren Sie mehr

Filter

Meine letzten Suchanfragen
Filtern nach:
Budget
bis
bis
bis
Typ
Fähigkeiten
Sprachen
    Jobstatus
    4 Gefundene Jobs, Preise in EUR
    Office 365 Specialist Required 6 Tage left
    VERIFIZIERT

    I am looking for an office 365 specialist who has setup e3 licenses and has setup the security and compliances. Someone who can do this with me. There is only 2 users but I need everything to be compliant like a large corporation

    €116 (Avg Bid)
    €116 Gebot i.D.
    4 Angebote
    Data research 2 Tage left
    VERIFIZIERT

    Data related work find suitable software for recover I need this work to complete today or tomorrow fixed project

    €116 (Avg Bid)
    €116 Gebot i.D.
    12 Angebote

    We are looking for booters specialist, to test our projects safety.

    €251 (Avg Bid)
    €251 Gebot i.D.
    1 Angebote

    Edge computing is much vulnerable to various types of security attacks. Various approaches for detecting security threats in edge computing have been presented. Machine learning has been proposed by various researchers for attack detection. The schemes which have already been proposed have various phases of data preprocessing, feature extraction, and classification. It is analyzed that machine learning algorithms like SVM, KNN, DT, etc. give low accuracy for vulnerability detection. A novel machine learning algorithm is required which increases accuracy for vulnerability detection in edge computing. Note- [ Need new hybrid ML algorithm, not an existing one with GitHub available code.] The main objective of this project is to secure edge devices using a hybrid machine learning algorithm th...

    €325 (Avg Bid)
    €325 Gebot i.D.
    9 Angebote

    Top Security Gemeinschafts-Artikel