Found: 115
Select item for more details and to access through your institution.
CYBER HYGIENE FOR UNMANAGED DEVICES.
- Published in:
- Defense Acquisition, 2023, v. 52, n. 5, p. 34
- By:
- Publication type:
- Article
A Data-Driven Evaluation for Insider Threats.
- Published in:
- Data Science & Engineering, 2016, v. 1, n. 2, p. 73, doi. 10.1007/s41019-016-0009-x
- By:
- Publication type:
- Article
La capacitación de los especialistas de seguridad informática.
- Published in:
- Pedagogía Profesional, 2024, v. 22, n. 2, p. 1
- By:
- Publication type:
- Article
Application of Symmetric Encryption Algorithm Sensor in the Research of College Student Security Management System.
- Published in:
- Journal of Sensors, 2022, p. 1, doi. 10.1155/2022/3323547
- By:
- Publication type:
- Article
Secure and user privacy-preserving searching in peer-to-peer networks.
- Published in:
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 603, doi. 10.1093/jigpal/jzs036
- By:
- Publication type:
- Article
Securing BitTorrent using a new reputation-based trust management system.
- Published in:
- Peer-to-Peer Networking & Applications, 2013, v. 6, n. 1, p. 86, doi. 10.1007/s12083-012-0141-y
- By:
- Publication type:
- Article
Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols.
- Published in:
- Personal & Ubiquitous Computing, 2019, v. 23, n. 5/6, p. 777, doi. 10.1007/s00779-017-1096-z
- By:
- Publication type:
- Article
Interoperability of Security-Enabled Internet of Things.
- Published in:
- Wireless Personal Communications, 2011, v. 61, n. 3, p. 567, doi. 10.1007/s11277-011-0384-6
- By:
- Publication type:
- Article
The Biometric Based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits.
- Published in:
- Wireless Personal Communications, 2011, v. 60, n. 3, p. 405, doi. 10.1007/s11277-011-0298-3
- By:
- Publication type:
- Article
Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments.
- Published in:
- Management Science, 2011, v. 57, n. 5, p. 934, doi. 10.1287/mnsc.1100.1304
- By:
- Publication type:
- Article
Confronting the Emerging Threat.
- Published in:
- Internal Auditor, 2007, v. 64, n. 5, p. 66
- By:
- Publication type:
- Article
European Nations Make Security a High Priority.
- Published in:
- Internal Auditor, 2007, v. 64, n. 5, p. 15
- By:
- Publication type:
- Article
Um Estudo de Caso sobre a Implantação de um Ambiente de Segurança de Redes de Computadores.
- Published in:
- Computing & System Journal (C&S) / Revista de Sistemas e Computação (RSC), 2019, v. 9, n. 1, p. 119, doi. 10.36558/22372903-2019v9n1-p8
- By:
- Publication type:
- Article
Editorial: Cybersecurity.
- Published in:
- Technology Innovation Management Review, 2014, p. 3
- By:
- Publication type:
- Article
Public-key based access control in sensornet.
- Published in:
- Wireless Networks (10220038), 2011, v. 17, n. 5, p. 1217, doi. 10.1007/s11276-011-0343-x
- By:
- Publication type:
- Article
Implementation of Improved Raft Consensus Algorithm in IoT Information Security Management.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 6, p. 153, doi. 10.14569/ijacsa.2024.0150617
- By:
- Publication type:
- Article
Practical Interdomain Routing Security.
- Published in:
- IT Professional, 2009, v. 11, n. 6, p. 54, doi. 10.1109/MITP.2009.131
- By:
- Publication type:
- Article
The Second Immutable Law of Security Administration.
- Published in:
- IT Professional, 2009, v. 11, n. 6, p. 4, doi. 10.1109/MITP.2009.134
- By:
- Publication type:
- Article
Managing Security Issues.
- Published in:
- 2008
- Publication type:
- Book Review
Constructing a Security System for Classified Computer Information Using Distributed Parallel Computing.
- Published in:
- Mobile Information Systems, 2022, p. 1, doi. 10.1155/2022/1195137
- By:
- Publication type:
- Article
New detection method and countermeasure of cyber attacks in mix networks.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 16, p. 6509, doi. 10.1007/s11042-014-2127-7
- By:
- Publication type:
- Article
TRUSTED EXECUTION ENVIRONMENT FOR PRIVACY PRESERVING BIOMETRIC AUTHENTICATION.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 162
- By:
- Publication type:
- Article
THE NEW PARADIGM: WHEN AUTHENTICATION BECOMES INVISIBLE TO THE USER.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 198
- By:
- Publication type:
- Article
PROTECTING SENSOR DATA FROM MALWARE ATTACKS.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 178
- By:
- Publication type:
- Article
SECURITY ANALYSIS OF MOBILE TWO-FACTOR AUTHENTICATION SCHEMES.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 138
- By:
- Publication type:
- Article
ADDING NONTRADITIONAL AUTHENTICATION TO ANDROID.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 120
- By:
- Publication type:
- Article
ON DESIGNING SWIR TO VISIBLE FACE MATCHING ALGORITHMS.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 98
- By:
- Publication type:
- Article
HETEROGENEOUS FACE RECOGNITION: AN EMERGING TOPIC IN BIOMETRICS.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 80
- By:
- Publication type:
- Article
A SURVEY OF BIOMETRICS FOR WEARABLE DEVICES.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 46
- By:
- Publication type:
- Article
AUTHENTICATE ONCE AND BE DONE: USER-CENTRIC AUTHENTICATION THROUGH RICH DEVICE CAPABILITIES.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 8
- By:
- Publication type:
- Article
Binary bugs.
- Published in:
- 2013
- By:
- Publication type:
- Opinion
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications.
- Published in:
- International Journal of Information Security, 2018, v. 17, n. 1, p. 105, doi. 10.1007/s10207-016-0359-4
- By:
- Publication type:
- Article
Formal modeling and automatic enforcement of Bring Your Own Device policies.
- Published in:
- International Journal of Information Security, 2015, v. 14, n. 2, p. 123, doi. 10.1007/s10207-014-0252-y
- By:
- Publication type:
- Article
An adaptive threat model for security ceremonies.
- Published in:
- International Journal of Information Security, 2015, v. 14, n. 2, p. 103, doi. 10.1007/s10207-014-0253-x
- By:
- Publication type:
- Article
Denial of service attacks and defenses in decentralized trust management.
- Published in:
- International Journal of Information Security, 2009, v. 8, n. 2, p. 89, doi. 10.1007/s10207-008-0068-8
- By:
- Publication type:
- Article
An incentive compatible reputation mechanism for ubiquitous computing environments.
- Published in:
- International Journal of Information Security, 2007, v. 6, n. 5, p. 297, doi. 10.1007/s10207-007-0029-7
- By:
- Publication type:
- Article
Nuclear Lessons for Cyber Security?
- Published in:
- Strategic Studies Quarterly, 2011, v. 5, n. 4, p. 18
- By:
- Publication type:
- Article
Internet Geographic Information Security Supervision Platform Architecture Research.
- Published in:
- International Journal of Online Engineering, 2013, p. 13, doi. 10.3991/ijoe.v9iS2.2562
- By:
- Publication type:
- Article
Pushdown model checking for malware detection.
- Published in:
- International Journal on Software Tools for Technology Transfer, 2014, v. 16, n. 2, p. 147, doi. 10.1007/s10009-013-0290-1
- By:
- Publication type:
- Article
TOWARD PRACTICAL CYBER COUNTER DECEPTION.
- Published in:
- Journal of International Affairs, 2016, v. 70, n. 1, p. 161
- By:
- Publication type:
- Article
Transferencias internacionales de datos, perspectiva española de la necesaria búsqueda de estándares globales.
- Published in:
- Revista Derecho del Estado, 2009, n. 23, p. 37
- By:
- Publication type:
- Article
A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms.
- Published in:
- Mobile Networks & Applications, 2014, v. 19, n. 1, p. 64, doi. 10.1007/s11036-013-0462-y
- By:
- Publication type:
- Article
Retracted: Model Design of Big Data Information Security Management Based on the Internet of Things.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
Contributions and Risks of Artificial Intelligence (AI) in Building Smarter Cities: Insights from a Systematic Review of the Literature.
- Published in:
- Energies (19961073), 2020, v. 13, n. 6, p. 1473, doi. 10.3390/en13061473
- By:
- Publication type:
- Article
25th Anniversary Commemorative Issue.
- Published in:
- 2017
- By:
- Publication type:
- Editorial
A Metric-Based Approach to Assess Risk for 'On Cloud' Federated Identity Management.
- Published in:
- Journal of Network & Systems Management, 2012, v. 20, n. 4, p. 513, doi. 10.1007/s10922-012-9244-2
- By:
- Publication type:
- Article
CONTROVERSY OVER INFORMATION PRIVACY ARISING FROM THE TAIWAN NATIONAL HEALTH INSURANCE DATABASE EXAMINING THE TAIWAN TAIPEI HIGH ADMINISTRATIVE COURT JUDGMENT NO. 102-SU-36 (TSAI V. NHIA).
- Published in:
- Pace International Law Review, 2016, v. 28, n. 1, p. 29, doi. 10.58948/2331-3536.1362
- By:
- Publication type:
- Article
Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance.
- Published in:
- International Journal of Electronics & Telecommunications, 2022, v. 68, n. 3, p. 475, doi. 10.24425/ijet.2022.141263
- By:
- Publication type:
- Article
Optimal Management of Computer Network Security in the Era of Big Data.
- Published in:
- Journal of Computer Networks & Communications, 2022, p. 1, doi. 10.1155/2022/9049420
- By:
- Publication type:
- Article
How to Create Memorizable and Strong Passwords.
- Published in:
- Journal of Medical Internet Research, 2012, v. 14, n. 1, p. 33, doi. 10.2196/jmir.1906
- By:
- Publication type:
- Article