Found: 115
Select item for more details and to access through your institution.
Cyber Exposure.
- Published in:
- Government Technology, 2016, v. 29, n. 7, p. 24
- By:
- Publication type:
- Article
SCALING DOWN SECURITY.
- Published in:
- Government Technology, 2016, v. 29, n. 7, p. 36
- By:
- Publication type:
- Article
LEGISLATING CYBERSECURITY.
- Published in:
- Government Technology, 2016, v. 29, n. 7, p. 30
- By:
- Publication type:
- Article
Massive Connectedness.
- Published in:
- Government Technology, 2016, v. 29, n. 7, p. 18
- By:
- Publication type:
- Article
Holding Steady at No. 1.
- Published in:
- Government Technology, 2016, v. 29, n. 7, p. 5
- By:
- Publication type:
- Article
New detection method and countermeasure of cyber attacks in mix networks.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 16, p. 6509, doi. 10.1007/s11042-014-2127-7
- By:
- Publication type:
- Article
Fast attack detection using correlation and summarizing of security alerts in grid computing networks.
- Published in:
- Journal of Supercomputing, 2012, v. 62, n. 2, p. 804, doi. 10.1007/s11227-012-0754-1
- By:
- Publication type:
- Article
CYBER HYGIENE FOR UNMANAGED DEVICES.
- Published in:
- Defense Acquisition, 2023, v. 52, n. 5, p. 34
- By:
- Publication type:
- Article
THE NEW PARADIGM: WHEN AUTHENTICATION BECOMES INVISIBLE TO THE USER.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 198
- By:
- Publication type:
- Article
PROTECTING SENSOR DATA FROM MALWARE ATTACKS.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 178
- By:
- Publication type:
- Article
TRUSTED EXECUTION ENVIRONMENT FOR PRIVACY PRESERVING BIOMETRIC AUTHENTICATION.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 162
- By:
- Publication type:
- Article
SECURITY ANALYSIS OF MOBILE TWO-FACTOR AUTHENTICATION SCHEMES.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 138
- By:
- Publication type:
- Article
ADDING NONTRADITIONAL AUTHENTICATION TO ANDROID.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 120
- By:
- Publication type:
- Article
ON DESIGNING SWIR TO VISIBLE FACE MATCHING ALGORITHMS.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 98
- By:
- Publication type:
- Article
HETEROGENEOUS FACE RECOGNITION: AN EMERGING TOPIC IN BIOMETRICS.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 80
- By:
- Publication type:
- Article
A SURVEY OF BIOMETRICS FOR WEARABLE DEVICES.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 46
- By:
- Publication type:
- Article
AUTHENTICATE ONCE AND BE DONE: USER-CENTRIC AUTHENTICATION THROUGH RICH DEVICE CAPABILITIES.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 8
- By:
- Publication type:
- Article
Binary bugs.
- Published in:
- 2013
- By:
- Publication type:
- Opinion
Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance.
- Published in:
- International Journal of Electronics & Telecommunications, 2022, v. 68, n. 3, p. 475, doi. 10.24425/ijet.2022.141263
- By:
- Publication type:
- Article
The Rising Digital Missile Gap: the Security Threat of the United States' Cyber Inactivity.
- Published in:
- Pepperdine Policy Review, 2013, v. 6, p. 1
- By:
- Publication type:
- Article
Secure and user privacy-preserving searching in peer-to-peer networks.
- Published in:
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 603, doi. 10.1093/jigpal/jzs036
- By:
- Publication type:
- Article
Changing Security Landscape.
- Published in:
- Government Technology, 2011, v. 24, n. 9, p. 24
- Publication type:
- Article
How to Create Memorizable and Strong Passwords.
- Published in:
- Journal of Medical Internet Research, 2012, v. 14, n. 1, p. 33, doi. 10.2196/jmir.1906
- By:
- Publication type:
- Article
ILNP: mobility, multi-homing, localised addressing and security through naming.
- Published in:
- Telecommunication Systems, 2009, v. 42, n. 3/4, p. 273, doi. 10.1007/s11235-009-9186-5
- By:
- Publication type:
- Article
Understanding Information Security.
- Published in:
- Journal of Information System Security, 2012, v. 8, n. 2, p. 3
- By:
- Publication type:
- Article
Application of Symmetric Encryption Algorithm Sensor in the Research of College Student Security Management System.
- Published in:
- Journal of Sensors, 2022, p. 1, doi. 10.1155/2022/3323547
- By:
- Publication type:
- Article
Internet Geographic Information Security Supervision Platform Architecture Research.
- Published in:
- International Journal of Online Engineering, 2013, p. 13, doi. 10.3991/ijoe.v9iS2.2562
- By:
- Publication type:
- Article
Computer Network Security Management of Data Encryption Technology.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/6873087
- By:
- Publication type:
- Article
Application Research of Data Encryption Algorithm in Computer Security Management.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/1463724
- By:
- Publication type:
- Article
A Data-Driven Evaluation for Insider Threats.
- Published in:
- Data Science & Engineering, 2016, v. 1, n. 2, p. 73, doi. 10.1007/s41019-016-0009-x
- By:
- Publication type:
- Article
Transferencias internacionales de datos, perspectiva española de la necesaria búsqueda de estándares globales.
- Published in:
- Revista Derecho del Estado, 2009, n. 23, p. 37
- By:
- Publication type:
- Article
Retracted: Model Design of Big Data Information Security Management Based on the Internet of Things.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
Model to Optimize the Management of Strategic Projects Using Genetic Algorithms in a Public Organization.
- Published in:
- Information (2078-2489), 2022, v. 13, n. 11, p. 533, doi. 10.3390/info13110533
- By:
- Publication type:
- Article
how to stay connected.
- Published in:
- Strategic Finance, 2002, v. 84, n. 3, p. 32
- By:
- Publication type:
- Article
TRODIMENZIONALNI MODEL PROCESNOG UPRAVLJANJA SIGURNOŠĆU INFORMACIJA.
- Published in:
- Sigurnost, 2022, v. 64, n. 2, p. 143
- By:
- Publication type:
- Article
ELEVATING INFORMATION SECURITY PRACTICES WITHIN SUDANESE HEALTHCARE ESTABLISHMENTS' STAFF.
- Published in:
- International Journal of Advanced Research in Computer Science, 2022, v. 13, n. 4, p. 6, doi. 10.26483/ijarcs.v13i4.6835
- By:
- Publication type:
- Article
IDS CRITERIA FOR ENHANCED SECURITY OVER CLOUD.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 837, doi. 10.26483/ijarcs.v8i7.4505
- By:
- Publication type:
- Article
A METRIC FOR MEASUREMENT AND SECURITY IN AD-HOC ROUTING PATHS.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 820, doi. 10.26483/ijarcs.v8i7.4491
- By:
- Publication type:
- Article
The Importance of the Security Culture in SMEs as Regards the Correct Management of the Security of Their Assets.
- Published in:
- Future Internet, 2016, v. 8, n. 3, p. 30, doi. 10.3390/fi8030030
- By:
- Publication type:
- Article
Contrôler les réseaux d'entreprises avec les technologies de l'information.
- Published in:
- Revue Française de Gestion, 2007, n. 170, p. 103, doi. 10.3166/rfg.170.103-115
- By:
- Publication type:
- Article
Changes in Guesswork over Time in Multi-processor Attacks.
- Published in:
- Journal of Information Assurance & Security, 2012, v. 7, n. 5, p. 241
- By:
- Publication type:
- Article
Practical Interdomain Routing Security.
- Published in:
- IT Professional, 2009, v. 11, n. 6, p. 54, doi. 10.1109/MITP.2009.131
- By:
- Publication type:
- Article
The Second Immutable Law of Security Administration.
- Published in:
- IT Professional, 2009, v. 11, n. 6, p. 4, doi. 10.1109/MITP.2009.134
- By:
- Publication type:
- Article
Managing Security Issues.
- Published in:
- 2008
- Publication type:
- Book Review
Service-Oriented Policy Management for Web-Application Frameworks.
- Published in:
- IEEE Internet Computing, 2009, v. 13, n. 6, p. 39, doi. 10.1109/MIC.2009.95
- By:
- Publication type:
- Article
CONTROVERSY OVER INFORMATION PRIVACY ARISING FROM THE TAIWAN NATIONAL HEALTH INSURANCE DATABASE EXAMINING THE TAIWAN TAIPEI HIGH ADMINISTRATIVE COURT JUDGMENT NO. 102-SU-36 (TSAI V. NHIA).
- Published in:
- Pace International Law Review, 2016, v. 28, n. 1, p. 29, doi. 10.58948/2331-3536.1362
- By:
- Publication type:
- Article
Cloud computing: Challenges and future directions.
- Published in:
- Trends & Issues in Crime & Criminal Justice, 2010, n. 400, p. 1
- By:
- Publication type:
- Article
Retracted: Application Research of Data Encryption Algorithm in Computer Security Management.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
Retracted: Computer Network Security Management of Data Encryption Technology.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
PROACTIVE VERSUS REACTIVE SECURITY INVESTMENTS IN THE HEALTHCARE SECTOR.
- Published in:
- MIS Quarterly, 2014, v. 38, n. 2, p. 451
- By:
- Publication type:
- Article