Found: 3963
Select item for more details and to access through your institution.
PRELIMINARY ORGANIZATION OF VIRTUAL NETWORK BASED ON PROGRAM MONITORING.
- Published in:
- International Journal on Information Technologies & Security, 2024, v. 16, n. 3, p. 111
- By:
- Publication type:
- Article
Vaccine for digital images against steganography.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-72693-5
- By:
- Publication type:
- Article
Enhanced Visual Cryptographic Schemes with Essential Access Structures and Pixel-Wise Operations.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 2, p. 300, doi. 10.54216/JCIM.140221
- By:
- Publication type:
- Article
ODA Continuing Education Calendar 2024.
- Published in:
- Ontario Dentist, 2024, v. 99, n. 7, p. 58
- Publication type:
- Article
Enhancing the resistance of password hashing using binary randomization through logical gates.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 5, p. 5400, doi. 10.11591/ijece.v14i5.pp5400-5407
- By:
- Publication type:
- Article
The comparison of several cryptosystems using the elliptic curve: a report.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 5, p. 5319, doi. 10.11591/ijece.v14i5.pp5319-5329
- By:
- Publication type:
- Article
Insider Threat Detection: Exploring User Event Behavior Analytics and Machine Learning in Security Reviews.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 2, p. 171, doi. 10.54216/JCIM.130213
- By:
- Publication type:
- Article
A quantum designated multi-verifiers signature scheme based on LIOP states.
- Published in:
- Modern Physics Letters A, 2024, v. 39, n. 23/24, p. 1, doi. 10.1142/S0217732324501116
- By:
- Publication type:
- Article
Navigating Information Technologies in Everyday Psychiatry Practice: A Guide for Early Career Psychiatrists.
- Published in:
- 2024
- By:
- Publication type:
- Abstract
A REVIEW ON IT STRATEGY THEMES OF ACCOUNTING FIRMS.
- Published in:
- Eduvest: Journal Of Universal Studies, 2024, v. 4, n. 8, p. 7196, doi. 10.59188/eduvest.v4i8.1737
- By:
- Publication type:
- Article
CONSUMER DATA PROTECTION IN ELECTRONIC TRANSACTION PRACTICES IN E-COMMERCE.
- Published in:
- Journal of Economics, Technology & Business / Jurnal Ekonomi Teknologi & Bisnis (JETBIS), 2024, v. 3, n. 8, p. 1044
- By:
- Publication type:
- Article
ضوابط استخدام شبكات التواصل الاجتماعي وإدارة الحسابات الرسمية للجهات الحكومية في مملكة البحرين دراسة ميدانية.
- Published in:
- Journal of Arts & Social Sciences (JASS), 2024, v. 15, n. 2, p. 6
- By:
- Publication type:
- Article
Inhalt.
- Published in:
- Computer und Recht, 2024, v. 40, n. 8, p. r85, doi. 10.9785/cr-2024-toc4008
- Publication type:
- Article
Neue IT-sicherheitsrechtliche Anforderungen an die Bereitstellung von digitalen Lösungen im Gesundheitssektor — Analyse wesentlicher Auswirkungen in der Praxis.
- Published in:
- Computer und Recht, 2024, v. 40, n. 8, p. 515, doi. 10.9785/cr-2024-400807
- By:
- Publication type:
- Article
Security, Privacy, and Surveillance in Cyberspace: Organizational Science Concerns and Contributions.
- Published in:
- Journal of Business & Psychology, 2024, v. 39, n. 5, p. 1023, doi. 10.1007/s10869-024-09968-1
- By:
- Publication type:
- Article
Employees as a Source of Security Issues in Times of Change and Stress: A Longitudinal Examination of Employees' Security Violations during the COVID-19 Pandemic.
- Published in:
- Journal of Business & Psychology, 2024, v. 39, n. 5, p. 1027, doi. 10.1007/s10869-023-09917-4
- By:
- Publication type:
- Article
Emerging Arabic Text Watermarking Utilizing Combinations of Different Diacritics.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2024, v. 49, n. 9, p. 12317, doi. 10.1007/s13369-023-08629-4
- By:
- Publication type:
- Article
Trajectory-aware privacy-preserving method with local differential privacy in crowdsourcing.
- Published in:
- EURASIP Journal on Information Security, 2024, v. 2024, n. 1, p. 1, doi. 10.1186/s13635-024-00177-0
- By:
- Publication type:
- Article
Similar But Different: Advantages and disadvantages of ISO's harmonized structure.
- Published in:
- Quality Progress, 2024, v. 57, n. 8, p. 50
- By:
- Publication type:
- Article
Overview of Research Progress in Graph Transformers.
- Published in:
- Journal of Computer Engineering & Applications, 2024, v. 60, n. 14, p. 37, doi. 10.3778/j.issn.1002-8331.2308-0216
- By:
- Publication type:
- Article
Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 8, p. 505, doi. 10.3390/info15080505
- By:
- Publication type:
- Article
A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 16, p. 5171, doi. 10.3390/s24165171
- By:
- Publication type:
- Article
DOES SHARING MAKE MY DATA MORE INSECURE? AN EMPIRICAL STUDY ON HEALTH INFORMATION EXCHANGE AND DATA BREACHES.
- Published in:
- MIS Quarterly, 2024, v. 48, n. 3, p. 873, doi. 10.25300/MISQ/2023/17479
- By:
- Publication type:
- Article
Digital Risk and Financial Inclusion: Balance between Auxiliary Innovation and Protecting Digital Banking Customers.
- Published in:
- Risks, 2024, v. 12, n. 8, p. 133, doi. 10.3390/risks12080133
- By:
- Publication type:
- Article
Chip-encoded high-security classical optical key distribution.
- Published in:
- Nanophotonics (21928606), 2024, v. 13, n. 19, p. 3717, doi. 10.1515/nanoph-2024-0188
- By:
- Publication type:
- Article
Dual-band complex-amplitude metasurface empowered high security cryptography with ultra-massive encodable patterns.
- Published in:
- Nanophotonics (21928606), 2024, v. 13, n. 20, p. 3915, doi. 10.1515/nanoph-2024-0314
- By:
- Publication type:
- Article
A High-Performance FPGA PRNG Based on Multiple Deep-Dynamic Transformations.
- Published in:
- Entropy, 2024, v. 26, n. 8, p. 671, doi. 10.3390/e26080671
- By:
- Publication type:
- Article
Separable Reversible Data Hiding for Encrypted 3D Meshes Based on Self-Organized Blocking and Most Significant Bit Prediction.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 8, p. 1059, doi. 10.3390/sym16081059
- By:
- Publication type:
- Article
Results of the 2023 Interdisciplinary Contest in Modeling.
- Published in:
- UMAP Journal, 2023, v. 44, n. 3, p. 189
- By:
- Publication type:
- Article
Information Insecurity.
- Published in:
- 2016
- By:
- Publication type:
- Book Review
The system of knowledge management using web based learning and education technology.
- Published in:
- Computer Systems Science & Engineering, 2016, v. 31, n. 6, p. 469
- By:
- Publication type:
- Article
Information security in practices: Exploring privacy and trust in computer and internet surveillance.
- Published in:
- Computer Systems Science & Engineering, 2016, v. 31, n. 2, p. 147
- By:
- Publication type:
- Article
cio central.
- Published in:
- Government Technology, 2024, v. 37, n. 5, p. 42
- Publication type:
- Article
cio central.
- Published in:
- Government Technology, 2024, v. 37, n. 4, p. 41
- Publication type:
- Article
23 Years of Top 25.
- Published in:
- Government Technology, 2024, v. 37, n. 4, p. 5
- By:
- Publication type:
- Article
Changing of the Guard.
- Published in:
- Government Technology, 2023, v. 36, n. 8, p. 18
- By:
- Publication type:
- Article
cio central.
- Published in:
- Government Technology, 2023, v. 36, n. 2, p. 42
- Publication type:
- Article
A Fresh Approach.
- Published in:
- Government Technology, 2023, v. 36, n. 1, p. 50
- By:
- Publication type:
- Article
All Together Now: Three reasons whole-of-state cyber solutions make sense now.
- Published in:
- Government Technology, 2022, v. 35, n. 7, p. 58
- By:
- Publication type:
- Article
Michael Leahy, Secretary, Department of Information Technology, Maryland.
- Published in:
- Government Technology, 2021, v. 34, n. 3, p. 26
- By:
- Publication type:
- Article
Lester Godsey, Chief Information Security Offi cer Maricopa County, Ariz.
- Published in:
- Government Technology, 2021, v. 34, n. 3, p. 24
- By:
- Publication type:
- Article
ON THE MOVE.
- Published in:
- Government Technology, 2020, v. 33, n. 9, p. 44
- Publication type:
- Article
Cio central.
- Published in:
- Government Technology, 2019, v. 32, n. 7, p. 52
- Publication type:
- Article
PATCH WORK: PATCH MANAGEMENT IS A CORNERSTONE TO INFORMATION SECURITY IN TODAY'S HIGHLY DIGITIZED ENVIRONMENT. SO, WHY IS IT STILL SUCH A VULNERABILITY?
- Published in:
- Government Technology, 2019, v. 32, n. 7, p. 38
- By:
- Publication type:
- Article
STATES TACKLE PRIVACY.
- Published in:
- Government Technology, 2019, v. 32, n. 5, p. 10
- By:
- Publication type:
- Article
MILITARY VETERAN TAKES TOP FLORIDA INFORMATION SECURITY JOB.
- Published in:
- Government Technology, 2018, v. 31, n. 2, p. 42
- Publication type:
- Article
Jeffery Weak Appointed as Idaho’s First Director of Information Security.
- Published in:
- Government Technology, 2017, v. 30, n. 6, p. 47
- Publication type:
- Article
Florida Searches for New CISO.
- Published in:
- Government Technology, 2017, v. 30, n. 5, p. 46
- Publication type:
- Article
Cybersecurity's Metrics Problem.
- Published in:
- Government Technology, 2017, v. 30, n. 3, p. 46
- By:
- Publication type:
- Article
HOW YOU'LL SHARE DATA SAFELY.
- Published in:
- Government Technology, 2016, v. 29, n. 7, p. 28
- Publication type:
- Article