Works matching Information assurance (IA)
Results: 27
Accelerated cybersecure communication based on reduced encryption/decryption and information assurance protocols.
- Published in:
- Journal of Telecommunications Management, 2009, v. 2, n. 3, p. 284
- By:
- Publication type:
- Article
Organizational information security as a complex adaptive system: insights from three agent-based models.
- Published in:
- Information Systems Frontiers, 2017, v. 19, n. 3, p. 509, doi. 10.1007/s10796-015-9608-8
- By:
- Publication type:
- Article
Pre-Service Teachers' Perceptions of Information Assurance and Cyber Security.
- Published in:
- International Journal of Information & Communication Technology Education, 2012, v. 8, n. 2, p. 94, doi. 10.4018/jicte.2012040108
- By:
- Publication type:
- Article
Information and Quality Assurance.
- Published in:
- IT Professional, 2008, v. 10, n. 3, p. 10, doi. 10.1109/MITP.2008.50
- By:
- Publication type:
- Article
Intention Awareness Theory in Information Risk Engineering: Contrived Balance in Integrating Information Assurance and Situation Awareness.
- Published in:
- Journal of Information Assurance & Security, 2013, v. 8, n. 1, p. 9
- By:
- Publication type:
- Article
Intention Awareness Theory; Risk Engineering Architecture Integrating Situation Awareness and Intention Awareness in Network-Centric Information Policy.
- Published in:
- Journal of Information Assurance & Security, 2013, v. 8, n. 1, p. 1
- By:
- Publication type:
- Article
Message Passing for Distributed QoS-Security Tradeoffs†.
- Published in:
- Computer Journal, 2014, v. 57, n. 6, p. 840, doi. 10.1093/comjnl/bxt064
- By:
- Publication type:
- Article
The Informatino Assurance Range.
- Published in:
- ITEA Journal of Test & Evaluation, 2010, v. 31, n. 4, p. 473
- By:
- Publication type:
- Article
Information Assurance Test and Evaluation Policy Crosswalk for Defense Acquisition Programs.
- Published in:
- ITEA Journal of Test & Evaluation, 2010, v. 31, n. 4, p. 466
- By:
- Publication type:
- Article
A Perspective on the Federal Sentencing Guidelines Chapter 8 - Sentencing of Organizations & An Interpretation With Respect To HIPAA Final Security Rule.
- Published in:
- Norwich University Journal of Information Assurance (NUJIA), 2006, v. 2, n. 1, p. 1
- By:
- Publication type:
- Article
A MODEL OF INFORMATION ASSURANCE BENEFITS.
- Published in:
- Information Systems Management, 2005, v. 22, n. 2, p. 20, doi. 10.1201/1078/45099.22.2.20050301/87274.3
- By:
- Publication type:
- Article
INFORMATION ASSURANCE BENEFITS AND CHALLENGES: AN INTRODUCTION.
- Published in:
- Information & Security, 2017, v. 36, n. 1, p. 1, doi. 10.11610/isij.3604
- By:
- Publication type:
- Article
INFORMATION ASSURANCE EDUCATION and the Protection of U.S. Critical Infrastructures.
- Published in:
- Forensic Examiner, 2005, v. 14, n. 2, p. 33
- By:
- Publication type:
- Article
Square Legal Pegs in Round Cyber Holes: The NSA, Lawfulness, and the Protection of Privacy Rights and Civil Liberties in Cyberspace.
- Published in:
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 139
- By:
- Publication type:
- Article
SECURE SOFTWARE DEVELOPMENT: INDUSTRIAL PRACTICE - A REVIEW.
- Published in:
- i-Manager's Journal on Software Engineering, 2022, v. 16, n. 3, p. 60, doi. 10.26634/jse.16.3.18674
- By:
- Publication type:
- Article
Using a Serious Game Approach to Teach Secure Coding in Introductory Programming: Development and Initial Findings.
- Published in:
- Journal of Educational Technology Systems, 2012, v. 41, n. 2, p. 107, doi. 10.2190/ET.41.2.b
- By:
- Publication type:
- Article
Cybersecurity: From Ad Hoc Patching to Lifecycle of Software Engineering.
- Published in:
- Journal of Homeland Security & Emergency Management, 2006, v. 3, n. 4, p. 1, doi. 10.2202/1547-7355.1281
- By:
- Publication type:
- Article
Incorporating Academic Integrity into an Online Information Assurance Program.
- Published in:
- Business Education Innovation Journal, 2009, v. 1, n. 2, p. 68
- By:
- Publication type:
- Article
Integration of Innovative Technologies for Enhancing Students' Motivation for Science Learning and Career.
- Published in:
- Journal of Science Education & Technology, 2014, v. 23, n. 3, p. 370, doi. 10.1007/s10956-013-9469-1
- By:
- Publication type:
- Article
Protecting the Nation's Wealth.
- Published in:
- ITNOW, 2012, v. 54, n. 1, p. 16, doi. 10.1093/itnow/bws005
- By:
- Publication type:
- Article
Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies.
- Published in:
- Journal of Information Systems Education, 2017, v. 28, n. 1, p. 11
- By:
- Publication type:
- Article
Information Assurance Metric for Assessing NIST's Monitoring Step in the Risk Management Framework.
- Published in:
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 5, p. 253, doi. 10.1080/19393555.2010.514650
- By:
- Publication type:
- Article
Transmit antenna selection for millimeter-wave communications using multi-RIS with imperfect transceiver hardware.
- Published in:
- Wireless Networks (10220038), 2025, v. 31, n. 1, p. 185, doi. 10.1007/s11276-024-03754-w
- By:
- Publication type:
- Article
On performance of RIS-aided bidirectional full-duplex systems with combining of imperfect conditions.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 2, p. 649, doi. 10.1007/s11276-023-03490-7
- By:
- Publication type:
- Article
Combining FD‐UAV and NOMA technologies in IoT sensor network with millimeter‐wave communications.
- Published in:
- International Journal of Communication Systems, 2025, v. 38, n. 1, p. 1, doi. 10.1002/dac.5492
- By:
- Publication type:
- Article
Aerial intelligent reflecting surface for improving the secrecy performance of wireless systems with hardware impairments.
- Published in:
- International Journal of Communication Systems, 2024, v. 37, n. 7, p. 1, doi. 10.1002/dac.5734
- By:
- Publication type:
- Article
Symbol error probability of mmWave communications with transmit antenna selection and RISs under the impacts of hardware impairments.
- Published in:
- International Journal of Communication Systems, 2023, v. 36, n. 18, p. 1, doi. 10.1002/dac.5614
- By:
- Publication type:
- Article