Works matching Computer Security
Results: 5000
La capacitación de los especialistas de seguridad informática.
- Published in:
- Pedagogía Profesional, 2024, v. 22, n. 2, p. 1
- By:
- Publication type:
- Article
OPTIMIZATION OF COMPUTER NETWORK SECURITY SYSTEM BASED ON IMPROVED NEURAL NETWORK ALGORITHM AND DATA SEARCHING.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 5, p. 3979, doi. 10.12694/scpe.v25i5.3150
- By:
- Publication type:
- Article
Exploring students' experiences in using a physical laboratory for computer networks and data security.
- Published in:
- Computer Applications in Engineering Education, 2017, v. 25, n. 2, p. 290, doi. 10.1002/cae.21797
- By:
- Publication type:
- Article
Design and Testing of a Computer Security Layer for the LIN Bus †.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 18, p. 6901, doi. 10.3390/s22186901
- By:
- Publication type:
- Article
EMPIRACAL STUDY OF STUDENTS' COMPUTER SECURITY PRACTICES/PERCEPTIONS.
- Published in:
- Journal of Computer Information Systems, 2007, v. 47, n. 3, p. 105
- By:
- Publication type:
- Article
Guidelines for computer security in general practice.
- Published in:
- Informatics in Primary Care, 2007, v. 15, n. 2, p. 73
- By:
- Publication type:
- Article
EVALUAREA SECURITĂTII RETELELOR DE CALCULATOARE SI SOLUTII PRACTICE DE ADMINISTRARE.
- Published in:
- Studii şi Cercetări de Calcul Economic şi Cibernetică Economică, 2011, v. 45, n. 1/2, p. 95
- By:
- Publication type:
- Article
Computer Security in the Future.
- Published in:
- ISeCure, 2011, v. 3, n. 1, p. 3
- By:
- Publication type:
- Article
Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks.
- Published in:
- Journal of Information Technology Education: Research, 2004, v. 3, p. 279, doi. 10.28945/302
- By:
- Publication type:
- Article
Strategic Planning for the Computer Security: A Practice Case of an Electrical Research Institute.
- Published in:
- 2014
- By:
- Publication type:
- Case Study
Quality Function Deployment (QFD) House of Quality for Strategic Planning of Computer Security of SMEs.
- Published in:
- International Journal of Combinatorial Optimization Problems & Informatics, 2013, v. 4, n. 1, p. 39
- By:
- Publication type:
- Article
Adding practical experience to computer security course.
- Published in:
- Computer Applications in Engineering Education, 2018, v. 26, n. 2, p. 384, doi. 10.1002/cae.21891
- By:
- Publication type:
- Article
CONSIDERATIONS ABOUT COMPUTER NETWORKS SECURITY UNDER VARIOUS OPERATING SYSTEMS.
- Published in:
- Journal of Applied Quantitative Methods, 2010, v. 5, n. 4, p. 571
- By:
- Publication type:
- Article
COLLEGE STUDENT HOME COMPUTER SECURITY ADOPTION.
- Published in:
- Issues in Information Systems, 2013, v. 14, n. 2, p. 139
- By:
- Publication type:
- Article
COLLEGE STUDENT HOME COMPUTER SECURITY ADOPTION.
- Published in:
- Issues in Information Systems, 2013, v. 14, n. 2, p. 139
- By:
- Publication type:
- Article
Estrategia para la preparación en Seguridad Informática de los directivos. Consejo de Administración Pública de Villa Clara.
- Published in:
- Revista El Directivo al Día, 2018, n. 2, p. 16
- By:
- Publication type:
- Article
A Study on the Design and Application of Fictional Storytelling in Online Learning of Computer Security.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 13, p. 6185, doi. 10.3390/app11136185
- By:
- Publication type:
- Article
TRAINING USERS TO BE AWARE OF COMPUTER AND INFORMATION SECURITY ON COLLEGE AND UNIVERSITY CAMPUSES.
- Published in:
- Journal of Information Systems Technology & Planning, 2016, v. 8, n. 19, p. 61
- By:
- Publication type:
- Article
Form - Meaning - Usage Synergy in LSP & Professional Communication: Computer Security in Terms of Frame Semantics.
- Published in:
- Fachsprache: Journal of Professional & Scientific Communication, 2022, v. 44, n. 3/4, p. 169, doi. 10.24989/fs.v44i3-4.1973
- By:
- Publication type:
- Article
Interval-Valued Neutrosophic Sets-Based IVNS-RAM Method for Enhanced Security Evaluation in Computer Networks.
- Published in:
- Neutrosophic Sets & Systems, 2025, v. 77, p. 479
- By:
- Publication type:
- Article
Soft Systems Methodology for the Strategic Planning of the Enterprise Computer Security.
- Published in:
- International Journal of Combinatorial Optimization Problems & Informatics, 2014, v. 5, n. 1, p. 2
- By:
- Publication type:
- Article
COMPUTER SCIENCE SECURITY RESEARCH AND HUMAN SUBJECTS: EMERGING CONSIDERATIONS FOR RESEARCH ETHICS BOARDS.
- Published in:
- Journal of Empirical Research on Human Research Ethics, 2011, v. 6, n. 2, p. 71, doi. 10.1525/jer.2011.6.2.71
- By:
- Publication type:
- Article
FACULTY, STAFF, AND STUDENT RESPONSIBILITIES FOR COMPUTER AND INFORMATION SECURITY ON CAMPUS.
- Published in:
- Journal of Information Systems Technology & Planning, 2016, v. 8, n. 19, p. 1
- By:
- Publication type:
- Article
Visual Computer-Managed Security: A Framework for Developing Access Control in Enterprise Applications.
- Published in:
- 2013
- By:
- Publication type:
- Case Study
La paradoja de la seguridad informática durante la pandemia. ¿Son más vulnerables los alumnos de tecnologías de la información?
- Published in:
- Dilemas Contemporáneos: Educación, Política y Valores, 2022, v. 9, n. 3, p. 1
- By:
- Publication type:
- Article
Security Metrics Foundations for Computer Security.
- Published in:
- Computer Journal, 2010, v. 53, n. 7, p. 1106, doi. 10.1093/comjnl/bxp094
- By:
- Publication type:
- Article
Computer Security and Risky Computing Practices: A Rational Choice Perspective.
- Published in:
- Journal of Organizational & End User Computing, 2004, v. 16, n. 3, p. 22, doi. 10.4018/joeuc.2004070102
- By:
- Publication type:
- Article
Autonomous Weapons Systems, the Frame Problem and Computer Security.
- Published in:
- Journal of Military Ethics, 2015, v. 14, n. 2, p. 162, doi. 10.1080/15027570.2015.1069013
- By:
- Publication type:
- Article
Intelligent Analysis and Prediction of Computer Network Security Logs Based on Deep Learning.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 22, p. 4556, doi. 10.3390/electronics13224556
- By:
- Publication type:
- Article
Intelligent agent based artificial immune system for computer security—a review.
- Published in:
- Artificial Intelligence Review, 2009, v. 32, n. 1-4, p. 13, doi. 10.1007/s10462-009-9131-8
- By:
- Publication type:
- Article
AN ANALYSIS OF THE GROWTH OF COMPUTER AND INTERNET SECURITY BREACHES.
- Published in:
- Communications of the Association for Information Systems, 2003, v. 12, p. 684, doi. 10.17705/1CAIS.01246
- By:
- Publication type:
- Article
STATISTICAL ANALYSIS OF SECURITY ATTRIBUTES OF COMPUTER SYSTEMS.
- Published in:
- International Journal of Reliability, Quality & Safety Engineering, 2007, v. 14, n. 6, p. 569
- By:
- Publication type:
- Article
NETWORK VIRUS AND COMPUTER NETWORK SECURITY DETECTION TECHNOLOGY OPTIMIZATION.
- Published in:
- Scalable Computing: Practice & Experience, 2021, v. 22, n. 2, p. 161, doi. 10.12694/scpe.v22i2.1881
- By:
- Publication type:
- Article
Computer Network Information Security Monitoring System Based on Big Data Era.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/3170164
- By:
- Publication type:
- Article
A survey of security visualization for computer network logs.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 4, p. 404, doi. 10.1002/sec.324
- By:
- Publication type:
- Article
Computer network security evaluation method based on improved attack graph.
- Published in:
- Journal of Cyber Security Technology, 2022, v. 6, n. 4, p. 201, doi. 10.1080/23742917.2022.2120293
- By:
- Publication type:
- Article
Computer Multimedia Security Protection System Based on the Network Security Active Defense Model.
- Published in:
- Advances in Multimedia, 2021, p. 1, doi. 10.1155/2021/8792105
- By:
- Publication type:
- Article
Research on computer network security evaluation based on image recognition and neural network.
- Published in:
- Journal of Electronic Imaging, 2023, v. 32, n. 1, p. 11214, doi. 10.1117/1.JEI.32.1.011214
- By:
- Publication type:
- Article
INTERPRETING CHANCE FOR COMPUTER SECURITY BY VITERBI ALGORITHM WITH EDIT DISTANCE.
- Published in:
- New Mathematics & Natural Computation, 2005, v. 1, n. 3, p. 421, doi. 10.1142/S1793005705000238
- By:
- Publication type:
- Article
A Novel Computer Virus Propagation Model under Security Classification.
- Published in:
- Discrete Dynamics in Nature & Society, 2017, p. 1, doi. 10.1155/2017/8609082
- By:
- Publication type:
- Article
Computer security in academia-a potential roadblock to distributed annotation of the human genome.
- Published in:
- Nature Biotechnology, 2004, v. 22, n. 6, p. 771, doi. 10.1038/nbt0604-771
- By:
- Publication type:
- Article
Embedding Context: An Integrative Computer Security Course.
- Published in:
- MountainRise, 2009, v. 5, n. 2, p. 1
- By:
- Publication type:
- Article
A PASSWORD TO COMPUTER SECURITY.
- Published in:
- Financial Executive, 1992, v. 8, n. 4, p. 34
- By:
- Publication type:
- Article
Controlling the Threat To Computer Security.
- Published in:
- Management Review, 1990, v. 79, n. 6, p. 54
- By:
- Publication type:
- Article
Using deep learning to solve computer security challenges: a survey.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00055-5
- By:
- Publication type:
- Article
EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining.
- Published in:
- 2015
- By:
- Publication type:
- journal article
THE MANAGEMENT MODEL OF THE PHYSICAL, COMPUTER AND COMMUNICATIONS SECURITY SYSTEM IN HIGHER EDUCATION INSTITUTIONS.
- Published in:
- eLearning & Software for Education, 2020, v. 1, p. 477, doi. 10.12753/2066-026X-20-062
- By:
- Publication type:
- Article
Computer Security in the Age of the Internet.
- Published in:
- DISAM Journal of International Security Assistance Management, 2001, v. 23, n. 3, p. 91
- By:
- Publication type:
- Article
Businesses ignore computer security.
- Published in:
- Internal Auditor, 1996, v. 53, n. 3, p. 11
- Publication type:
- Article
Methodology for Computer Security Incident Response Teams into IoT Strategy.
- Published in:
- KSII Transactions on Internet & Information Systems, 2021, v. 15, n. 5, p. 1909, doi. 10.3837/tiis.2021.05.018
- By:
- Publication type:
- Article