Works matching DE "PREVENTION of computer hacking"
Results: 85
A Study on the Authentication and Security of Financial Settlement Using the Finger Vein Technology in Wireless Internet Environment.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 761, doi. 10.1007/s11277-015-3116-5
- By:
- Publication type:
- Article
When computer monitoring backfires: Privacy invasions and organizational injustice as precursors to computer abuse.
- Published in:
- Journal of Information System Security, 2011, v. 7, n. 1, p. 24
- By:
- Publication type:
- Article
BIG IN JAPAN.
- Published in:
- Asia Weekly, 2008, v. 2, n. 37, p. 14
- Publication type:
- Article
THE RED STORM IN UNCHARTED WATERS: CHINA AND INTERNATIONAL CYBER SECURITY.
- Published in:
- UMKC Law Review, 2014, v. 82, n. 4, p. 951
- By:
- Publication type:
- Article
WHISTLEBLOWER? MORE LIKE CYBERCRIMINAL: THE COMPUTER FRAUD AND ABUSE ACT AS APPLIED TO SARBANES-OXLEY WHISTLEBLOWERS.
- Published in:
- Rutgers Computer & Technology Law Journal, 2016, v. 42, n. 1, p. 120
- By:
- Publication type:
- Article
CROSS-LINGUAL CYBERSECURITY ANALYTICS IN THE INTERNATIONAL DARK WEB WITH ADVERSARIAL DEEP REPRESENTATION LEARNING.
- Published in:
- MIS Quarterly, 2022, v. 46, n. 2, p. 1209, doi. 10.25300/MISQ/2022/16618
- By:
- Publication type:
- Article
TECHNOLOGY AND INDIVIDUAL PRIVACY RIGHTS: THE FOURTH AMENDMENT IMPLICATIONS OF EXPLOITING ZERO-DAY VULNERABILITIES FOR DOMESTIC INVESTIGATIONS.
- Published in:
- Columbia Human Rights Law Review, 2015, v. 47, n. 1, p. 242
- By:
- Publication type:
- Article
Attacks on practical quantum key distribution systems (and how to prevent them).
- Published in:
- Contemporary Physics, 2016, v. 57, n. 3, p. 366, doi. 10.1080/00107514.2016.1148333
- By:
- Publication type:
- Article
Novel intrusion prediction mechanism based on honeypot log similarity.
- Published in:
- International Journal of Network Management, 2016, v. 26, n. 3, p. 156, doi. 10.1002/nem.1923
- By:
- Publication type:
- Article
Location-Related Privacy in Geo-Social Networks.
- Published in:
- IEEE Internet Computing, 2011, v. 15, n. 3, p. 20, doi. 10.1109/MIC.2011.29
- By:
- Publication type:
- Article
Uncovering Transnational Hyperlink Patterns and Web-Mediated Contents: A New Approach Based on Cracking.com Domain.
- Published in:
- Social Science Computer Review, 2011, v. 29, n. 3, p. 369, doi. 10.1177/0894439310382519
- By:
- Publication type:
- Article
People analytics to identify insider fraud.
- Published in:
- ComputerWorld Hong Kong, 2015, p. 34
- By:
- Publication type:
- Article
Check Point goes beyond the firewall with threat prevention.
- Published in:
- ComputerWorld Hong Kong, 2015, p. 14
- Publication type:
- Article
Security vendor: Firewalls defenseless against new attack.
- Published in:
- ComputerWorld Hong Kong, 2010, v. 27, n. 9, p. 43
- By:
- Publication type:
- Article
Cybersecurity Strategy: A Primer for Policy Makers and Those on the Front Line.
- Published in:
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 27
- By:
- Publication type:
- Article
PROSECUTING THE CIA: DOES THE COMPUTER FRAUD AND ABUSE ACT ALLOW FOR LIABILITY?
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2016, v. 34, n. 1, p. 281
- By:
- Publication type:
- Article
Sentencing ‘Anonymous’: exacerbating the civil divide between online citizens and government.
- Published in:
- Police Practice & Research, 2016, v. 17, n. 6, p. 507, doi. 10.1080/15614263.2016.1205983
- By:
- Publication type:
- Article
A Usable and Secure Two-Factor Authentication Scheme.
- Published in:
- Information Security Journal: A Global Perspective, 2012, v. 21, n. 4, p. 169, doi. 10.1080/19393555.2011.629340
- By:
- Publication type:
- Article
iMeasure Security (iMS): A Framework for Quantitative Assessment of Security Measures and its Impacts.
- Published in:
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 4, p. 213, doi. 10.1080/19393551003762223
- By:
- Publication type:
- Article
General Misconceptions about Information Security Lead to an Insecure World.
- Published in:
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 4, p. 164, doi. 10.1080/19393550802369792
- By:
- Publication type:
- Article
Corporate Cybersecurity: The International Threat to Private Networks and How Regulations Can Mitigate It.
- Published in:
- Vanderbilt Journal of Entertainment & Technology Law, 2018, v. 21, n. 1, p. 309
- By:
- Publication type:
- Article
CybeR secuRiTy - Small, Medium, Large, and EXTRA Large.
- Published in:
- Contract Management, 2015, v. 55, n. 8, p. 58
- By:
- Publication type:
- Article
Multi-operator wireless mesh networks secured by an all-encompassing security architecture.
- Published in:
- International Journal of Information Security, 2015, v. 14, n. 2, p. 169, doi. 10.1007/s10207-014-0244-y
- By:
- Publication type:
- Article
An adaptive threat model for security ceremonies.
- Published in:
- International Journal of Information Security, 2015, v. 14, n. 2, p. 103, doi. 10.1007/s10207-014-0253-x
- By:
- Publication type:
- Article
The Security Paradox.
- Published in:
- Government Technology, 2015, v. 28, n. 6, p. 46
- By:
- Publication type:
- Article
Who are you? Secure identities in single hop ad hoc networks.
- Published in:
- Distributed Computing, 2017, v. 30, n. 2, p. 103, doi. 10.1007/s00446-016-0280-0
- By:
- Publication type:
- Article
Security ethics.
- Published in:
- Nature, 2010, v. 463, n. 7278, p. 136, doi. 10.1038/463136a
- Publication type:
- Article
Today's Social Technology: Just Scratching the Surface.
- Published in:
- Financial Executive, 2012, v. 28, n. 4, p. 8
- Publication type:
- Article
Internet Security: You Don's Get What You Pay For.
- Published in:
- Financial Executive, 2003, v. 19, n. 9, p. 51
- By:
- Publication type:
- Article
Network Security: As the Worms Turn.
- Published in:
- Financial Executive, 2003, v. 19, n. 9, p. 49
- By:
- Publication type:
- Article
HOW STRONG IS YOUR SAFETY NET?
- Published in:
- Financial Executive, 1997, v. 13, n. 2, p. 47
- Publication type:
- Article
NSA Director Warns China Has Power to Kill U.S. Power Grid.
- Published in:
- China Business Review, 2014, p. 1
- By:
- Publication type:
- Article
PROTECTING THE STATES FROM ELECTORAL INVASIONS.
- Published in:
- William & Mary Bill of Rights Journal, 2019, v. 28, n. 1, p. 197
- By:
- Publication type:
- Article
Rebooting the Small Law Practice: A Call for Increased Cybersecurity in the Age of Hacks and Digital Attacks.
- Published in:
- American Journal of Trial Advocacy, 2015, v. 38, n. 3, p. 519
- By:
- Publication type:
- Article
Why Password Services: Are Still Relevant, Even Though They're Getting Hacked.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2022, v. 27, n. 4, p. 8
- By:
- Publication type:
- Article
How Bad Guys Are Using The Web's Own Encryption To Hide Malware Payloads.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2016, v. 22, n. 1, p. 8
- By:
- Publication type:
- Article
A Cross-National Examination of the Techniques of Neutralization to Account for Hacking Behaviors.
- Published in:
- Victims & Offenders, 2016, v. 11, n. 4, p. 534, doi. 10.1080/15564886.2015.1121944
- By:
- Publication type:
- Article
Cybersecurity--Hacking.
- Published in:
- World Libraries, 2020, v. 24, n. 1, p. 1
- By:
- Publication type:
- Article
Secure and energy aware load balancing framework for cloud data centre networks.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2019, v. 55, n. 9, p. 540, doi. 10.1049/el.2019.0022
- By:
- Publication type:
- Article
THE MIND OF A CREDIT CARD HACKER.
- Published in:
- Internal Auditor, 2016, v. 73, n. 4, p. 18
- By:
- Publication type:
- Article
Virtual Patriots and a New American Cyber Strategy Changing the Zero-Sum Game.
- Published in:
- Strategic Studies Quarterly, 2012, v. 6, n. 4, p. 100
- By:
- Publication type:
- Article
Industry's Vital Role in National Cyber Security.
- Published in:
- Strategic Studies Quarterly, 2012, v. 6, n. 4, p. 10
- By:
- Publication type:
- Article
CRYPTO WARS 2.0: WHY LISTENING TO APPLE ON ENCRYPTION WILL MAKE AMERICA MORE SECURE.
- Published in:
- Temple International & Comparative Law Journal, 2016, v. 30, n. 2, p. 353
- By:
- Publication type:
- Article
Threats to Information Systems: Today's Reality, Yesterday's Understanding.
- Published in:
- MIS Quarterly, 1992, v. 16, n. 2, p. 173, doi. 10.2307/249574
- By:
- Publication type:
- Article
Patch Release Behaviors of Software Vendors in Response to Vulnerabilities: An Empirical Analysis.
- Published in:
- Journal of Management Information Systems, 2012, v. 28, n. 4, p. 305, doi. 10.2753/MIS0742-1222280411
- By:
- Publication type:
- Article
From the President.
- Published in:
- Access (10300155), 2016, v. 30, n. 4, p. 3
- By:
- Publication type:
- Article
PROBLEMS AT THE REGISTER: RETAIL COLLECTION OF PERSONAL INFORMATION AND THE DATA BREACH.
- Published in:
- Case Western Reserve Law Review, 2015, v. 65, n. 3, p. 861
- By:
- Publication type:
- Article
'E-SPY': DETECTION AND PREDICTION OF WEBSITE ATTACKS.
- Published in:
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 1, p. 315, doi. 10.26483/ijarcs.v9i1.5243
- By:
- Publication type:
- Article
A Proposed Method to Enhance the Strength of Honeypot Through the use of IP-Spoofing Detection Method.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 756
- By:
- Publication type:
- Article
Securing RFID from External Attacks Using Enhanced Security Mechanism.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 1207
- By:
- Publication type:
- Article