Works matching Defense in depth (Computer security)


Results: 36
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14

    FINITE TWO LAYERED QUEUEING SYSTEMS.

    Published in:
    Probability in the Engineering & Informational Sciences, 2016, v. 30, n. 3, p. 492, doi. 10.1017/S0269964816000139
    By:
    • PEREL, EFRAT;
    • YECHIALI, URI
    Publication type:
    Article
    15

    Towards a Secure IPv6 Autoconfiguration.

    Published in:
    Information Security Journal: A Global Perspective, 2020, v. 29, n. 1, p. 14, doi. 10.1080/19393555.2020.1716117
    By:
    • Shah, Junaid Latief;
    • Bhat, Heena Farooq
    Publication type:
    Article
    16
    17
    18
    19
    20
    21

    About Concept of Big Safety.

    Published in:
    Reliability: Theory & Applications, 2021, v. 16, n. 1, p. 13
    By:
    • Kharchenko, V. S.;
    • Yastrebenetsky, M. A.
    Publication type:
    Article
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33

    C4ISR via Dark Webs.

    Published in:
    Air & Space Power Journal, 2016, v. 30, n. 4, p. 69
    By:
    • Bingman, Kyle L.
    Publication type:
    Article
    34
    35
    36