Works matching DE "COMPUTER crime prevention"
Results: 617
Threat and Challenges of Cyber-Crime and the Response.
- Published in:
- SAM Advanced Management Journal (Society for Advancement of Management), 2016, v. 81, n. 2, p. 4
- By:
- Publication type:
- Article
From the Editor-in-Chief.
- Published in:
- SAM Advanced Management Journal (Society for Advancement of Management), 2016, v. 81, n. 2, p. 1
- By:
- Publication type:
- Article
HIoTPOT: Surveillance on IoT Devices against Recent Threats.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 2, p. 1179, doi. 10.1007/s11277-018-5307-3
- By:
- Publication type:
- Article
A novel attributes anonymity scheme in continuous query.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 2, p. 943, doi. 10.1007/s11277-018-5735-0
- By:
- Publication type:
- Article
A Novel Face Liveness Detection Algorithm with Multiple Liveness Indicators.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 4, p. 1677, doi. 10.1007/s11277-018-5661-1
- By:
- Publication type:
- Article
A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme.
- Published in:
- Wireless Personal Communications, 2013, v. 68, n. 2, p. 361, doi. 10.1007/s11277-011-0456-7
- By:
- Publication type:
- Article
Sham journals scam authors.
- Published in:
- Nature, 2013, v. 495, n. 7442, p. 421, doi. 10.1038/495421a
- By:
- Publication type:
- Article
Industrial Control Systems: Cyber Policies and Strategies.
- Published in:
- Journal: American Water Works Association, 2020, v. 112, n. 6, p. 48, doi. 10.1002/awwa.1518
- By:
- Publication type:
- Article
Tackle Cybersecurity and AWIA Compliance With AWWA's New Cybersecurity Risk Management Tool.
- Published in:
- Journal: American Water Works Association, 2020, v. 112, n. 3, p. 70, doi. 10.1002/awwa.1466
- By:
- Publication type:
- Article
Secure Storage of Data using Hybrid Cryptography.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 1802
- By:
- Publication type:
- Article
Cyber Hygiene in Higher Educational Institutes.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part1, p. 31
- By:
- Publication type:
- Article
Mechanism to Handle Mobile Devices in Cyber Security Investigations.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 524
- By:
- Publication type:
- Article
Exploration of the Impact of Cybersecurity Awareness on Small and Medium Enterprises (SMEs) in Wales Using Intelligent Software to Combat Cybercrime.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 174, doi. 10.3390/computers11120174
- By:
- Publication type:
- Article
Machine Learning Cybersecurity Adoption in Small and Medium Enterprises in Developed Countries.
- Published in:
- Computers (2073-431X), 2021, v. 10, n. 11, p. 150, doi. 10.3390/computers10110150
- By:
- Publication type:
- Article
Spielend sicher: Gamification als Schlüssel zur nachhaltigen Cybersicherheit.
- Published in:
- IM + io, 2023, n. 3, p. 54
- By:
- Publication type:
- Article
Gefahr erkannt, Recht gebannt: Europas Kampf gegen Cyberbedrohungen.
- Published in:
- IM + io, 2023, n. 3, p. 50
- By:
- Publication type:
- Article
The Behavioral Intelligence Paradigm Shift in Fighting Cyber-Crime: Counter-Measures, Innovation, and Regulation Issues.
- Published in:
- International Journal on Criminology, 2014, v. 2, n. 1, p. 11
- By:
- Publication type:
- Article
Managing Cybercrime Risk.
- Published in:
- PM World Journal, 2015, v. 4, n. 3, p. 1
- By:
- Publication type:
- Article
CYBERSECURITY CHALLENGES AND SOLUTIONS FOR CRITICAL INFRASTRUCTURE PROTECTION.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2024, v. 30, n. 1, p. 58, doi. 10.18372/2225-5036.30.18604
- By:
- Publication type:
- Article
СТАЦІОНАРНІ СИСТЕМИ ВИЯВЛЕННЯ І ПОПЕРЕДЖЕННЯ КІБЕРАТАК В ІНТЕРЕСАХ КІБЕРЗАХИСТУ ТА КІБЕРКОНТРРОЗВІДКИ (НА ПРИКЛАДІ США)
- Published in:
- Ukrainian Scientific Journal of Information Security, 2019, v. 25, n. 1, p. 5, doi. 10.18372/2225-5036.25.13664
- By:
- Publication type:
- Article
РАЗРАБОТКА СТРУКТУРНЫХ МОДЕЛЕЙ УСТОЙЧИВОСТИ ИНВЕСТИЦИОННЫХ ПРОЕКТОВ В КИБЕРБЕЗОПАСНОСТИ
- Published in:
- Ukrainian Scientific Journal of Information Security, 2018, v. 24, n. 3, p. 181, doi. 10.18372/2225-5036.24.13429
- By:
- Publication type:
- Article
Protecting your veterinary practice from cyber threats.
- Published in:
- Veterinary Ireland Journal, 2022, v. 12, n. 9, p. 504
- Publication type:
- Article
A Retrospective Analysis of Maritime Cyber Security Incidents.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2021, v. 15, n. 3, p. 519, doi. 10.12716/1001.15.03.04
- By:
- Publication type:
- Article
An Operational Approach to Maritime Cyber Resilience.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2021, v. 15, n. 1, p. 27, doi. 10.12716/1001.15.01.01
- By:
- Publication type:
- Article
Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree.
- Published in:
- Journal of Cloud Computing (2192-113X), 2023, v. 12, n. 1, p. 1, doi. 10.1186/s13677-023-00517-4
- By:
- Publication type:
- Article
Evaluating MAPSec by marking attack graphs.
- Published in:
- Wireless Networks (10220038), 2009, v. 15, n. 8, p. 1042, doi. 10.1007/s11276-008-0101-x
- By:
- Publication type:
- Article
Cyber Crime Prevention and Role of Libraries.
- Published in:
- International Journal of Information Dissemination & Technology, 2013, v. 3, n. 3, p. 222
- By:
- Publication type:
- Article
Cybercrime is (often) boring: Infrastructure and alienation in a deviant subculture.
- Published in:
- British Journal of Criminology, 2021, v. 61, n. 5, p. 1407, doi. 10.1093/bjc/azab026
- By:
- Publication type:
- Article
WE KNOW WHERE YOU ARE, WHAT YOU ARE DOING AND WE WILL CATCH YOU: Testing Deterrence Theory in Digital Drug Markets.
- Published in:
- British Journal of Criminology, 2018, v. 58, n. 2, p. 414, doi. 10.1093/bjc/azx021
- By:
- Publication type:
- Article
Optimizing Bug Bounty Programs for Efficient Malware-Related Vulnerability Discovery.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 4, p. 291, doi. 10.14569/ijacsa.2024.0150430
- By:
- Publication type:
- Article
A multi-objective framework for the identification and optimisation of factors affecting cybersecurity in the Industry 4.0 supply chain.
- Published in:
- International Journal of Production Research, 2023, v. 61, n. 15, p. 5266, doi. 10.1080/00207543.2022.2100840
- By:
- Publication type:
- Article
A linear model for optimal cybersecurity investment in Industry 4.0 supply chains.
- Published in:
- International Journal of Production Research, 2022, v. 60, n. 4, p. 1368, doi. 10.1080/00207543.2020.1856442
- By:
- Publication type:
- Article
New challenges in supply chain management: cybersecurity across the supply chain.
- Published in:
- International Journal of Production Research, 2022, v. 60, n. 1, p. 162, doi. 10.1080/00207543.2021.1984606
- By:
- Publication type:
- Article
Big Data and Counterintelligence in Western Countries.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2019, v. 32, n. 3, p. 433, doi. 10.1080/08850607.2019.1605804
- By:
- Publication type:
- Article
A Systematic Review of Cybersecurity Risks in Higher Education.
- Published in:
- Future Internet, 2021, v. 13, n. 2, p. 39, doi. 10.3390/fi13020039
- By:
- Publication type:
- Article
Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management.
- Published in:
- Future Internet, 2020, v. 12, n. 9, p. 157, doi. 10.3390/fi12090157
- By:
- Publication type:
- Article
Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives.
- Published in:
- Future Internet, 2020, v. 12, n. 4, p. 62, doi. 10.3390/fi12040062
- By:
- Publication type:
- Article
Cyber Security Threat Modeling for Supply Chain Organizational Environments.
- Published in:
- Future Internet, 2019, v. 11, n. 3, p. 63, doi. 10.3390/fi11030063
- By:
- Publication type:
- Article
A New LightweightWatchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs.
- Published in:
- Future Internet, 2018, v. 10, n. 1, p. 1, doi. 10.3390/fi10010001
- By:
- Publication type:
- Article
SCADA SECURITY IN THE CONTEXT OF CORPORATE NETWORK INTEGRATION.
- Published in:
- Annals (Constanţa Maritime University), 2011, v. 12, n. 15, p. 159
- By:
- Publication type:
- Article
MODELLING OF THE INVESTIGATION OF CYBERCRIME.
- Published in:
- Science & Military Journal, 2014, v. 9, n. 1, p. 63
- By:
- Publication type:
- Article
Online Social Snapshots of a Generic Facebook Session Based on Digital Insight Data for a Secure Future IT Environment.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 2, p. 546, doi. 10.3390/sym7020546
- By:
- Publication type:
- Article
CYBER SECURITY AND ITS REALITY IN BANGLADESH: AN ANALYSIS OF EXISTING LEGAL FRAMEWORKS.
- Published in:
- Journal of Information System Security, 2021, v. 17, n. 3, p. 145
- By:
- Publication type:
- Article
RANSOMWARE AND ITS IMPLICATIONS: A REPORT.
- Published in:
- Journal of Information System Security, 2019, v. 15, n. 1, p. 61
- By:
- Publication type:
- Article
THE 17<sup>TH</sup> GLOBAL INFORMATION SECURITY SURVEY.
- Published in:
- Journal of Information System Security, 2014, v. 10, n. 1, p. 79
- By:
- Publication type:
- Article
Managing Corporate Computer Crime and the Insider Threat: the Role of Cognitive Distortion Theory.
- Published in:
- Journal of Information System Security, 2012, v. 8, n. 2, p. 19
- By:
- Publication type:
- Article
Editorial.
- Published in:
- Journal of Information System Security, 2012, v. 8, n. 2, p. 1
- By:
- Publication type:
- Article
Threats To Information Security Revisited.
- Published in:
- Journal of Information System Security, 2012, v. 8, n. 1, p. 21
- By:
- Publication type:
- Article
Information System Security: Self-Efficacy and Implementation Effectiveness.
- Published in:
- Journal of Information System Security, 2012, v. 8, n. 1, p. 3
- By:
- Publication type:
- Article
EXPLORING THE NEXUS OF CYBERSECURITY LEADERSHIP, HUMAN FACTORS, EMOTIONAL INTELLIGENCE, INNOVATIVE WORK BEHAVIOR, AND CRITICAL LEADERSHIP TRAITS.
- Published in:
- Buletin Stiintific, 2023, v. 28, n. 2, p. 162, doi. 10.2478/bsaft-2023-0016
- By:
- Publication type:
- Article