Works matching Internet security
Results: 5000
A path forward: improving Internet routing security by enabling zones of trust.
- Published in:
- Journal of Cybersecurity, 2024, v. 10, n. 1, p. 1, doi. 10.1093/cybsec/tyae023
- By:
- Publication type:
- Article
基于数字签名的车联网安全体系研究.
- Published in:
- Journal of Computer Engineering & Applications, 2022, v. 58, n. 9, p. 116, doi. 10.3778/j.issn.1002-8331.2010-0131
- By:
- Publication type:
- Article
Comprehensive Analysis of Internet Security Protocols and Standards for Enhanced Network Safety.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 332, doi. 10.54216/JCIM.150126
- By:
- Publication type:
- Article
A Gröbner-Shirshov Algorithm for Applications in Internet Security.
- Published in:
- Southeast Asian Bulletin of Mathematics, 2012, v. 36, n. 1, p. 87
- By:
- Publication type:
- Article
Decentralized Machine Learning Framework for the Internet of Things: Enhancing Security, Privacy, and Efficiency in Cloud-Integrated Environments.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 21, p. 4185, doi. 10.3390/electronics13214185
- By:
- Publication type:
- Article
How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 2, p. 305, doi. 10.1007/s10207-022-00637-z
- By:
- Publication type:
- Article
Cross-cultural validation and psychometric testing of the Slovenian version of the Croatian Behavioral-Cognitive Internet Security Questionnaire.
- Published in:
- Electrotechnical Review / Elektrotehniski Vestnik, 2022, v. 89, n. 3, p. 103
- By:
- Publication type:
- Article
Interdependent Defense Games with Applications to Internet Security at the Level of Autonomous Systems.
- Published in:
- Games (20734336), 2017, v. 8, n. 1, p. 13, doi. 10.3390/g8010013
- By:
- Publication type:
- Article
Internet security applications of the Munn rings.
- Published in:
- Semigroup Forum, 2010, v. 81, n. 1, p. 162, doi. 10.1007/s00233-010-9242-1
- By:
- Publication type:
- Article
Multi-step attack threat recognition algorithm based on attribute association in internet of things security.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 5, p. 4275, doi. 10.1007/s11276-022-02940-y
- By:
- Publication type:
- Article
Hierarchically defining Internet of Things security: From CIA to CACA.
- Published in:
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 1, p. N.PAG, doi. 10.1177/1550147719899374
- By:
- Publication type:
- Article
CONSTRUCTION AND ANALYSIS OF INTELLIGENT ANALYSIS AND DISPOSAL MODEL FOR INTERNET SECURITY EVENTS IN POWER SYSTEM.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 4, p. 2656, doi. 10.12694/scpe.v25i4.2971
- By:
- Publication type:
- Article
A Review on the Security of the Internet of Things: Challenges and Solutions.
- Published in:
- Wireless Personal Communications, 2021, v. 119, n. 3, p. 2603, doi. 10.1007/s11277-021-08348-9
- By:
- Publication type:
- Article
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review.
- Published in:
- Journal of Big Data, 2023, v. 10, n. 1, p. 1, doi. 10.1186/s40537-023-00805-5
- By:
- Publication type:
- Article
INTERNET SECURITY FEELING OF STUDENTS STUDY OF PAYAME NOOR UNIVERSITY.
- Published in:
- Trakia Journal of Sciences, 2016, v. 14, n. 3, p. 230, doi. 10.15547/tjs.2016.03.006
- By:
- Publication type:
- Article
A LONGITUDINAL ANALYSIS OF UNDERGRADUATE STUDENTS' INTERNET SECURITY PERCEPTIONS AND PURCHASING BEHAVIOR.
- Published in:
- Journal of Business & Behavioral Sciences, 2017, v. 29, n. 1, p. 57
- By:
- Publication type:
- Article
Compliant and secure websites for the Greek Libraries Network of the National Library of Greece and each library-member of this Network in consideration of internet security and GDPR.
- Published in:
- Qualitative & Quantitative Methods in Libraries, 2020, v. 9, n. 3, p. 377
- By:
- Publication type:
- Article
Text and Data Mining for the National Library of Greece in consideration of Internet Security and GDPR.
- Published in:
- Qualitative & Quantitative Methods in Libraries, 2020, v. 9, n. 3, p. 441
- By:
- Publication type:
- Article
A compliant and secure IT infrastructure for the National Library of Greece in consideration of internet security and GDPR.
- Published in:
- Qualitative & Quantitative Methods in Libraries, 2020, v. 9, n. 2, p. 219
- By:
- Publication type:
- Article
A Security Framework for the Internet of Things in the Future Internet Architecture.
- Published in:
- Future Internet, 2017, v. 9, n. 3, p. 27, doi. 10.3390/fi9030027
- By:
- Publication type:
- Article
Security and uses of the Internet.
- Published in:
- Serials Librarian, 1996, v. 28, n. 1-2, p. 105, doi. 10.1300/J123v28n01_11
- By:
- Publication type:
- Article
Internet of Things Security Detection Technology Based on Grey Association Decision Algorithm.
- Published in:
- Complexity, 2021, p. 1, doi. 10.1155/2021/7504806
- By:
- Publication type:
- Article
ENHANCING NATIONAL SECURITY THROUGH INTERNET BROADCASTING: BENEFITS AND LIMITATIONS.
- Published in:
- Skhid, 2019, v. 163, n. 5, p. 41, doi. 10.21847/1728-9343.2019.5(163).182481
- By:
- Publication type:
- Article
Can Cyberloafing and Internet Addiction Affect Organizational Information Security?
- Published in:
- CyberPsychology, Behavior & Social Networking, 2017, v. 20, n. 9, p. 567, doi. 10.1089/cyber.2017.0239
- By:
- Publication type:
- Article
Information Security Transmission Technology in Internet of Things Control System.
- Published in:
- International Journal of Online Engineering, 2018, v. 14, n. 6, p. 177, doi. 10.3991/ijoe.v14i06.8707
- By:
- Publication type:
- Article
Reliability Evaluation of Clean Energy Internet Information Security Based on Statistical Learning Methods.
- Published in:
- Chemistry & Technology of Fuels & Oils, 2024, v. 59, n. 6, p. 1211, doi. 10.1007/s10553-024-01637-6
- By:
- Publication type:
- Article
A Key Business Node Identification Model for Internet of Things Security.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/6654283
- By:
- Publication type:
- Article
A Key Business Node Identification Model for Internet of Things Security.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/6654283
- By:
- Publication type:
- Article
Assessing risks and threats with layered approach to Internet of Things security.
- Published in:
- Measurement & Control (0020-2940), 2019, v. 52, n. 5/6, p. 338, doi. 10.1177/0020294019837991
- By:
- Publication type:
- Article
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges.
- Published in:
- Complexity, 2020, p. 1, doi. 10.1155/2020/6619498
- By:
- Publication type:
- Article
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges.
- Published in:
- Complexity, 2020, p. 1, doi. 10.1155/2020/6619498
- By:
- Publication type:
- Article
Spy interests wrecking Internet security, Congress told.
- Published in:
- Nature, 1994, v. 368, n. 6471, p. 486, doi. 10.1038/368486b0
- By:
- Publication type:
- Article
Reviewing effectivity in security approaches towards strengthening internet architecture.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2019, v. 9, n. 5, p. 3862, doi. 10.11591/ijece.v9i5.pp3862-3871
- By:
- Publication type:
- Article
Blockchain Technology for Information Security of the Energy Internet: Fundamentals, Features, Strategy and Application.
- Published in:
- Energies (19961073), 2020, v. 13, n. 4, p. 881, doi. 10.3390/en13040881
- By:
- Publication type:
- Article
Prevention of Business Risks of Internet Information Security Platforms Based on Blockchain Technology.
- Published in:
- Computational Intelligence & Neuroscience, 2022, p. 1, doi. 10.1155/2022/7671810
- By:
- Publication type:
- Article
An Industrial Internet Security Assessment Model Based on a Selectable Confidence Rule Base.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 23, p. 7577, doi. 10.3390/s24237577
- By:
- Publication type:
- Article
Research of a new security mechanism on energy internet.
- Published in:
- Indian Journal of Power & River Valley Development, 2021, v. 71, n. 7/8, p. 123
- By:
- Publication type:
- Article
Advanced Security Policies to protect the Internet resources against the cyber attacks.
- Published in:
- International Journal of Advanced Research in Computer Science, 2015, v. 6, n. 6, p. 47
- By:
- Publication type:
- Article
A key log Mining Technique to analyze web usage access pattern in an Organization for Internet access Security.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 500
- By:
- Publication type:
- Article
Verification of an Evolving Security Scheme in the Internet of Vehicles.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 21, p. 4438, doi. 10.3390/electronics12214438
- By:
- Publication type:
- Article
In-Vehicle Networking/Autonomous Vehicle Security for Internet of Things/Vehicles.
- Published in:
- 2021
- By:
- Publication type:
- Editorial
Towards Development of Machine Learning Framework for Enhancing Security in Internet of Things.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4477507
- By:
- Publication type:
- Article
Mobile Internet Information Security Analysis and Countermeasures.
- Published in:
- Telkomnika, 2016, v. 14, n. 3A, p. 333, doi. 10.12928/TELKOMNIKA.v14i3A.4417
- By:
- Publication type:
- Article
The Study of Content Security for Mobile Internet.
- Published in:
- Wireless Personal Communications, 2012, v. 66, n. 3, p. 523, doi. 10.1007/s11277-012-0738-8
- By:
- Publication type:
- Article
INTERNET SECURITY AND PRIVACY THREATS, AS PERCEIVED BY AMERICAN AND INTERNATIONAL BUSINESS STUDENTS.
- Published in:
- Global Journal of Business Disciplines, 2017, v. 1, n. 1, p. 36, doi. 10.47177/gjbd.01.01.2017.036
- By:
- Publication type:
- Article
Internet of Things: Security, Privacy and Governance.
- Published in:
- ISSA Journal, 2016, v. 14, n. 8, p. 27
- By:
- Publication type:
- Article
Enhanced Internet of Things Security Situation Assessment Model with Feature Optimization and Improved SSA-LightGBM.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 16, p. 3617, doi. 10.3390/math11163617
- By:
- Publication type:
- Article
A Survey on Energy-Aware Security Mechanisms for the Internet of Things.
- Published in:
- Future Internet, 2024, v. 16, n. 4, p. 128, doi. 10.3390/fi16040128
- By:
- Publication type:
- Article
Fine-Grained Support of Security Services for Resource Constrained Internet of Things.
- Published in:
- International Journal of Distributed Sensor Networks, 2016, p. 1, doi. 10.1155/2016/7824686
- By:
- Publication type:
- Article
Retracted: Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice