Works matching DE "CYBERTERRORISM"
Results: 5000
Uporaba interneta v teroristične namene.
- Published in:
- Journal of Criminal Investigation & Criminology / Revija za Kriminalistiko in Kriminologijo, 2009, v. 60, n. 3, p. 211
- By:
- Publication type:
- Article
National Cyber Governance Awareness Policy and Framework.
- Published in:
- International Journal of Legal Information, 2019, v. 47, n. 2, p. 70, doi. 10.1017/jli.2019.22
- By:
- Publication type:
- Article
Policy Development and Frameworks for Cyber Security in Corporates and Law Firms.
- Published in:
- International Journal of Legal Information, 2018, v. 46, n. 3, p. 137, doi. 10.1017/jli.2018.41
- By:
- Publication type:
- Article
Multi-step Operations Strategic Framework for Ransomware Protection.
- Published in:
- SAM Advanced Management Journal (Society for Advancement of Management), 2020, v. 85, n. 4, p. 16
- By:
- Publication type:
- Article
A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach.
- Published in:
- 2020
- By:
- Publication type:
- journal article
Stopping Cyberattacks: Strategies for Dental Office Data Security.
- Published in:
- Compendium of Continuing Education in Dentistry (15488578), 2021, v. 42, n. 1, p. 11
- By:
- Publication type:
- Article
Ciberseguridad en las redes móviles de telecomunicaciones y su gestión de riesgos.
- Published in:
- Ingeniería y Desarrollo, 2020, v. 38, n. 2, p. 279
- By:
- Publication type:
- Article
Geometrically Reconfigurable, 2D, All‐Organic Photonic Integrated Circuits Made from Two Mechanically and Optically Dissimilar Crystals.
- Published in:
- Advanced Functional Materials, 2021, v. 31, n. 43, p. 1, doi. 10.1002/adfm.202105415
- By:
- Publication type:
- Article
Guest Editorial: Wireless multimedia transmission technology and application.
- Published in:
- Multimedia Systems, 2011, v. 17, n. 4, p. 247, doi. 10.1007/s00530-010-0208-7
- By:
- Publication type:
- Article
Potential cyberterrorism via a multimedia smart phone based on a web 2.0 application via ubiquitous Wi- Fi access points and the corresponding digital forensics.
- Published in:
- Multimedia Systems, 2011, v. 17, n. 4, p. 341, doi. 10.1007/s00530-010-0216-7
- By:
- Publication type:
- Article
Security Implementation in Wireless Sensor Network by RF Signal Obfuscation.
- Published in:
- Wireless Personal Communications, 2019, v. 106, n. 2, p. 805, doi. 10.1007/s11277-019-06191-7
- By:
- Publication type:
- Article
A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It.
- Published in:
- Wireless Personal Communications, 2019, v. 105, n. 1, p. 145, doi. 10.1007/s11277-018-6107-5
- By:
- Publication type:
- Article
Identifying Camouflaging Adversary in MANET Using Cognitive Agents.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 4, p. 3427, doi. 10.1007/s11277-018-5378-1
- By:
- Publication type:
- Article
Development of Smart Grid Testbed with Low-Cost Hardware and Software for Cybersecurity Research and Education.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 3, p. 1357, doi. 10.1007/s11277-018-5766-6
- By:
- Publication type:
- Article
Preventing from Cross-VM Side-Channel Attack Using New Replacement Method.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 3, p. 4827, doi. 10.1007/s11277-017-4753-7
- By:
- Publication type:
- Article
BIFAD: Bio-Inspired Anomaly Based HTTP-Flood Attack Detection.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 1, p. 281, doi. 10.1007/s11277-017-4505-8
- By:
- Publication type:
- Article
Simulation Based Comparative Study of Routing Protocols Under Wormhole Attack in Manet.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 1, p. 47, doi. 10.1007/s11277-017-4150-2
- By:
- Publication type:
- Article
Security Analysis of the Qian et al. Protocol: A Revised Tree-LSHB+ Protocol.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 1, p. 1083, doi. 10.1007/s11277-017-4225-0
- By:
- Publication type:
- Article
A Verifiable (k,n,m)-Threshold Multi-secret Sharing Scheme Based on NTRU Cryptosystem.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 1, p. 1393, doi. 10.1007/s11277-017-4245-9
- By:
- Publication type:
- Article
Privacy Model for Threshold RFID System Based on PUF.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2803, doi. 10.1007/s11277-017-3965-1
- By:
- Publication type:
- Article
Efficient Chosen-Ciphertext Secure Encryption from R-LWE.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2973, doi. 10.1007/s11277-017-3979-8
- By:
- Publication type:
- Article
An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 3185, doi. 10.1007/s11277-017-3990-0
- By:
- Publication type:
- Article
Research on Methods for Improving Robustness of Cascading Failures of Interdependent Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2111, doi. 10.1007/s11277-017-4041-6
- By:
- Publication type:
- Article
Cyber Security Threats to IoT Applications and Service Domains.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 1, p. 169, doi. 10.1007/s11277-017-4434-6
- By:
- Publication type:
- Article
Profile and Back Off Based Distributed NIDS in Cloud.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 2879, doi. 10.1007/s11277-016-3753-3
- By:
- Publication type:
- Article
A Study on Acceptance Procedure Improvement of Web Application by Outsourcing for Mobile Service.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 1, p. 5, doi. 10.1007/s11277-015-3153-0
- By:
- Publication type:
- Article
Efficient Malicious Packet Capture Through Advanced DNS Sinkhole.
- Published in:
- Wireless Personal Communications, 2017, v. 93, n. 1, p. 21, doi. 10.1007/s11277-016-3443-1
- By:
- Publication type:
- Article
A Differential Game Model Between Intrusion Detection System and Attackers for Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 3, p. 1211, doi. 10.1007/s11277-016-3386-6
- By:
- Publication type:
- Article
A Radical Block to Byzantine Attacks in Mobile Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2016, v. 87, n. 2, p. 485, doi. 10.1007/s11277-015-3079-6
- By:
- Publication type:
- Article
Design and Analysis of a Provably Secure Multi-server Authentication Scheme.
- Published in:
- Wireless Personal Communications, 2016, v. 86, n. 3, p. 1095, doi. 10.1007/s11277-015-2975-0
- By:
- Publication type:
- Article
Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 3, p. 2211, doi. 10.1007/s11277-015-2510-3
- By:
- Publication type:
- Article
DNACK: False Data Detection Based on Negative Acknowledgment and Digital Signature on Mobile Ad-hoc Network.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 1, p. 1, doi. 10.1007/s11277-015-2327-0
- By:
- Publication type:
- Article
Collaborative Lightweight Trust Management Scheme for Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 80, n. 1, p. 117, doi. 10.1007/s11277-014-1998-2
- By:
- Publication type:
- Article
A Provably Secure Multi-server Based Authentication Scheme.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 3, p. 1621, doi. 10.1007/s11277-014-1948-z
- By:
- Publication type:
- Article
Markov Chain Based Roaming Schemes for Honeypots.
- Published in:
- Wireless Personal Communications, 2014, v. 78, n. 2, p. 995, doi. 10.1007/s11277-014-1797-9
- By:
- Publication type:
- Article
Secure-AKA: An Efficient AKA Protocol for UMTS Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 78, n. 2, p. 1345, doi. 10.1007/s11277-014-1821-0
- By:
- Publication type:
- Article
Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme.
- Published in:
- Wireless Personal Communications, 2014, v. 78, n. 2, p. 1487, doi. 10.1007/s11277-014-1829-5
- By:
- Publication type:
- Article
Privacy Provisioning in Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 75, n. 2, p. 1115, doi. 10.1007/s11277-013-1411-6
- By:
- Publication type:
- Article
Detection and Traceback of Illegal Users based on Anonymous Network in BitTorrent Environment.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 2, p. 319, doi. 10.1007/s11277-013-1240-7
- By:
- Publication type:
- Article
An Enhanced Hierarchical Key Management Scheme for MANETs.
- Published in:
- Wireless Personal Communications, 2013, v. 72, n. 4, p. 1783, doi. 10.1007/s11277-012-0910-1
- By:
- Publication type:
- Article
Robust Smart Card Authentication Scheme for Multi-server Architecture.
- Published in:
- Wireless Personal Communications, 2013, v. 72, n. 1, p. 729, doi. 10.1007/s11277-013-1039-6
- By:
- Publication type:
- Article
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme.
- Published in:
- Wireless Personal Communications, 2013, v. 72, n. 1, p. 245, doi. 10.1007/s11277-013-1011-5
- By:
- Publication type:
- Article
A Security Differential Game Model for Sensor Networks in Context of the Internet of Things.
- Published in:
- Wireless Personal Communications, 2013, v. 72, n. 1, p. 375, doi. 10.1007/s11277-013-1018-y
- By:
- Publication type:
- Article
Protecting Satellite Systems from Disassociation DoS Attacks.
- Published in:
- Wireless Personal Communications, 2013, v. 69, n. 2, p. 623, doi. 10.1007/s11277-012-0593-7
- By:
- Publication type:
- Article
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes.
- Published in:
- Wireless Personal Communications, 2012, v. 66, n. 3, p. 559, doi. 10.1007/s11277-012-0734-z
- By:
- Publication type:
- Article
Questioning the Feasibility of UMTS-GSM Interworking Attacks.
- Published in:
- Wireless Personal Communications, 2012, v. 65, n. 1, p. 157, doi. 10.1007/s11277-011-0233-7
- By:
- Publication type:
- Article
A Fair and Secure Cluster Formation Process for Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2011, v. 56, n. 3, p. 625, doi. 10.1007/s11277-010-9994-7
- By:
- Publication type:
- Article
DIGITAL NOMADS AND EMERGING CYBER THREATS.
- Published in:
- Security Spectrum: Journal of Advanced Security Research, 2024, p. 185, doi. 10.15158/485r-2b15
- By:
- Publication type:
- Article
Online security braces for quantum revolution.
- Published in:
- Nature, 2015, v. 525, n. 7568, p. 167, doi. 10.1038/525167a
- By:
- Publication type:
- Article
Cybercrime fighters target human error.
- Published in:
- Nature, 2015, v. 518, n. 7539, p. 282, doi. 10.1038/518282a
- By:
- Publication type:
- Article