Works matching Confidentiality, integrity and availability (CIA triad)
1
- Mathematics (2227-7390), 2023, v. 11, n. 11, p. 2554, doi. 10.3390/math11112554
- Attaallah, Abdulaziz;
- al-Sulbi, Khalil;
- Alasiry, Areej;
- Marzougui, Mehrez;
- Ansar, Syed Anas;
- Agrawal, Alka;
- Ansari, Md Tarique Jamal;
- Khan, Raees Ahmad
- Article
2
- Future Internet, 2025, v. 17, n. 5, p. 202, doi. 10.3390/fi17050202
- Geloczi, Emiliia;
- Klement, Felix;
- Struck, Patrick;
- Katzenbeisser, Stefan
- Article
3
- Artificial Intelligence Review, 2022, v. 55, n. 5, p. 3569, doi. 10.1007/s10462-021-10098-w
- Qammar, Attia;
- Ding, Jianguo;
- Ning, Huansheng
- Article
4
- Journal of Research & Practice in Information Technology, 2014, v. 46, n. 1, p. 19
- Kumar, Rakesh;
- Kaur, Gurvinder
- Article
5
- Computers (2073-431X), 2025, v. 14, n. 2, p. 49, doi. 10.3390/computers14020049
- Lallie, Harjinder Singh;
- Thompson, Andrew;
- Titis, Elzbieta;
- Stephens, Paul
- Article
6
- Journal of Information System Security, 2014, v. 10, n. 3, p. 21
- Samonas, Spyridon;
- Coss, David
- Article
7
- Telecom, 2024, v. 5, n. 3, p. 609, doi. 10.3390/telecom5030031
- Marchang, Jims;
- McDonald, Jade;
- Keishing, Solan;
- Zoughalian, Kavyan;
- Mawanda, Raymond;
- Delhon-Bugard, Corentin;
- Bouillet, Nicolas;
- Sanders, Ben
- Article
8
- Electronics (2079-9292), 2022, v. 11, n. 16, p. 2560, doi. 10.3390/electronics11162560
- Bhattacharjya, Aniruddha;
- Kozdrój, Kamil;
- Bazydło, Grzegorz;
- Wisniewski, Remigiusz
- Article
9
- Sensors (14248220), 2025, v. 25, n. 3, p. 731, doi. 10.3390/s25030731
- Abushark, Yoosef B.;
- Hassan, Shabbir;
- Khan, Asif Irshad
- Article
10
- Sensors (14248220), 2021, v. 21, n. 18, p. 6018, doi. 10.3390/s21186018
- Kebande, Victor R.;
- Awaysheh, Feras M.;
- Ikuesan, Richard A.;
- Alawadi, Sadi A.;
- Alshehri, Mohammad Dahman
- Article
11
- Future Internet, 2025, v. 17, n. 3, p. 113, doi. 10.3390/fi17030113
- Jones, Nicholas;
- Whaiduzzaman, Md;
- Jan, Tony;
- Adel, Amr;
- Alazab, Ammar;
- Alkreisat, Afnan
- Article
12
- Information Security Journal: A Global Perspective, 2024, v. 33, n. 4, p. 425, doi. 10.1080/19393555.2024.2332955
- Maurya, Sambhrant;
- Handa, Anand;
- Kumar, Nitesh;
- Shukla, Sandeep K.
- Article
13
- Frontiers in Neuroscience, 2017, p. 1, doi. 10.3389/fnins.2017.00605
- Article
14
- Cryptologia, 2018, v. 42, n. 4, p. 337, doi. 10.1080/01611194.2017.1362063
- Sherman, Alan T.;
- DeLatte, David;
- Neary, Michael;
- Oliva, Linda;
- Phatak, Dhananjay;
- Scheponik, Travis;
- Herman, Geoffrey L.;
- Thompson, Julia
- Article
15
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2024, v. 28, n. 9/10, p. 6839, doi. 10.1007/s00500-023-09580-0
- Manikandan, V.;
- Raj, Vinoth;
- Janakiraman, Siva;
- Sivaraman, R.;
- Amirtharajan, Rengarajan
- Article
16
- Journal of Scientific Research, 2022, v. 14, n. 2, p. 471, doi. 10.3329/jsr.v14i2.55669
- Pal, S. K.;
- Datta, B.;
- Karmakar, A.
- Article
17
- Information Systems Frontiers, 2016, v. 18, n. 6, p. 1205, doi. 10.1007/s10796-015-9562-5
- Zafar, Humayun;
- Ko, Myung;
- Osei-Bryson, Kweku-Muata
- Article
18
- Network (2673-8732), 2025, v. 5, n. 1, p. 8, doi. 10.3390/network5010008
- Pokhrel, Chitran;
- Ghimire, Roshani;
- Dawadi, Babu R.;
- Manzoni, Pietro
- Article
19
- Applied Sciences (2076-3417), 2023, v. 13, n. 19, p. 10950, doi. 10.3390/app131910950
- Keith, Alexander;
- Sangarapillai, Thanigajan;
- Almehmadi, Abdulaziz;
- El-Khatib, Khalil
- Article
20
- ITNOW, 2023, v. 65, n. 1, p. 12, doi. 10.1093/combul/bwad006
- Article