Works matching DE "COMPUTER security"
Results: 5000
The Extraordinary Extension of the Video Privacy Protection Act: WHY THE "ORDINARY COURSE OF BUSINESS" OF AN ANALOG ERA IS ANYTHING BUT ORDINARY IN THE DIGITAL WORLD.
- Published in:
- Brooklyn Law Review, 2025, v. 90, n. 2, p. 553
- By:
- Publication type:
- Article
Summary of Previous Papers in Expert Systems Review.
- Published in:
- Intelligent Systems in Accounting, Finance & Management, 1992, v. 1, n. 1, p. 3, doi. 10.1002/j.1099-1174.1992.tb00002.x
- By:
- Publication type:
- Article
Permutation Steganography for Polygonal Meshes Based on Coding Tree.
- Published in:
- International Journal of Virtual Reality, 2010, v. 9, n. 4, p. 55, doi. 10.20870/ijvr.2010.9.4.2790
- By:
- Publication type:
- Article
Discretionary Access Controls for a Collaborative Virtual Environment.
- Published in:
- International Journal of Virtual Reality, 2010, v. 9, n. 1, p. 61, doi. 10.20870/ijvr.2010.9.1.2763
- By:
- Publication type:
- Article
First Strike.
- Published in:
- World Affairs, 2013, v. 175, n. 5, p. 33
- By:
- Publication type:
- Article
Security Risks and Protection in Online Learning: A Survey.
- Published in:
- International Review of Research in Open & Distance Learning, 2013, v. 14, n. 5, p. 108, doi. 10.19173/irrodl.v14i5.1632
- By:
- Publication type:
- Article
Editorial.
- Published in:
- International Review of Research in Open & Distance Learning, 2013, v. 14, n. 5, p. i
- By:
- Publication type:
- Article
LOGIC CIRCUITS AND THE QUALITY OF LIFE.
- Published in:
- Technology Teacher, 2006, v. 65, n. 5, p. 12
- By:
- Publication type:
- Article
Az adatbázisok jogi védelme az Európai Unióban.
- Published in:
- Library Review / Konyvtari Figyelo, 2010, v. 20, n. 2, p. 241
- By:
- Publication type:
- Article
Responsive Regulation and the Reporting of Information Security Incidents--Taiwan and China.
- Published in:
- Issues & Studies, 2012, v. 48, n. 1, p. 85
- By:
- Publication type:
- Article
On International Cooperation in Nuclear and Cyber Security.
- Published in:
- Peace Review, 2016, v. 28, n. 2, p. 220, doi. 10.1080/10402659.2016.1166760
- By:
- Publication type:
- Article
UNIVERSALLY COMPOSABLE BLIND SIGNATURE FUNCTIONALITY.
- Published in:
- International Journal of Information Technology & Decision Making, 2004, v. 3, n. 4, p. 673, doi. 10.1142/S0219622004001318
- By:
- Publication type:
- Article
DECISION MAKING FOR NETWORK HEALTH ASSESSMENT IN AN INTELLIGENT INTRUSION DETECTION SYSTEM ARCHITECTURE.
- Published in:
- International Journal of Information Technology & Decision Making, 2004, v. 3, n. 2, p. 281, doi. 10.1142/S0219622004001057
- By:
- Publication type:
- Article
Quantum Physics Helps Secure Data.
- Published in:
- Innovation, 2006, v. 6, n. 1, p. 72
- By:
- Publication type:
- Article
Reharnessing IT Potential.
- Published in:
- Innovation, 2005, v. 5, n. 3, p. 74
- By:
- Publication type:
- Article
Making the Mobile Internet Secure.
- Published in:
- Innovation, 2004, v. 4, n. 1, p. 48
- By:
- Publication type:
- Article
A model-driven approach for vulnerability evaluation of modern physical protection systems.
- Published in:
- Software & Systems Modeling, 2019, v. 18, n. 1, p. 523, doi. 10.1007/s10270-016-0572-7
- By:
- Publication type:
- Article
Security modeling for service-oriented systems using security pattern refinement approach.
- Published in:
- Software & Systems Modeling, 2014, v. 13, n. 2, p. 549, doi. 10.1007/s10270-012-0268-6
- By:
- Publication type:
- Article
From misuse cases to mal-activity diagrams: bridging the gap between functional security analysis and design.
- Published in:
- Software & Systems Modeling, 2014, v. 13, n. 1, p. 173, doi. 10.1007/s10270-012-0240-5
- By:
- Publication type:
- Article
A transformation contract to generate aspects from access control policies.
- Published in:
- Software & Systems Modeling, 2011, v. 10, n. 3, p. 395, doi. 10.1007/s10270-010-0156-x
- By:
- Publication type:
- Article
Challenges and Best Practices in Information Security Management.
- Published in:
- MIS Quarterly Executive, 2018, v. 17, n. 3, p. 237
- By:
- Publication type:
- Article
Addressing Key Challenges to Making Enterprise Blockchain Applications a Reality.
- Published in:
- MIS Quarterly Executive, 2018, v. 17, n. 3, p. 201
- By:
- Publication type:
- Article
A Molecular Secret Sharing Scheme.
- Published in:
- 2019
- By:
- Publication type:
- Country Report
Image encryption using Queen.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 4, p. 10551, doi. 10.1007/s11042-023-15674-6
- By:
- Publication type:
- Article
An Empirical Study of Two Approaches to Sequence Learning for Anomaly Detection.
- Published in:
- Machine Learning, 2003, v. 51, n. 1, p. 73, doi. 10.1023/A:1021830128811
- By:
- Publication type:
- Article
Intellectual Property Rights as Primary Security.
- Published in:
- International Insolvency Review, 1998, v. 7, n. 3, p. 193, doi. 10.1002/iir.3940070304
- By:
- Publication type:
- Article
Isn't that IT's job?
- Published in:
- Loss Prevention Bulletin, 2012, n. 224, p. 5
- By:
- Publication type:
- Article
A NEW BLIND ATTACK PROCEDURE FOR DCT-BASED IMAGE ENCRYPTION WITH SPECTRUM LEARNING.
- Published in:
- International Journal of Image & Graphics, 2007, v. 7, n. 3, p. 481, doi. 10.1142/S0219467807002787
- By:
- Publication type:
- Article
MODEL-BASED METHODS FOR STEGANOGRAPHY AND STEGANALYSIS.
- Published in:
- International Journal of Image & Graphics, 2005, v. 5, n. 1, p. 167, doi. 10.1142/S0219467805001719
- By:
- Publication type:
- Article
Editorial.
- Published in:
- 2003
- By:
- Publication type:
- Editorial
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange.
- Published in:
- Fluctuation & Noise Letters, 2016, v. 15, n. 1, p. -1, doi. 10.1142/S0219477516500085
- By:
- Publication type:
- Article
RESPONSE TO KLAPPENECKER'S REMARK ON A NON-BREAKABLE DATA ENCRYPTION SCHEME BY KISH AND SETHURAMAN.
- Published in:
- Fluctuation & Noise Letters, 2004, v. 4, n. 4, p. C27, doi. 10.1142/S0219477504002336
- By:
- Publication type:
- Article
NON-BREAKABLE DATA ENCRYPTION WITH CLASSICAL INFORMATION.
- Published in:
- Fluctuation & Noise Letters, 2004, v. 4, n. 2, p. C1, doi. 10.1142/S0219477504001987
- By:
- Publication type:
- Article
Obstacles to adopting access grid technology in UK primary care research networks.
- Published in:
- Informatics in Primary Care, 2008, v. 16, n. 1, p. 59
- By:
- Publication type:
- Article
Guidelines for computer security in general practice.
- Published in:
- Informatics in Primary Care, 2007, v. 15, n. 2, p. 73
- By:
- Publication type:
- Article
Potential impacts of patient access to their electronic care records.
- Published in:
- Informatics in Primary Care, 2005, v. 13, n. 1, p. 55
- By:
- Publication type:
- Article
Identifying and establishing consensus on the most important safety features of GP computer systems:e-Delphi study.
- Published in:
- Informatics in Primary Care, 2005, v. 13, n. 1, p. 3
- By:
- Publication type:
- Article
Global Cybersecurity, Surveillance, and Privacy: The Obama Administration's Conflicted Legacy.
- Published in:
- Indiana Journal of Global Legal Studies, 2017, v. 24, n. 2, p. 459, doi. 10.2979/indjglolegstu.24.2.0459
- Publication type:
- Article
Multi-cloud resource scheduling intelligent system with endogenous security.
- Published in:
- Electronic Research Archive, 2024, v. 32, n. 2, p. 1, doi. 10.3934/era.2024064
- By:
- Publication type:
- Article
A taxi detour trajectory detection model based on iBAT and DTW algorithm.
- Published in:
- Electronic Research Archive, 2022, v. 30, n. 12, p. 1, doi. 10.3934/era.2022229
- By:
- Publication type:
- Article
Security threats and protection procedures for optical networks.
- Published in:
- IET Optoelectronics (Wiley-Blackwell), 2017, v. 11, n. 5, p. 186, doi. 10.1049/iet-opt.2016.0150
- By:
- Publication type:
- Article
Lightweight models for detection of denial‐of‐service attack in wireless sensor networks.
- Published in:
- IET Networks (Wiley-Blackwell), 2021, v. 10, n. 4, p. 185, doi. 10.1049/ntw2.12011
- By:
- Publication type:
- Article
Bat optimization algorithm for wrapper‐based feature selection and performance improvement of android malware detection.
- Published in:
- IET Networks (Wiley-Blackwell), 2021, v. 10, n. 3, p. 131, doi. 10.1049/ntw2.12022
- By:
- Publication type:
- Article
PRIVACY AND AUTONOMY: ON SOME MISCONCEPTIONS CONCERNING THE POLITICAL DIMENSIONS OF PRIVACY.
- Published in:
- Law & Philosophy, 2018, v. 37, n. 2, p. 117, doi. 10.1007/s10982-017-9307-3
- By:
- Publication type:
- Article
A Novel and Efficient Multilayered Approach to CAPTCHA: Design, Performance and Usability Evaluation.
- Published in:
- International Journal of Computer Information Systems & Industrial Management Applications, 2023, v. 15, p. 438
- By:
- Publication type:
- Article
Design and Validation of the Bright Internet.
- Published in:
- Journal of the Association for Information Systems, 2018, v. 19, n. 2, p. 63, doi. 10.17705/1jais.00484
- By:
- Publication type:
- Article
Fake-Website Detection Tools: Identifying Elements that Promote Individuals' Use and Enhance Their Performance.
- Published in:
- Journal of the Association for Information Systems, 2015, v. 16, n. 6, p. 448
- By:
- Publication type:
- Article
Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG).
- Published in:
- Journal of the Association for Information Systems, 2014, v. 15, n. 10, p. 679
- By:
- Publication type:
- Article
The Order Machine - The Ontology of Information Security.
- Published in:
- Journal of the Association for Information Systems, 2012, v. 13, n. 9, p. 695
- By:
- Publication type:
- Article
Fintech firms and banks sustainability: Why cybersecurity risk matters?
- Published in:
- International Journal of Financial Engineering, 2021, v. 8, n. 2, p. N.PAG, doi. 10.1142/S2424786321500195
- By:
- Publication type:
- Article