Works matching DE "COMPUTER security management"


Results: 120
    1

    Pushdown model checking for malware detection.

    Published in:
    International Journal on Software Tools for Technology Transfer, 2014, v. 16, n. 2, p. 147, doi. 10.1007/s10009-013-0290-1
    By:
    • Song, Fu;
    • Touili, Tayssir
    Publication type:
    Article
    2
    3
    4

    PROTECTING SENSOR DATA FROM MALWARE ATTACKS.

    Published in:
    Intel Technology Journal, 2014, v. 18, n. 4, p. 178
    By:
    • Edwards, Jonathan;
    • Grewal, Ken;
    • LeMay, Michael;
    • Robinson, Scott H.;
    • Sahita, Ravi;
    • Woodward, Carl
    Publication type:
    Article
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15

    how to stay connected.

    Published in:
    Strategic Finance, 2002, v. 84, n. 3, p. 32
    By:
    • Hickman, Thomas
    Publication type:
    Article
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30

    ADF NETWORK SECURITY.

    Published in:
    Asia-Pacific Defence Reporter, 2016, v. 42, n. 9, p. 16
    By:
    • SLOCOMBE, GEOFF
    Publication type:
    Article
    31
    32
    33
    34
    35
    36
    37

    An adaptive threat model for security ceremonies.

    Published in:
    International Journal of Information Security, 2015, v. 14, n. 2, p. 103, doi. 10.1007/s10207-014-0253-x
    By:
    • Martina, Jean;
    • Santos, Eduardo;
    • Carlos, Marcelo;
    • Price, Geraint;
    • Custódio, Ricardo
    Publication type:
    Article
    38
    39
    40
    41
    42

    The psychological effects of cyber terrorism.

    Published in:
    Bulletin of the Atomic Scientists, 2016, v. 72, n. 5, p. 284, doi. 10.1080/00963402.2016.1216502
    By:
    • Gross, Michael L.;
    • Canetti, Daphna;
    • Vashdi, Dana R.
    Publication type:
    Article
    43
    44
    45
    46
    47
    48
    49
    50