Works matching DE "COMPUTER security research"
Results: 204
Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess.
- Published in:
- Journal of the Association for Information Systems, 2016, v. 17, n. 1, p. 39
- By:
- Publication type:
- Article
Security and Vulnerability Assessment of Social Media Sites: An Exploratory Study.
- Published in:
- Journal of Education for Business, 2015, v. 90, n. 8, p. 458, doi. 10.1080/08832323.2015.1095705
- By:
- Publication type:
- Article
ANDROID* SECURITY: ISSUES AND FUTURE DIRECTIONS.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 2, p. 34
- By:
- Publication type:
- Article
An Adaptive Secret Key-directed Cryptographic Scheme for Secure Transmission in Wireless Sensor Networks.
- Published in:
- Technical Journal of University of Engineering & Technology Taxila, 2015, v. 20, n. 3, p. 48
- By:
- Publication type:
- Article
STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA.
- Published in:
- Annals of 'Constantin Brancusi' University of Targu-Jiu. Economy Series / Analele Universităţii 'Constantin Brâncuşi' din Târgu-Jiu Seria Economie, 2015, p. 291
- By:
- Publication type:
- Article
A Comparison of Internet Protocol (IPv6) Security Guidelines.
- Published in:
- Future Internet, 2014, v. 6, n. 1, p. 1, doi. 10.3390/fi6010001
- By:
- Publication type:
- Article
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems.
- Published in:
- Future Internet, 2013, v. 5, n. 3, p. 355, doi. 10.3390/fi5030355
- By:
- Publication type:
- Article
A Review of the Risk Factors in Computational Grid.
- Published in:
- Folklore Forum, 2013, p. 270
- By:
- Publication type:
- Article
Method for a Two Dimensional Honeypot to Deter Web Bots in Commerce Systems.
- Published in:
- Folklore Forum, 2013, p. 260
- By:
- Publication type:
- Article
Physical layer encryption scheme using finite-length polar codes.
- Published in:
- IET Communications (Wiley-Blackwell), 2015, v. 9, n. 15, p. 1857, doi. 10.1049/iet-com.2014.0933
- By:
- Publication type:
- Article
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement.
- Published in:
- Journal of Management Information Systems, 2012, v. 29, n. 3, p. 117, doi. 10.2753/MIS0742-1222290304
- By:
- Publication type:
- Article
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model.
- Published in:
- Journal of Management Information Systems, 2011, v. 28, n. 2, p. 203, doi. 10.2753/MIS0742-1222280208
- By:
- Publication type:
- Article
No Free Lunch: Price Premium for Privacy Seal--Bearing Vendors.
- Published in:
- Journal of Management Information Systems, 2010, v. 27, n. 2, p. 189, doi. 10.2753/MIS0742-1222270206
- By:
- Publication type:
- Article
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System†.
- Published in:
- Computer Journal, 2014, v. 57, n. 10, p. 1537, doi. 10.1093/comjnl/bxt090
- By:
- Publication type:
- Article
Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare.
- Published in:
- Computer Journal, 2014, v. 57, n. 4, p. 624, doi. 10.1093/comjnl/bxt046
- By:
- Publication type:
- Article
On Formalizing and Normalizing Role-Based Access Control Systems.
- Published in:
- Computer Journal, 2009, v. 52, n. 3, p. 305, doi. 10.1093/comjnl/bxn016
- By:
- Publication type:
- Article
Cyber Crime Prevention and Role of Libraries.
- Published in:
- International Journal of Information Dissemination & Technology, 2013, v. 3, n. 3, p. 222
- By:
- Publication type:
- Article
A Semantic-Aware Role-Based Access Control Model for Pervasive Computing Environments.
- Published in:
- ISeCure, 2013, v. 5, n. 2, p. 119
- By:
- Publication type:
- Article
Convertible Limited (Multi-) Verifier Signature: New Constructions and Applications.
- Published in:
- ISeCure, 2013, v. 5, n. 2, p. 74
- By:
- Publication type:
- Article
STLR: A Novel Danger Theory Based Structural TLR Algorithm.
- Published in:
- ISeCure, 2013, v. 5, n. 2, p. 209
- By:
- Publication type:
- Article
Pairwise and Group Key Setup Mechanism for Secure Machine-to-Machine Communication.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1071, doi. 10.2298/CSIS130922065D
- By:
- Publication type:
- Article
PPS: A Privacy-Preserving Security Scheme for Multi-operator Wireless Mesh Networks with Enhanced User Experience.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 975, doi. 10.2298/CSIS130917060G
- By:
- Publication type:
- Article
A True Random-Number Encryption Method Employing Block Cipher and PRNG.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 905, doi. 10.2298/CSIS130921056H
- By:
- Publication type:
- Article
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier.
- Published in:
- Journal of Mathematical Cryptology, 2016, v. 10, n. 2, p. 101, doi. 10.1515/jmc-2014-0044
- By:
- Publication type:
- Article
Attack chain detection.
- Published in:
- Statistical Analysis & Data Mining, 2015, v. 8, n. 5/6, p. 353, doi. 10.1002/sam.11296
- By:
- Publication type:
- Article
CORRELATED FAILURES, DIVERSIFICATION, AND INFORMATION SECURITY RISK MANAGEMENT.
- Published in:
- MIS Quarterly, 2011, v. 35, n. 2, p. 397, doi. 10.2307/23044049
- By:
- Publication type:
- Article
Critical Times for Organizations: What Should Be Done to Curb Workers’ Noncompliance With IS Security Policy Guidelines?
- Published in:
- Information Systems Management, 2016, v. 33, n. 1, p. 30, doi. 10.1080/10580530.2015.1117868
- By:
- Publication type:
- Article
About RFWKIDEA16-8, RFWKIDEA16-4, RFWKIDEA16-2 &RFWKIDEA16-1 networks created on the basis of IDEA16-8 network.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 259, doi. 10.18372/2225-5036.20.7553
- By:
- Publication type:
- Article
The detection method of identification terms for intrusion detection system.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 217, doi. 10.18372/2225-5036.20.7546
- By:
- Publication type:
- Article
Fuzzy neural production network model for information security systems.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 3, p. 231, doi. 10.18372/2225-5036.20.7548
- By:
- Publication type:
- Article
Modern methods of computer steganography systematization.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2013, v. 19, n. 3, p. 209, doi. 10.18372/2225-5036.19.5628
- By:
- Publication type:
- Article
Analysis of «incident» definitions and its interpretation in cyberspace.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2013, v. 19, n. 3, p. 175, doi. 10.18372/2225-5036.19.5620
- By:
- Publication type:
- Article
SECURITY MEASURES FOR OPEN SOURCE WEBSITE PLATFORMS.
- Published in:
- Journal of Information Systems & Operations Management, 2016, v. 10, n. 1, p. 1
- By:
- Publication type:
- Article
Soft Systems Methodology for the Strategic Planning of the Enterprise Computer Security.
- Published in:
- International Journal of Combinatorial Optimization Problems & Informatics, 2014, v. 5, n. 1, p. 2
- By:
- Publication type:
- Article
Router architecture evaluation for security network.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 628, doi. 10.1007/s12083-012-0181-3
- By:
- Publication type:
- Article
Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSN.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 710, doi. 10.1007/s12083-012-0194-y
- By:
- Publication type:
- Article
Cryptographic Properties of Bipermutive Cellular Automata Rules.
- Published in:
- Journal of Cellular Automata, 2014, v. 9, n. 5/6, p. 437
- By:
- Publication type:
- Article
CONCEPTUAL MODEL REGARDING SECURITY AND PROTECTION CONSUMERS' RIGHTS IN THE ONLINE ENVIRONMENT.
- Published in:
- Economic Computation & Economic Cybernetics Studies & Research, 2015, v. 49, n. 1, p. 121
- By:
- Publication type:
- Article
A Critical Look at Restaurant Network Security: Attacks, Prevention Tools, and Practices.
- Published in:
- Journal of Foodservice Business Research, 2007, v. 10, n. 1, p. 31, doi. 10.1300/J369v10n01_03
- By:
- Publication type:
- Article
A chaotic block encryption algorithm.
- Published in:
- Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2014, v. 29, n. 6, p. 73, doi. 10.3969/j.issn.2095-476X.2014.06.016
- By:
- Publication type:
- Article
Channel abstractions for network security.
- Published in:
- Mathematical Structures in Computer Science, 2010, v. 20, n. 1, p. 3, doi. 10.1017/S0960129509990247
- By:
- Publication type:
- Article
COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEM BASED ON ASSOCIATION MINING RULE.
- Published in:
- ICTACT Journal on Soft Computing, 2014, v. 4, n. 4, p. 787, doi. 10.21917/ijsc.2014.0112
- By:
- Publication type:
- Article
Privacy in Virtual Worlds: A US Perspective.
- Published in:
- Journal of Virtual Worlds Research, 2014, v. 7, n. 1, p. 1, doi. 10.4101/jvwr.v7i1.7067
- By:
- Publication type:
- Article
Control Flow Graph Based Multiclass Malware Detection Using Bi-normal Separation.
- Published in:
- Defence Science Journal, 2016, v. 66, n. 2, p. 138, doi. 10.14429/dsj.66.9701
- By:
- Publication type:
- Article
Implementation of Physical Layer Key Distribution using Software Defined Radios.
- Published in:
- Defence Science Journal, 2013, v. 63, n. 1, p. 6, doi. 10.14429/dsj2013.6592
- By:
- Publication type:
- Article
VULNERABILITIES OF NEW TECHNOLOGIES AND THE PROTECTION OF CNI.
- Published in:
- Media, Culture & Public Relations, 2015, v. 6, n. 1, p. 56
- By:
- Publication type:
- Article
TIM Lecture Series Web Infections and Protections: Theory and Practice.
- Published in:
- Technology Innovation Management Review, 2014, p. 35, doi. 10.22215/timreview774
- By:
- Publication type:
- Article
USING THE SECURITY NETWORK SCANNER GFI LANGUARD TO DISCOVER AND IMPROVE THE VULNERABILITIES IN THE COMPUTER NETWORK SYSTEMS.
- Published in:
- Journal Scientific & Applied Research, 2013, v. 4, p. 74, doi. 10.46687/jsar.v4i1.83
- By:
- Publication type:
- Article
DATABASE SECURITY SYSTEM FOR APPLYING SOPHISTICATED ACCESS CONTROL VIA DATABASE FIREWALL SERVER.
- Published in:
- Computing & Informatics, 2013, v. 32, n. 6, p. 1192
- By:
- Publication type:
- Article
AN EXECUTABLE SERVICE COMPOSITION CODE AUTOMATIC CREATION TOOL BASED ON PETRI NET MODEL.
- Published in:
- Computing & Informatics, 2013, v. 32, n. 5, p. 968
- By:
- Publication type:
- Article