Works matching DE "COMPUTER security research"


Results: 210
    1

    The evolution of anti-circumvention law.

    Published in:
    International Review of Law, Computers & Technology, 2006, v. 20, n. 3, p. 239, doi. 10.1080/13600860600852119
    By:
    • Brown, Ian
    Publication type:
    Article
    2
    3

    Homeland Security Technology.

    Published in:
    Issues in Science & Technology, 2001, v. 18, n. 2, p. 43
    By:
    • Bonvillian, William B.;
    • Sharp, Kendra V.
    Publication type:
    Article
    4
    5
    6

    A chaotic block encryption algorithm.

    Published in:
    Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2014, v. 29, n. 6, p. 73, doi. 10.3969/j.issn.2095-476X.2014.06.016
    By:
    • WEI Feng
    Publication type:
    Article
    7
    8
    9
    10
    11
    12
    13
    14
    15

    The Dark Side of Online Knowledge Sharing.

    Published in:
    Journal of Information Systems, 2012, v. 26, n. 2, p. 71, doi. 10.2308/isys-50244
    By:
    • Smith, Antoinette L.;
    • Baxter, Ryan J.;
    • Boss, Scott R.;
    • Hunton, James E.
    Publication type:
    Article
    16
    17
    18

    BCES Encryption Algorithm.

    Published in:
    International Journal of Advanced Research in Computer Science, 2015, v. 6, n. 5, p. 63
    By:
    • Yosef Galala, Khdega A.
    Publication type:
    Article
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29

    Word-Based LSB Image Steganography.

    Published in:
    International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 6, p. 15
    By:
    • Al-Husainy, Mohammed Abbas Fadhil
    Publication type:
    Article
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39

    Secure Congestion Control in MANET.

    Published in:
    International Journal of Computer Science & Management Studies, 2013, v. 13, n. 6, p. 15
    By:
    • Singh, Yudhvir;
    • Siwach, Vikas;
    • Aggarwal, Divya
    Publication type:
    Article
    40
    41
    42
    43

    STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA.

    Published in:
    Annals of 'Constantin Brancusi' University of Targu-Jiu. Economy Series / Analele Universităţii 'Constantin Brâncuşi' din Târgu-Jiu Seria Economie, 2015, p. 291
    By:
    • RĂDULESCU, CRISTINA-MARIA
    Publication type:
    Article
    44
    45
    46
    47
    48
    49
    50

    Attack chain detection.

    Published in:
    Statistical Analysis & Data Mining, 2015, v. 8, n. 5/6, p. 353, doi. 10.1002/sam.11296
    By:
    • Sexton, Joseph;
    • Storlie, Curtis;
    • Neil, Joshua
    Publication type:
    Article