Works about DEFENSE in depth (Computer security)
Results: 35
About Concept of Big Safety.
- Published in:
- Reliability: Theory & Applications, 2021, v. 16, n. 1, p. 13
- By:
- Publication type:
- Article
Generalized Functional Extended Redundancy Analysis.
- Published in:
- Psychometrika, 2015, v. 80, n. 1, p. 101, doi. 10.1007/s11336-013-9373-x
- By:
- Publication type:
- Article
MECHANISMS OF CYBER SECURITY: THE PROBLEM OF CONCEPTUALIZATION.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2019, v. 25, n. 2, p. 110, doi. 10.18372/2225-5036.25.13841
- By:
- Publication type:
- Article
Threat Analysis and Risk Assessment for Connected Vehicles: A Survey.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/1263820
- By:
- Publication type:
- Article
A Lightweight SDN Fingerprint Attack Defense Mechanism Based on Probabilistic Scrambling and Controller Dynamic Scheduling Strategies.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6688489
- By:
- Publication type:
- Article
A Hybrid Cyber Defense Mechanism to Mitigate the Persistent Scan and Foothold Attack.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/8882200
- By:
- Publication type:
- Article
A Review of Tabular Data Synthesis Using GANs on an IDS Dataset.
- Published in:
- Information (2078-2489), 2021, v. 12, n. 9, p. 375, doi. 10.3390/info12090375
- By:
- Publication type:
- Article
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00049-3
- By:
- Publication type:
- Article
Acción de Tutela contra providencias judiciales: elementos, condiciones y crítica.
- Published in:
- Academia & Derecho, 2019, v. 10, n. 18, p. 275, doi. 10.18041/2215-8944/academia.18.6004
- By:
- Publication type:
- Article
Designing of Vague Logic Based 2-Layered Framework for CPU Scheduler.
- Published in:
- Advances in Fuzzy Systems, 2016, p. 1, doi. 10.1155/2016/2784067
- By:
- Publication type:
- Article
The Design of a Defense Mechanism to Mitigate Sinkhole Attack in Software Defined Wireless Sensor Cognitive Radio Networks.
- Published in:
- Wireless Personal Communications, 2020, v. 113, n. 2, p. 977, doi. 10.1007/s11277-020-07263-9
- By:
- Publication type:
- Article
VIC-PRO: Vicinity Protection by Concealing Location Coordinates Using Geometrical Transformations in Location Based Services.
- Published in:
- Wireless Personal Communications, 2019, v. 107, n. 2, p. 1041, doi. 10.1007/s11277-019-06316-y
- By:
- Publication type:
- Article
Co-similar malware infection patterns as a predictor of future risk.
- Published in:
- PLoS ONE, 2021, v. 16, n. 3, p. 1, doi. 10.1371/journal.pone.0249273
- By:
- Publication type:
- Article
Defensive Strategy Selection based on Attack-Defense Game Model in Network Security.
- Published in:
- International Journal of Performability Engineering, 2018, v. 14, n. 11, p. 2633, doi. 10.23940/ijpe.18.11.p9.26332642
- By:
- Publication type:
- Article
Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 13, p. 16447, doi. 10.1007/s11042-017-5214-8
- By:
- Publication type:
- Article
The silent transition from curative to palliative treatment: a qualitative study about cancer patients' perceptions of end-of-life discussions with oncologists.
- Published in:
- Supportive Care in Cancer, 2021, v. 29, n. 5, p. 2405, doi. 10.1007/s00520-020-05750-0
- By:
- Publication type:
- Article
Graph-based technique for survivability assessment and optimization of IoT applications.
- Published in:
- International Journal on Software Tools for Technology Transfer, 2021, v. 23, n. 1, p. 105, doi. 10.1007/s10009-020-00594-9
- By:
- Publication type:
- Article
Efficient Authentication Mechanism For Defending Against Reflection-Based Attacks on Domain Name System.
- Published in:
- Kurdistan Journal of Applied Research (KJAR), 2020, v. 5, n. 1, p. 164, doi. 10.24017/science.2020.1.12
- By:
- Publication type:
- Article
FINITE TWO LAYERED QUEUEING SYSTEMS.
- Published in:
- Probability in the Engineering & Informational Sciences, 2016, v. 30, n. 3, p. 492, doi. 10.1017/S0269964816000139
- By:
- Publication type:
- Article
Intrusion Detection System Using FKNN and Improved PSO.
- Published in:
- Computers, Materials & Continua, 2021, v. 67, n. 2, p. 1429, doi. 10.32604/cmc.2021.014172
- By:
- Publication type:
- Article
Cost-effective migration-based dynamic platform defense technique: a CTMDP approach.
- Published in:
- Peer-to-Peer Networking & Applications, 2021, v. 14, n. 3, p. 1207, doi. 10.1007/s12083-021-01084-8
- By:
- Publication type:
- Article
Effective defense against fingerprinting attack based on autocorrelation property minimization approach.
- Published in:
- Journal of Intelligent Information Systems, 2020, v. 54, n. 2, p. 341, doi. 10.1007/s10844-019-00553-0
- By:
- Publication type:
- Article
RT-Sniper: A Low-Overhead Defense Mechanism Pinpointing Cache Side-Channel Attacks.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 22, p. 2748, doi. 10.3390/electronics10222748
- By:
- Publication type:
- Article
Unsupervised Adversarial Defense through Tandem Deep Image Priors.
- Published in:
- Electronics (2079-9292), 2020, v. 9, n. 11, p. 1957, doi. 10.3390/electronics9111957
- By:
- Publication type:
- Article
윤리의식의 학제적 적용을 통한 광고 표현에서의 '그림자에 의한 실체의 잠식 현상' 제거 필요성 환기
- Published in:
- Journal of Digital Convergence, 2018, v. 16, n. 2, p. 351, doi. 10.14400/JDC.2018.16.2.351
- By:
- Publication type:
- Article
Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 16, p. 5702, doi. 10.3390/app10165702
- By:
- Publication type:
- Article
Collaborative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks.
- Published in:
- IETE Journal of Research, 2016, v. 62, n. 2, p. 205, doi. 10.1080/03772063.2015.1083907
- By:
- Publication type:
- Article
A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 15, p. 5189, doi. 10.3390/s21155189
- By:
- Publication type:
- Article
Validation of Architecture Effectiveness for the Continuous Monitoring of File Integrity Stored in the Cloud Using Blockchain and Smart Contracts.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 13, p. 4440, doi. 10.3390/s21134440
- By:
- Publication type:
- Article
Method for Detecting Abnormal Activity in a Group of Mobile Robots.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 18, p. 4007, doi. 10.3390/s19184007
- By:
- Publication type:
- Article
Design and Development of Layered Security: Future Enhancements and Directions in Transmission.
- Published in:
- Sensors (14248220), 2016, v. 16, n. 1, p. 37, doi. 10.3390/s16010037
- By:
- Publication type:
- Article
C4ISR via Dark Webs.
- Published in:
- Air & Space Power Journal, 2016, v. 30, n. 4, p. 69
- By:
- Publication type:
- Article
A semi-self-taught network intrusion detection system.
- Published in:
- Neural Computing & Applications, 2020, v. 32, n. 23, p. 17169, doi. 10.1007/s00521-020-04914-7
- By:
- Publication type:
- Article
Secure Wireless Communication Using Friendly Noise Through an Untrusted Relay.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 4, p. 2927, doi. 10.1007/s11277-015-2773-8
- By:
- Publication type:
- Article
Towards a Secure IPv6 Autoconfiguration.
- Published in:
- Information Security Journal: A Global Perspective, 2020, v. 29, n. 1, p. 14, doi. 10.1080/19393555.2020.1716117
- By:
- Publication type:
- Article