Found: 9
Select item for more details and to access through your institution.
Handling Safety and Cybersecurity Interdependency in NFV Safety Architecture With the Use of An Ontology-based Solution.
- Published in:
- Journal of Ubiquitous Systems & Pervasive Networks, 2023, v. 19, n. 1, p. 1, doi. 10.5383/JUSPN.19.01.001
- By:
- Publication type:
- Article
The Human Factor at the Center of a Cyber Security Culture.
- Published in:
- International Journal of Information Security & Cybercrime, 2019, v. 8, n. 1, p. 51, doi. 10.19107/ijisc.2019.01.07
- By:
- Publication type:
- Article
Modelling compliance risk: a structured approach.
- Published in:
- Artificial Intelligence & Law, 2015, v. 23, n. 3, p. 271, doi. 10.1007/s10506-015-9174-x
- By:
- Publication type:
- Article
How to protect security and privacy in the IoT: a policy-based RFID tag management protocol.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 12, p. 2669, doi. 10.1002/sec.400
- By:
- Publication type:
- Article
Staying One Step Ahead.
- Published in:
- ITNOW, 2013, v. 55, n. 4, p. 38, doi. 10.1093/itnow/bwt080
- By:
- Publication type:
- Article
What's Special about Cloud Security?
- Published in:
- IT Professional, 2012, v. 14, n. 4, p. 6, doi. 10.1109/MITP.2012.84
- By:
- Publication type:
- Article
UNIÓN EUROPEA.
- Published in:
- Actualidad Jurídica (1578-956X), 2011, n. 30, p. 247
- Publication type:
- Article
CONSIDERAŢII ASUPRA SECURITĂŢII INFORMAŢIILOR ÎN ROMÂNIA.
- Published in:
- Review of Management & Economic Engineering, 2010, v. 9, n. 1, p. 53
- By:
- Publication type:
- Article
ARTEMIS: French-German project for railway movements command and control.
- Published in:
- Journal of Advanced Transportation, 1993, v. 27, n. 1, p. 65, doi. 10.1002/atr.5670270107
- By:
- Publication type:
- Article