Works matching DE "INFORMATION network security"
Results: 22
A Comprehensive Case Study of Security Education for Information Security Personnel.
- Published in:
- Journal of Internet Computing & Services, 2025, v. 26, n. 1, p. 93, doi. 10.7472/jksii.2025.26.1.93
- By:
- Publication type:
- Article
PCAP Next Generation: Is Your Sniffer Up to Snuff?
- Published in:
- ISSA Journal, 2018, v. 16, n. 7, p. 37
- By:
- Publication type:
- Article
Networks Face New Email-Related Threats.
- Published in:
- Financial Executive, 2005, v. 21, n. 5, p. 11
- By:
- Publication type:
- Article
A macro method for measuring economic-benefit returns on cybersecurity investments: The table top approach.
- Published in:
- Systems Engineering, 2013, v. 16, n. 3, p. 313, doi. 10.1002/sys.21236
- By:
- Publication type:
- Article
Sharing Network Security Information.
- Published in:
- 2007
- By:
- Publication type:
- Editorial
Addressing Internal Security Threats with Roaming User-Based Distributed Firewalls.
- Published in:
- Journal of Information System Security, 2009, v. 5, n. 2, p. 26
- By:
- Publication type:
- Article
Supporting Intrusion Detection Work Practice.
- Published in:
- Journal of Information System Security, 2009, v. 5, n. 2, p. 42
- By:
- Publication type:
- Article
Information Security: Designing A Stochastic-Network for Throughput and Reliability.
- Published in:
- Naval Research Logistics, 2009, v. 56, n. 7, p. 625, doi. 10.1002/nav.20365
- By:
- Publication type:
- Article
Detecting false testimonies in reputation systems using self-organizing maps.
- Published in:
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 549, doi. 10.1093/jigpal/jzs028
- By:
- Publication type:
- Article
Virtual private network for wellness sports information.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 16, p. 6497, doi. 10.1007/s11042-014-2096-x
- By:
- Publication type:
- Article
A dynamic key management scheme for dynamic wireless sensor networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 6, p. 1040, doi. 10.1002/sec.1058
- By:
- Publication type:
- Article
Issue Information.
- Published in:
- 2015
- Publication type:
- Other
Privacy in the Internet of Things: threats and challenges.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 12, p. 2728, doi. 10.1002/sec.795
- By:
- Publication type:
- Article
Human centric security policy and management design for small and medium business.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 10, p. 1622, doi. 10.1002/sec.814
- By:
- Publication type:
- Article
Robust password changing and DoS resilience for human-centric password authentication.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 10, p. 1552, doi. 10.1002/sec.768
- By:
- Publication type:
- Article
STUDY OF EFFECTS OF INFORMATION SECURITY MANAGEMENT SYSTEM IN THE CONTEXT OF THE E.U. GENERAL DATA PROTECTION REGULATION APPLICATION.
- Published in:
- Quality - Access to Success, 2019, v. 20, p. 322
- By:
- Publication type:
- Article
HOW TO TAKE A COMPUTER DISASTER IN STRIDE.
- Published in:
- Strategic Finance, 2005, v. 86, n. 7, p. 49
- By:
- Publication type:
- Article
How do China's Information Security Laws Affect You?
- Published in:
- China Business Review, 2016, p. 1
- By:
- Publication type:
- Article
Effective network management via dynamic network anomaly visualization.
- Published in:
- International Journal of Network Management, 2016, v. 26, n. 6, p. 461, doi. 10.1002/nem.1945
- By:
- Publication type:
- Article
Risk Assessment of a Power Plant: Evaluating the Security of a Supervisory Control and Data Acquisition System.
- Published in:
- ASHRAE Transactions, 2006, v. 112, n. 2, p. 671
- By:
- Publication type:
- Article
Secrecy outage of threshold-based cooperative relay network with and without direct links.
- Published in:
- EURASIP Journal on Information Security, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13635-018-0077-8
- By:
- Publication type:
- Article
Mobile interaction design: Integrating individual and organizational perspectives.
- Published in:
- Information Knowledge Systems Management, 2008, v. 7, n. 1/2, p. 121
- By:
- Publication type:
- Article