Works matching DE "TECHNOLOGY security measures"
Results: 18
APPLICATION OF VOICE BIOMETRICS IN PROTECTION SYSTEMS AND CRIME FIGHTING.
- Published in:
- Journal of Information Technology & Applications, 2012, v. 2, n. 2, p. 59, doi. 10.7251/JIT1202059P
- By:
- Publication type:
- Article
Reconsidering Privacy-Promising Technologies.
- Published in:
- Tulane Journal of Technology & Intellectual Property, 2016, v. 19, p. 1
- By:
- Publication type:
- Article
Cybersecurity in unmanned aerial vehicles (UAVs).
- Published in:
- Journal of Cyber Security Technology, 2021, v. 5, n. 2, p. 120, doi. 10.1080/23742917.2020.1846307
- By:
- Publication type:
- Article
Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases.
- Published in:
- Journal of Cyber Security Technology, 2021, v. 5, n. 2, p. 71, doi. 10.1080/23742917.2020.1843822
- By:
- Publication type:
- Article
IDENTIFICATION OF RISK DEVICES USING INDEPENDENT COMPONENT ANALYSIS FOR SEMICONDUCTOR MEASUREMENT DATA.
- Published in:
- International Journal of Industrial Engineering, 2016, v. 23, n. 5, p. 294
- By:
- Publication type:
- Article
A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter).
- Published in:
- International Journal of Information Security & Cybercrime, 2023, v. 12, n. 2, p. 27, doi. 10.19107/ijisc.2023.02.03
- By:
- Publication type:
- Article
A model to analyze the challenge of using cyber insurance.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 301, doi. 10.1007/s10796-017-9737-3
- By:
- Publication type:
- Article
Allies at Sixes and Sevens: Sticky Issues in Australian and the United States Defence Trade Controls.
- Published in:
- DISAM Journal of International Security Assistance Management, 2008, v. 30, n. 1, p. 78
- By:
- Publication type:
- Article
Information systems security in special and public libraries: an assessment of status.
- Published in:
- Malaysian Journal of Library & Information Science, 2011, v. 16, n. 2, p. 45
- By:
- Publication type:
- Article
Mobile Video Delivery: Challenges and Opportunities.
- Published in:
- IEEE Internet Computing, 2015, v. 19, n. 3, p. 64, doi. 10.1109/MIC.2015.63
- By:
- Publication type:
- Article
A future for our digital memory: born-digital cultural heritage in the Netherlands.
- Published in:
- Art Libraries Journal, 2010, v. 35, n. 3, p. 17, doi. 10.1017/S0307472200016497
- By:
- Publication type:
- Article
MOBILE PAYMENT SATISFACTION POST PANDEMIC COVID-19 IN INDONESIA.
- Published in:
- Jurnal Riset Akuntansi dan Bisnis Airlangga (JRABA), 2022, v. 7, n. 2, p. 1362, doi. 10.20473/jraba.v7i2.39834
- By:
- Publication type:
- Article
Is Your Internet Device Spying on You?
- Published in:
- Judges' Journal, 2017, v. 56, n. 2, p. 36
- By:
- Publication type:
- Article
Multidomain Operations.
- Published in:
- 2016
- By:
- Publication type:
- Opinion
NARRATIVES ON EXTENDING AND TRANSCENDING MORTALITY: AN ESSAY ON IMPLICATIONS FOR THE FUTURE.
- Published in:
- 2015
- By:
- Publication type:
- Essay
VÁLLALATI DÖNTÉS EGY ÚJ INFORMÁCIÓBIZTONSÁGI ESZKÖZ, A KVANTUMKULCSCSERE BEVEZETÉSÉRŐL.
- Published in:
- Vezetéstudomány / Budapest Management Review, 2015, v. 46, n. 3, p. 26, doi. 10.14267/veztud.2015.03.03
- By:
- Publication type:
- Article
Copyright in the Information Age: The catch-22 of digital technology.
- Published in:
- Critical Arts: A South-North Journal of Cultural & Media Studies, 2006, v. 20, n. 1, p. 47, doi. 10.1080/02560040608557776
- By:
- Publication type:
- Article
HOW TO CIRCUMVENT TECHNOLOGICAL PROTECTION MEASURES WITHOUT VIOLATING THE DMCA: AN EXAMINATION OF TECHNOLOGICAL PROTECTION MEASURES UNDER CURRENT LEGAL STANDARDS.
- Published in:
- Berkeley Technology Law Journal, 2011, v. 26, n. 1, p. 491
- By:
- Publication type:
- Article