Found: 105
Select item for more details and to access through your institution.
A Study on the Measuring Methods of Website Security Risk Rate.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 1, p. 42, doi. 10.3390/app14010042
- By:
- Publication type:
- Article
القرصنة الإلكترونية على مواقع الإنترنت دراسة تطبيقية على عينة من مواقع مرافق المعلومات المصرية.
- Published in:
- Egyptian Journal of Information Sciences, 2023, v. 10, n. 2, p. 32
- By:
- Publication type:
- Article
A Novel Administration Model for Managing and Organising the Heterogeneous Information Security Policy Field.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 17, p. 9703, doi. 10.3390/app13179703
- By:
- Publication type:
- Article
Analisis Kerentanan Keamanan Sistem Informasi Akademik Universitas Bina Darma Menggunakan OWASP.
- Published in:
- Techno.com, 2023, v. 22, n. 2, p. 418, doi. 10.33633/tc.v22i2.7562
- By:
- Publication type:
- Article
ONTOLOGY FOR BLIND SQL INJECTION.
- Published in:
- Computing & Informatics, 2023, v. 42, n. 2, p. 480, doi. 10.31577/cai_2023_2_480
- By:
- Publication type:
- Article
Invo-Substitute: Three Layer Encryption For Enhanced E-Commerce Website Security Using Substitution Cipher And Involution Function.
- Published in:
- Journal of Pharmaceutical Negative Results, 2023, v. 14, p. 1621, doi. 10.47750/pnr.2023.14.S02.198
- By:
- Publication type:
- Article
A Meta-Analysis of Online Impulsive Buying and the Moderating Effect of Economic Development Level.
- Published in:
- Information Systems Frontiers, 2022, v. 24, n. 5, p. 1667, doi. 10.1007/s10796-021-10170-4
- By:
- Publication type:
- Article
The Strategies to Improve Customer Experience: A Case of Online Shopping Platform.
- Published in:
- Jurnal Manajemen Teori dan Terapan, 2022, v. 15, n. 3, p. 330, doi. 10.20473/jmtt.v15i3.40294
- By:
- Publication type:
- Article
BERT-Embedding-Based JSP Webshell Detection on Bytecode Level Using XGBoost.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4315829
- By:
- Publication type:
- Article
IMPLEMENTATION OF CYBER SECURITY ATTACKS AND STRATEGIC MITIGATION MECHANISMS.
- Published in:
- International Journal of Advanced Research in Computer Science, 2022, v. 13, n. 4, p. 28, doi. 10.26483/ijarcs.v13i4.6890
- By:
- Publication type:
- Article
Machine Learning for Web Vulnerability Detection: The Case of Cross Site Request Forgery.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 3, p. 4502
- By:
- Publication type:
- Article
A novel secure diffusion Kalman filter algorithm against false data injection attacks.
- Published in:
- IET Communications (Wiley-Blackwell), 2021, v. 15, n. 16, p. 2028, doi. 10.1049/cmu2.12235
- By:
- Publication type:
- Article
Boosting the Network Performance using Two Security Measure Scenarios for Service Provider Network.
- Published in:
- Iraqi Journal of Science, 2021, p. 174, doi. 10.24996/ijs.2021.SI.1.24
- By:
- Publication type:
- Article
WEBSITE SECURITY FOR DETECTION AND PREVENTION OF ATTACKS.
- Published in:
- i-manager's Journal on Software Engineering, 2020, v. 14, n. 3, p. 37, doi. 10.26634/jse.14.3.17360
- By:
- Publication type:
- Article
Online Tor Privacy Breach Through Website Fingerprinting Attack.
- Published in:
- Journal of Network & Systems Management, 2019, v. 27, n. 2, p. 289, doi. 10.1007/s10922-018-9466-z
- By:
- Publication type:
- Article
UISTD: A Trust-Aware Model for Diverse Item Personalization in Social Sensing with Lower Privacy Intrusion.
- Published in:
- Sensors (14248220), 2018, v. 18, n. 12, p. 4383, doi. 10.3390/s18124383
- By:
- Publication type:
- Article
Defensive Strategy Selection based on Attack-Defense Game Model in Network Security.
- Published in:
- International Journal of Performability Engineering, 2018, v. 14, n. 11, p. 2633, doi. 10.23940/ijpe.18.11.p9.26332642
- By:
- Publication type:
- Article
Persistent Misperceptions: Americans' Misplaced Confidence in Privacy Policies, 2003-2015.
- Published in:
- Journal of Broadcasting & Electronic Media, 2018, v. 62, n. 3, p. 461, doi. 10.1080/08838151.2018.1451867
- By:
- Publication type:
- Article
Estimating the state of website security as poorly regulated mechanisms based on fuzzy logic methods.
- Published in:
- Journal of Qadisiyah Computer Science & Mathematics, 2018, v. 10, n. 3, p. 9, doi. 10.29304/jqcm.2018.10.3.413
- By:
- Publication type:
- Article
Application of Security Technologies in the Public Websites of Banks in Serbia.
- Published in:
- Izesstia, Journal of the Union of Scientists - Varna, Economic Sciences Series, 2018, v. 7, n. 2, p. 298
- By:
- Publication type:
- Article
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle.
- Published in:
- International Journal of Information Security, 2018, v. 17, n. 2, p. 135, doi. 10.1007/s10207-017-0361-5
- By:
- Publication type:
- Article
A Comparative Study of Web Content Management Systems.
- Published in:
- Information (2078-2489), 2018, v. 9, n. 2, p. 27, doi. 10.3390/info9020027
- By:
- Publication type:
- Article
Banking Websites in Turkey: an Accessibility, Usability and Security Evaluation.
- Published in:
- Journal of Business Research-Turk / Isletme Arastirmalari Dergisi, 2018, v. 10, n. 1, p. 782, doi. 10.20491/isarder.2018.396
- By:
- Publication type:
- Article
ІНТЕРНЕТ-САЙТ ЯК ОБ’ЄКТ ІТ-ПРАВА.
- Published in:
- Law of Ukraine / Pravo Ukraini, 2018, n. 1, p. 103
- By:
- Publication type:
- Article
Exploring determining factors of web transparency in the world's top universities.
- Published in:
- Revista de Contabilidad - Spanish Accounting Review, 2018, v. 21, n. 1, p. 63, doi. 10.1016/j.rcsar.2017.07.004
- By:
- Publication type:
- Article
Phishing Detection: A Case Analysis on Classifiers with Rules Using Machine Learning.
- Published in:
- Journal of Information & Knowledge Management, 2017, v. 16, n. 4, p. -1, doi. 10.1142/S0219649217500344
- By:
- Publication type:
- Article
Indian Government Websites : A Study.
- Published in:
- DESIDOC Journal of Library & Information Technology, 2017, v. 37, n. 5, p. 346, doi. 10.14429/djlit.37.5.10964
- By:
- Publication type:
- Article
Samsung Knox frames a security-best approach to the mobile era.
- Published in:
- 2017
- Publication type:
- Product Review
Phishing Website Detection Using Weighted Feature Line Embedding.
- Published in:
- ISeCure, 2017, v. 9, n. 2, p. 49
- By:
- Publication type:
- Article
Firewalls: A Study and Its Classification.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1979
- By:
- Publication type:
- Article
Ciphertext Policy-Attribute Based Homomorphic Encryption (CP-ABHE<sub>R-LWE</sub>) Scheme: A Fine-Grained Access Control on Outsourced Cloud Data Computation.
- Published in:
- Journal of Information Science & Engineering, 2017, v. 33, n. 3, p. 675, doi. 10.6688/JISE.2017.33.3.5
- By:
- Publication type:
- Article
Acute care patient portals: a qualitative study of stakeholder perspectives on current practices.
- Published in:
- 2017
- By:
- Publication type:
- journal article
Security control for website defacement.
- Published in:
- Sistemas & Telemática, 2017, v. 15, n. 41, p. 45, doi. 10.18046/syt.v15i41.2442
- By:
- Publication type:
- Article
Web Application and Server Exploitation.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 847
- By:
- Publication type:
- Article
Fast backup and recovery for web protection using trigger and block hash approach.
- Published in:
- Computer Systems Science & Engineering, 2017, v. 32, n. 2, p. 137
- By:
- Publication type:
- Article
A novel method to authenticate in website using CAPTCHA-based validation.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5934, doi. 10.1002/sec.1747
- By:
- Publication type:
- Article
CSP adoption: current status and future prospects.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 17, p. 4557, doi. 10.1002/sec.1649
- By:
- Publication type:
- Article
How Bad Guys Are Using The Web's Own Encryption To Hide Malware Payloads.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2016, v. 22, n. 1, p. 8
- By:
- Publication type:
- Article
Enforcing mobile security with location-aware role-based access control.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 5, p. 429, doi. 10.1002/sec.879
- By:
- Publication type:
- Article
Adaptive Context-Aware Access Control Model for Ubiquitous Learning Environment.
- Published in:
- BVICAM's International Journal of Information Technology, 2016, v. 8, n. 1, p. 922
- By:
- Publication type:
- Article
Information Access Control of Privacy Patterns on Online Photo Sharing.
- Published in:
- International Journal on Information Sciences & Computing, 2016, v. 10, n. 1, p. 11, doi. 10.18000/ijisac.50158
- By:
- Publication type:
- Article
Awareness and use of Web 2.0 tools by LIS Students at University of Nigeria, Nsukka, Enugu State, Nigeria.
- Published in:
- Library Philosophy & Practice, 2016, p. 1
- By:
- Publication type:
- Article
Combining expert knowledge with automatic feature extraction for reliable web attack detection.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 16, p. 2750, doi. 10.1002/sec.603
- By:
- Publication type:
- Article
INFORMATION EXPOSURE MODEL: A FRAMEWORK FOR INDIVIDUAL ASSESMENT OF RISKS AND BENEFITS FROM USING A WEBSITE.
- Published in:
- Issues in Information Systems, 2015, v. 16, n. 3, p. 99
- By:
- Publication type:
- Article
Fake-Website Detection Tools: Identifying Elements that Promote Individuals' Use and Enhance Their Performance.
- Published in:
- Journal of the Association for Information Systems, 2015, v. 16, n. 6, p. 448
- By:
- Publication type:
- Article
PERSONALIZED E-SERVICES: CONSUMER PRIVACY CONCERN AND INFORMATION SHARING.
- Published in:
- Social Behavior & Personality: an international journal, 2015, v. 43, n. 5, p. 729, doi. 10.2224/sbp.2015.43.5.729
- By:
- Publication type:
- Article
Formalization of Web Security Patterns.
- Published in:
- INFOCOMP: Journal of Computer Science, 2015, v. 14, n. 1, p. 14, doi. 10.18760/ic.14120152
- By:
- Publication type:
- Article
Strategies for Monitoring Website Security against Cyber-Attacks.
- Published in:
- International Journal of Information Security & Cybercrime, 2015, v. 4, n. 1, p. 9, doi. 10.19107/ijisc.2015.01.01
- By:
- Publication type:
- Article
Site Security.
- Published in:
- Marketing Health Services, 2014, v. 34, n. 4, p. 5
- Publication type:
- Article
Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 2, p. 1445, doi. 10.1007/s11277-014-1939-0
- By:
- Publication type:
- Article