Found: 106
Select item for more details and to access through your institution.
ScanSavant: Malware Detection for Android Applications with Explainable AI.
- Published in:
- International Journal of Interactive Mobile Technologies, 2024, v. 18, n. 19, p. 171, doi. 10.3991/ijim.v18i19.49437
- By:
- Publication type:
- Article
How Can Secure Websites Improve Buying Intention? Usable Versus Non Usable Contexts?
- Published in:
- Journal of Organizational & End User Computing, 2014, v. 26, n. 2, p. 41, doi. 10.4018/joeuc.2014040103
- By:
- Publication type:
- Article
WASM -- A Metric for Securing a Web Application.
- Published in:
- Journal of Research & Practice in Information Technology, 2014, v. 46, n. 1, p. 19
- By:
- Publication type:
- Article
April.
- Published in:
- Public Relations Tactics, 2000, v. 7, n. 4, p. 5
- By:
- Publication type:
- Article
Fake-Website Detection Tools: Identifying Elements that Promote Individuals' Use and Enhance Their Performance.
- Published in:
- Journal of the Association for Information Systems, 2015, v. 16, n. 6, p. 448
- By:
- Publication type:
- Article
Strategies for Monitoring Website Security against Cyber-Attacks.
- Published in:
- International Journal of Information Security & Cybercrime, 2015, v. 4, n. 1, p. 9, doi. 10.19107/ijisc.2015.01.01
- By:
- Publication type:
- Article
INFORMATION EXPOSURE MODEL: A FRAMEWORK FOR INDIVIDUAL ASSESMENT OF RISKS AND BENEFITS FROM USING A WEBSITE.
- Published in:
- Issues in Information Systems, 2015, v. 16, n. 3, p. 99
- By:
- Publication type:
- Article
Information Access Control of Privacy Patterns on Online Photo Sharing.
- Published in:
- International Journal on Information Sciences & Computing, 2016, v. 10, n. 1, p. 11, doi. 10.18000/ijisac.50158
- By:
- Publication type:
- Article
Adaptive Context-Aware Access Control Model for Ubiquitous Learning Environment.
- Published in:
- BVICAM's International Journal of Information Technology, 2016, v. 8, n. 1, p. 922
- By:
- Publication type:
- Article
PRIJEDLOG RJEŠENJA ZA DETEKCIJU I KLASIFIKACIJU SIGURNOSNIH PROPUSTA WEB APLIKACIJA.
- Published in:
- InfoM, 2010, n. 34, p. 42
- By:
- Publication type:
- Article
A Meta-Analysis of Online Impulsive Buying and the Moderating Effect of Economic Development Level.
- Published in:
- Information Systems Frontiers, 2022, v. 24, n. 5, p. 1667, doi. 10.1007/s10796-021-10170-4
- By:
- Publication type:
- Article
French embassy website attacked, suspect China demands proof.
- Published in:
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2009, v. 44, n. 1, p. 21
- Publication type:
- Article
UISTD: A Trust-Aware Model for Diverse Item Personalization in Social Sensing with Lower Privacy Intrusion.
- Published in:
- Sensors (14248220), 2018, v. 18, n. 12, p. 4383, doi. 10.3390/s18124383
- By:
- Publication type:
- Article
Webwise.
- Published in:
- Irish Veterinary Journal, 2008, v. 61, n. 11, p. 728
- Publication type:
- Article
Web Applications Fall Short.
- Published in:
- Internal Auditor, 2010, v. 67, n. 6, p. 16
- Publication type:
- Article
A novel method to authenticate in website using CAPTCHA-based validation.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5934, doi. 10.1002/sec.1747
- By:
- Publication type:
- Article
CSP adoption: current status and future prospects.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 17, p. 4557, doi. 10.1002/sec.1649
- By:
- Publication type:
- Article
Enforcing mobile security with location-aware role-based access control.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 5, p. 429, doi. 10.1002/sec.879
- By:
- Publication type:
- Article
Combining expert knowledge with automatic feature extraction for reliable web attack detection.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 16, p. 2750, doi. 10.1002/sec.603
- By:
- Publication type:
- Article
A quantitative approach to estimate a website security risk using whitelist.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 10, p. 1181, doi. 10.1002/sec.420
- By:
- Publication type:
- Article
IMPLEMENTATION OF CYBER SECURITY ATTACKS AND STRATEGIC MITIGATION MECHANISMS.
- Published in:
- International Journal of Advanced Research in Computer Science, 2022, v. 13, n. 4, p. 28, doi. 10.26483/ijarcs.v13i4.6890
- By:
- Publication type:
- Article
Seclayer: A Plugin to Prevent Phishing Attacks.
- Published in:
- IUP Journal of Information Technology, 2013, v. 9, n. 4, p. 52
- By:
- Publication type:
- Article
Samsung Knox frames a security-best approach to the mobile era.
- Published in:
- 2017
- Publication type:
- Product Review
Lab: New security products underperform.
- Published in:
- ComputerWorld Hong Kong, 2009, v. 26, n. 10, p. 8
- Publication type:
- Article
Acute care patient portals: a qualitative study of stakeholder perspectives on current practices.
- Published in:
- 2017
- By:
- Publication type:
- journal article
A Software Tool for Removing Patient Identifying Information from Clinical Documents.
- Published in:
- Journal of the American Medical Informatics Association, 2008, v. 15, n. 5, p. 601, doi. 10.1197/jamia.M2702
- By:
- Publication type:
- Article
Banking Websites in Turkey: an Accessibility, Usability and Security Evaluation.
- Published in:
- Journal of Business Research-Turk / Isletme Arastirmalari Dergisi, 2018, v. 10, n. 1, p. 782, doi. 10.20491/isarder.2018.396
- By:
- Publication type:
- Article
Tree Wrap-data Extraction Using Tree Matching Algorithm.
- Published in:
- Majlesi Journal of Electrical Engineering, 2010, v. 4, n. 2, p. 43
- By:
- Publication type:
- Article
ANALYSIS OF BIT-SPLIT LANGUAGES FOR PACKET SCANNING AND EXPERIMENTS WITH WILDCARD MATCHING.
- Published in:
- International Journal of Foundations of Computer Science, 2009, v. 20, n. 4, p. 597, doi. 10.1142/S0129054109006760
- By:
- Publication type:
- Article
ROSS: Low-Cost Self-Securing VoIP Communication Framework.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 12, p. 3366, doi. 10.3837/tiis.2012.12.019
- By:
- Publication type:
- Article
Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 12, p. 3352, doi. 10.3837/tiis.2012.12.018
- By:
- Publication type:
- Article
Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector.
- Published in:
- KSII Transactions on Internet & Information Systems, 2009, v. 3, n. 5, p. 548, doi. 10.3837/tiis.2009.05.008
- By:
- Publication type:
- Article
E-learning in Malaysia: Success Factors in Implementing E-learning Program.
- Published in:
- International Journal of Teaching & Learning in Higher Education, 2008, v. 20, n. 2, p. 237
- By:
- Publication type:
- Article
CYBER SECURITY: CHALLENGES AND THE WAY FORWARD.
- Published in:
- Computer Science & Telecommunications, 2010, v. 29, n. 6, p. 56
- By:
- Publication type:
- Article
Security control for website defacement.
- Published in:
- Sistemas & Telemática, 2017, v. 15, n. 41, p. 45, doi. 10.18046/syt.v15i41.2442
- By:
- Publication type:
- Article
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle.
- Published in:
- International Journal of Information Security, 2018, v. 17, n. 2, p. 135, doi. 10.1007/s10207-017-0361-5
- By:
- Publication type:
- Article
EXAM: a comprehensive environment for the analysis of access control policies.
- Published in:
- International Journal of Information Security, 2010, v. 9, n. 4, p. 253, doi. 10.1007/s10207-010-0106-1
- By:
- Publication type:
- Article
Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture.
- Published in:
- International Journal of Information Security, 2009, v. 8, n. 2, p. 77, doi. 10.1007/s10207-008-0065-y
- By:
- Publication type:
- Article
An analysis of accuracy experiments carried out over of a multi-faceted model of trust.
- Published in:
- International Journal of Information Security, 2009, v. 8, n. 2, p. 103, doi. 10.1007/s10207-008-0069-7
- By:
- Publication type:
- Article
Invo-Substitute: Three Layer Encryption For Enhanced E-Commerce Website Security Using Substitution Cipher And Involution Function.
- Published in:
- Journal of Pharmaceutical Negative Results, 2023, v. 14, p. 1621, doi. 10.47750/pnr.2023.14.S02.198
- By:
- Publication type:
- Article
A Comparative Study of Web Content Management Systems.
- Published in:
- Information (2078-2489), 2018, v. 9, n. 2, p. 27, doi. 10.3390/info9020027
- By:
- Publication type:
- Article
Indian Government Websites : A Study.
- Published in:
- DESIDOC Journal of Library & Information Technology, 2017, v. 37, n. 5, p. 346, doi. 10.14429/djlit.37.5.10964
- By:
- Publication type:
- Article
Defensive Strategy Selection based on Attack-Defense Game Model in Network Security.
- Published in:
- International Journal of Performability Engineering, 2018, v. 14, n. 11, p. 2633, doi. 10.23940/ijpe.18.11.p9.26332642
- By:
- Publication type:
- Article
Enhancing Security Modeling for Web Services Using Delegation and Pass-On.
- Published in:
- International Journal of Web Services Research, 2010, v. 7, n. 1, p. 1, doi. 10.4018/jwsr.2010010101
- By:
- Publication type:
- Article
Negotiating identity and integrity on social network sites for educators.
- Published in:
- International Journal for Educational Integrity, 2010, v. 6, n. 2, p. 19, doi. 10.21913/ijei.v6i2.700
- By:
- Publication type:
- Article
Academics should not remain silent on hacking.
- Published in:
- Nature, 2013, v. 504, n. 7480, p. 333, doi. 10.1038/504333a
- By:
- Publication type:
- Article
Analisis Kerentanan Keamanan Sistem Informasi Akademik Universitas Bina Darma Menggunakan OWASP.
- Published in:
- Techno.com, 2023, v. 22, n. 2, p. 418, doi. 10.33633/tc.v22i2.7562
- By:
- Publication type:
- Article
Consumer Trust to a Web Site: Moderating Effect of Attitudes toward Online Shopping.
- Published in:
- CyberPsychology & Behavior, 2008, v. 11, n. 5, p. 549, doi. 10.1089/cpb.2007.0097
- By:
- Publication type:
- Article
WEBSITE SECURITY FOR DETECTION AND PREVENTION OF ATTACKS.
- Published in:
- i-Manager's Journal on Software Engineering, 2020, v. 14, n. 3, p. 37, doi. 10.26634/jse.14.3.17360
- By:
- Publication type:
- Article
Firewalls: A Study and Its Classification.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1979
- By:
- Publication type:
- Article