Found: 8
Select item for more details and to access through your institution.
Using Embedded Platforms to Monitor Network Security.
- Published in:
- International Journal of Information Security & Cybercrime, 2018, v. 7, n. 2, p. 9, doi. 10.19107/ijisc.2018.02.01
- By:
- Publication type:
- Article
Security of Personal Data in Social Networks.
- Published in:
- International Journal of Information Security & Cybercrime, 2018, v. 7, n. 2, p. 14, doi. 10.19107/ijisc.2018.02.02
- By:
- Publication type:
- Article
The Influence of Vulnerabilities on the Information Systems and Methods of Prevention.
- Published in:
- International Journal of Information Security & Cybercrime, 2018, v. 7, n. 2, p. 25, doi. 10.19107/ijisc.2018.02.03
- By:
- Publication type:
- Article
Wi-Fi Security Dedicated Architectures.
- Published in:
- International Journal of Information Security & Cybercrime, 2018, v. 7, n. 2, p. 33
- By:
- Publication type:
- Article
Solutions to Secure a Network.
- Published in:
- International Journal of Information Security & Cybercrime, 2018, v. 7, n. 2, p. 41
- By:
- Publication type:
- Article
Book review: Alessandro Birolini - Reliability Engineering: Theory and Practice.
- Published in:
- 2018
- By:
- Publication type:
- Book Review
Launching the Study "Current Challenges in the Field of Cybersecurity".
- Published in:
- International Journal of Information Security & Cybercrime, 2018, v. 7, n. 2, p. 55
- By:
- Publication type:
- Article
BSides Bucharest Security Conference 2018.
- Published in:
- 2018
- By:
- Publication type:
- Proceeding