Zeitschriftenartikel zum Thema „Computer networks – Security measures – Zimbabwe“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Computer networks – Security measures – Zimbabwe" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Der volle Inhalt der QuelleKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Der volle Inhalt der QuelleCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Der volle Inhalt der QuelleZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Der volle Inhalt der QuelleGuo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.
Der volle Inhalt der QuelleSmith, Martin. "Part 2 Personnel security measures within a computer installation." Computer Law & Security Review 6, no. 2 (1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.
Der volle Inhalt der QuelleAlfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.
Der volle Inhalt der QuelleMtengwa, Bonnie Batsirai, Agripah Kandiero, and Stanislas Bigirimana. "Drivers of Mobile Money Services Development in Zimbabwe." International Journal of E-Business Research 17, no. 1 (2021): 42–64. http://dx.doi.org/10.4018/ijebr.2021010104.
Der volle Inhalt der QuelleZhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.
Der volle Inhalt der QuelleKounavis, Michael, David Durham, Sergej Deutsch, and Ken Grewal. "Security definitions, entropy measures and constructions for implicitly detecting data corruption." Computer Communications 160 (July 2020): 815–46. http://dx.doi.org/10.1016/j.comcom.2020.05.022.
Der volle Inhalt der QuelleHewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Der volle Inhalt der QuelleMo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.
Der volle Inhalt der QuellePeng, Yu, Xinrong Liu, Ming Li, et al. "Sensing network security prevention measures of BIM smart operation and maintenance system." Computer Communications 161 (September 2020): 360–67. http://dx.doi.org/10.1016/j.comcom.2020.07.039.
Der volle Inhalt der QuelleHeinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.
Der volle Inhalt der QuelleFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks." Journal of Information Technology Research 7, no. 3 (2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.
Der volle Inhalt der QuelleFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks." Journal of Information Technology Research 8, no. 1 (2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.
Der volle Inhalt der QuelleSheela, D., and G. Mahadevan. "Mobile Agent Based Enhanced Security for Wireless Sensor Networks." International Journal of Business Data Communications and Networking 10, no. 2 (2014): 15–29. http://dx.doi.org/10.4018/ijbdcn.2014040102.
Der volle Inhalt der QuelleOuyang, Chun-Juan, Ming Leng, Jie-Wu Xia, and Huan Liu. "Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1790268.
Der volle Inhalt der QuelleNazir, Sajid, Shushma Patel, and Dilip Patel. "Autonomic Computing Architecture for SCADA Cyber Security." International Journal of Cognitive Informatics and Natural Intelligence 11, no. 4 (2017): 66–79. http://dx.doi.org/10.4018/ijcini.2017100104.
Der volle Inhalt der QuelleLiu, Rosina. "Is Security, is Audit, and Control Measures in Telecommunication Toll Fraud." EDPACS 25, no. 3 (1997): 1–11. http://dx.doi.org/10.1080/07366989709452320.
Der volle Inhalt der QuelleZhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.
Der volle Inhalt der QuelleFeng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, and Qi Han. "A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment." Complexity 2021 (June 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.
Der volle Inhalt der QuelleSamreen, Shirina. "Packet Dropping Counter Measures in a MANET Through Reliable Routing Protocol Leveraging a Trust Management Framework." International Journal of Mobile Computing and Multimedia Communications 9, no. 3 (2018): 60–75. http://dx.doi.org/10.4018/ijmcmc.2018070104.
Der volle Inhalt der QuelleDas, Amit, and Habib Ullah Khan. "Security behaviors of smartphone users." Information & Computer Security 24, no. 1 (2016): 116–34. http://dx.doi.org/10.1108/ics-04-2015-0018.
Der volle Inhalt der QuelleSafavi-Naini, Reihaneh, Alireza Poostindouz, and Viliam Lisy. "Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication." Security and Communication Networks 2018 (May 7, 2018): 1–15. http://dx.doi.org/10.1155/2018/8475818.
Der volle Inhalt der QuelleSafi, Roozmehr, Glenn J. Browne, and Azadeh Jalali Naini. "Mis-spending on information security measures: Theory and experimental evidence." International Journal of Information Management 57 (April 2021): 102291. http://dx.doi.org/10.1016/j.ijinfomgt.2020.102291.
Der volle Inhalt der QuelleLiang, Jiaqi, Yibei Wu, Jun’e Li, Xiong Chen, Heqin Tong, and Ming Ni. "Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks." Complexity 2021 (February 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/6659879.
Der volle Inhalt der QuelleA. D., Azernikov, Norkina A. N., Myseva E. R., and Chicherov K. A. "Innovative Technologies in Combating Cyber Crime." KnE Social Sciences 3, no. 2 (2018): 248. http://dx.doi.org/10.18502/kss.v3i2.1550.
Der volle Inhalt der QuelleSharma, Tanusree, Hunter A. Dyer, and Masooda Bashir. "Enabling User-centered Privacy Controls for Mobile Applications." ACM Transactions on Internet Technology 21, no. 1 (2021): 1–24. http://dx.doi.org/10.1145/3434777.
Der volle Inhalt der QuelleShabbir, Aysha, Maryam Shabbir, Muhammad Rizwan, and Fahad Ahmad. "Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard." Security and Communication Networks 2019 (December 18, 2019): 1–16. http://dx.doi.org/10.1155/2019/2509898.
Der volle Inhalt der QuelleAhmad, Bilal, Wang Jian, and Zain Anwar Ali. "Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions." Journal of Computer Networks and Communications 2018 (July 2, 2018): 1–10. http://dx.doi.org/10.1155/2018/6383145.
Der volle Inhalt der QuelleIqbal, Sohail, Shahzad Farooq, Khuram Shahzad, Asad Waqar Malik, Mian M. Hamayun, and Osman Hasan. "SecureSurgiNET: A framework for ensuring security in telesurgery." International Journal of Distributed Sensor Networks 15, no. 9 (2019): 155014771987381. http://dx.doi.org/10.1177/1550147719873811.
Der volle Inhalt der QuelleNiveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath, and Magesh S. "Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform." International Journal of e-Collaboration 17, no. 4 (2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.
Der volle Inhalt der QuelleTang, Zhenjun, Shaopeng Zhang, Zhenhai Chen, and Xianquan Zhang. "Robust Video Hashing Based on Multidimensional Scaling and Ordinal Measures." Security and Communication Networks 2021 (April 30, 2021): 1–11. http://dx.doi.org/10.1155/2021/9930673.
Der volle Inhalt der QuelleZurek, Tomasz, Michail Mokkas, and Bogdan Ksiezopolski. "On the Modelling of Context-Aware Security for Mobile Devices." Mobile Information Systems 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/8743504.
Der volle Inhalt der QuelleSheikh, Muhammad Sameer, and Jun Liang. "A Comprehensive Survey on VANET Security Services in Traffic Management System." Wireless Communications and Mobile Computing 2019 (September 15, 2019): 1–23. http://dx.doi.org/10.1155/2019/2423915.
Der volle Inhalt der QuelleQadri, Yazdan Ahmad, Rashid Ali, Arslan Musaddiq, Fadi Al-Turjman, Dae Wan Kim, and Sung Won Kim. "The limitations in the state-of-the-art counter-measures against the security threats in H-IoT." Cluster Computing 23, no. 3 (2020): 2047–65. http://dx.doi.org/10.1007/s10586-019-03036-7.
Der volle Inhalt der QuelleAziz, Israa T., and Ihsan H. Abdulqadder. "An Overview on SDN and NFV Security Orchestration in Cloud Network Environment." Cihan University-Erbil Scientific Journal 5, no. 1 (2021): 20–27. http://dx.doi.org/10.24086/cuesj.v5n1y2021.pp20-27.
Der volle Inhalt der QuelleRietz, René, Radoslaw Cwalinski, Hartmut König, and Andreas Brinner. "An SDN-Based Approach to Ward Off LAN Attacks." Journal of Computer Networks and Communications 2018 (November 21, 2018): 1–12. http://dx.doi.org/10.1155/2018/4127487.
Der volle Inhalt der QuelleRoy Sarkar, Kuheli. "Assessing insider threats to information security using technical, behavioural and organisational measures." Information Security Technical Report 15, no. 3 (2010): 112–33. http://dx.doi.org/10.1016/j.istr.2010.11.002.
Der volle Inhalt der QuelleTosun, Nilgün. "Social Networks as a Learning and Teaching Environment and Security in Social Networks." Journal of Education and Training Studies 6, no. 11a (2018): 194. http://dx.doi.org/10.11114/jets.v6i11a.3817.
Der volle Inhalt der QuelleZhu, Qianxiang, Yuanqing Qin, Yue Zhao, and Zhou Chunjie. "A hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures." International Journal of Distributed Sensor Networks 16, no. 1 (2020): 155014771988980. http://dx.doi.org/10.1177/1550147719889808.
Der volle Inhalt der QuelleTANNIAN, MARK F., CHRISTINA SCHWEIKERT, and YING LIU. "A Systems Security Analysis of Issuance and Verification of Birth Documents Enhanced with DNA Profiles." Journal of Interconnection Networks 17, no. 01 (2017): 1740003. http://dx.doi.org/10.1142/s0219265917400035.
Der volle Inhalt der QuelleOzcan, Alper, and Sule Gunduz Oguducu. "Multivariate Time Series Link Prediction for Evolving Heterogeneous Network." International Journal of Information Technology & Decision Making 18, no. 01 (2019): 241–86. http://dx.doi.org/10.1142/s0219622018500530.
Der volle Inhalt der QuelleAljably, Randa, Yuan Tian, and Mznah Al-Rodhaan. "Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection." Security and Communication Networks 2020 (July 20, 2020): 1–14. http://dx.doi.org/10.1155/2020/5874935.
Der volle Inhalt der QuelleRani, Sita, Aman Kataria, Vishal Sharma, et al. "Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey." Wireless Communications and Mobile Computing 2021 (April 26, 2021): 1–30. http://dx.doi.org/10.1155/2021/5579148.
Der volle Inhalt der QuelleFeng, Bo, Qiang Li, Yuede Ji, Dong Guo, and Xiangyu Meng. "Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users." Security and Communication Networks 2019 (July 11, 2019): 1–14. http://dx.doi.org/10.1155/2019/3053418.
Der volle Inhalt der QuelleBihl, Trevor J., Todd J. Paciencia, Kenneth W. Bauer, and Michael A. Temple. "Cyber-Physical Security with RF Fingerprint Classification through Distance Measure Extensions of Generalized Relevance Learning Vector Quantization." Security and Communication Networks 2020 (February 24, 2020): 1–12. http://dx.doi.org/10.1155/2020/3909763.
Der volle Inhalt der QuelleVillegas-Ch., William, Ivan Ortiz-Garces, and Santiago Sánchez-Viteri. "Proposal for an Implementation Guide for a Computer Security Incident Response Team on a University Campus." Computers 10, no. 8 (2021): 102. http://dx.doi.org/10.3390/computers10080102.
Der volle Inhalt der QuelleGowthami K. "Security Issues on IoT Environment In Wireless Network Communications." International Journal of Wireless Networks and Broadband Technologies 8, no. 2 (2019): 31–46. http://dx.doi.org/10.4018/ijwnbt.2019070104.
Der volle Inhalt der Quelle