Zeitschriftenartikel zum Thema „Computer networks – Security measures – Zimbabwe“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Computer networks – Security measures – Zimbabwe" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
NIKLEKAJ, Malvina. "Security in Computer Networks: Threats, Challenges, and Protection." Ingenious 3, no. 1 (2023): 51–60. http://dx.doi.org/10.58944/mcne2043.
Der volle Inhalt der QuelleMtengwa, Bonnie Batsirai, Agripah Kandiero, and Stanislas Bigirimana. "Drivers of Mobile Money Services Development in Zimbabwe." International Journal of E-Business Research 17, no. 1 (2021): 42–64. http://dx.doi.org/10.4018/ijebr.2021010104.
Der volle Inhalt der QuelleKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Der volle Inhalt der QuelleZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Der volle Inhalt der QuelleSavytska, Liudmyla, Tetiana Korobeinikova, Oleh Kostiuk, Iryna Kolesnyk, and Oleksandr Dudnyk. "INTERNET OF THINGS PROTECTION MEANS IN THE CORPORATE COMPUTER NETWORK." Information technology and computer engineering 59, no. 1 (2024): 83–93. http://dx.doi.org/10.31649/1999-9941-2024-59-1-83-93.
Der volle Inhalt der QuelleGuo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.
Der volle Inhalt der QuelleLittlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Der volle Inhalt der QuelleMo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.
Der volle Inhalt der QuelleNwabueze, C. A., and R. E. Usiade. "Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 721–26. https://doi.org/10.5281/zenodo.3843000.
Der volle Inhalt der QuelleCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Der volle Inhalt der QuelleFang, Du, Zhang Kaiyuan, and Qian Jin. "Research on Information Security of Computer Networks in Universities based on Artificial Intelligence." Journal of Big Data and Computing 2, no. 3 (2024): 189–93. https://doi.org/10.62517/jbdc.202401329.
Der volle Inhalt der QuelleLalit, Jain. "Computer Network: An Implementation of Important Security Awareness Public Wi-Fi." International Journal of Innovative Science and Research Technology 8, no. 5 (2023): 2400–2403. https://doi.org/10.5281/zenodo.8015814.
Der volle Inhalt der QuelleZhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.
Der volle Inhalt der QuelleKuprashvili, Henri. "Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)." Works of Georgian Technical University, no. 2(524) (June 6, 2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.
Der volle Inhalt der QuelleSavytska, Liudmyla, Tetiana Korobeinikova, Ihor Leontiev, and Serhii Bohomolov. "METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK." Information technology and computer engineering 58, no. 3 (2023): 41–52. http://dx.doi.org/10.31649/1999-9941-2023-58-3-41-52.
Der volle Inhalt der QuelleHewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Der volle Inhalt der QuelleSmith, Martin. "Part 2 Personnel security measures within a computer installation." Computer Law & Security Review 6, no. 2 (1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.
Der volle Inhalt der QuelleAghaei, John, and Morgan Beren. "An In-Depth Study on Privacy Law, Computer Viruses and Their Prevention." Mathematical Modeling and Algorithm Application 2, no. 1 (2024): 20–22. http://dx.doi.org/10.54097/dva59m48.
Der volle Inhalt der QuelleHeinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.
Der volle Inhalt der QuelleXing, Kongduo. "A Practical Study of Big Data Technology in Computer Network Information Security Processing." Journal of Electronic Research and Application 7, no. 6 (2023): 36–41. http://dx.doi.org/10.26689/jera.v7i6.5667.
Der volle Inhalt der QuelleGwaka, Leon Tinashe. "Computer Supported Livestock Systems: The Potential of Digital Platforms to Revitalize a Livestock System in Rural Zimbabwe." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022): 1–28. http://dx.doi.org/10.1145/3555085.
Der volle Inhalt der QuelleFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks." Journal of Information Technology Research 7, no. 3 (2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.
Der volle Inhalt der QuelleYao, Benkun. "q-Rung Orthopair Fuzzy Approach for Multiple-Attribute Group Decision-Making and Application to Commercial Computer Network Security Evaluation." International Journal of Fuzzy System Applications 13, no. 1 (2024): 1–19. http://dx.doi.org/10.4018/ijfsa.356366.
Der volle Inhalt der QuelleAlfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.
Der volle Inhalt der QuelleWang, Xi, and Lei Shi. "Design of computer network security storage system based on cloud computing technology." Journal of Physics: Conference Series 2083, no. 4 (2021): 042084. http://dx.doi.org/10.1088/1742-6596/2083/4/042084.
Der volle Inhalt der QuelleResearcher. "PRIVACY AND SECURITY IN AUTONOMOUS VEHICLE NETWORKS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 7–26. https://doi.org/10.5281/zenodo.13149456.
Der volle Inhalt der QuelleDr. Kashyap C. Patel, Dr. Sachin A. Goswami, Dr. Saurabh A. Dave, and Ajaykumar Patel. "Crippling Connectivity : Unveiling the Network Disruption Potential of Vehicular Rogue Access Points." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 3 (2024): 632–43. http://dx.doi.org/10.32628/cseit241036.
Der volle Inhalt der QuelleZhang, Ke. "A wormhole attack detection method for tactical wireless sensor networks." PeerJ Computer Science 9 (August 29, 2023): e1449. http://dx.doi.org/10.7717/peerj-cs.1449.
Der volle Inhalt der QuelleA. D., Azernikov, Norkina A. N., Myseva E. R., and Chicherov K. A. "Innovative Technologies in Combating Cyber Crime." KnE Social Sciences 3, no. 2 (2018): 248. http://dx.doi.org/10.18502/kss.v3i2.1550.
Der volle Inhalt der QuelleAhmad, S. Mashhour, and Saleh Zakaria. "Wireless Networks Security in Jordan: A Field Study." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 43–52. https://doi.org/10.5281/zenodo.4435315.
Der volle Inhalt der QuelleZhou, Zhengchun, and Wenyao Shen. "HoneyPot : Enhancing Cybersecurity through a computer simulation technology." Highlights in Science, Engineering and Technology 105 (June 30, 2024): 97–101. http://dx.doi.org/10.54097/0q8h9k30.
Der volle Inhalt der QuelleZhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.
Der volle Inhalt der QuelleVASILENKO, Nikolai, Valeriia SLATVINSKA, and Valeriy RACHUK. "ANALYSIS OF UNAUTHORIZED ACCESS TO COMPUTER NETWORKS IN THE CONTEXT OF THEIR SECURITY MEASURES." Information Technology and Society, no. 2 (13) (2024): 12–16. http://dx.doi.org/10.32689/maup.it.2024.2.2.
Der volle Inhalt der QuelleAye, Mya Sandar, Min Ya, and Myat Nwe Win Khin. "Fundamental Areas of Cyber Security on Latest Technology." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 981–83. https://doi.org/10.5281/zenodo.3589949.
Der volle Inhalt der QuelleFouzar, Youcef, Ahmed Lakhssassi, and Ramakrishna Mundugar. "Secure Video Communication Using Multi-Equation Multi-Key Hybrid Cryptography." Future Internet 15, no. 12 (2023): 387. http://dx.doi.org/10.3390/fi15120387.
Der volle Inhalt der QuelleVaishali, Tyagi, and Parul Tomar Dr. "Review on Various Security Attacks in Ad Hoc Networks." International Journal of Trend in Scientific Research and Development 2, no. 5 (2018): 270–74. https://doi.org/10.31142/ijtsrd15830.
Der volle Inhalt der QuelleRam, M. Sethu, and R. Anandan. "Adaptive Multi-Layer Security Framework (AMLSF) for real-time applications in smart city networks." Journal of Autonomous Intelligence 7, no. 5 (2024): 1370. http://dx.doi.org/10.32629/jai.v7i5.1370.
Der volle Inhalt der QuelleFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks." Journal of Information Technology Research 8, no. 1 (2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.
Der volle Inhalt der QuelleFeng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, and Qi Han. "A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment." Complexity 2021 (June 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.
Der volle Inhalt der QuelleKounavis, Michael, David Durham, Sergej Deutsch, and Ken Grewal. "Security definitions, entropy measures and constructions for implicitly detecting data corruption." Computer Communications 160 (July 2020): 815–46. http://dx.doi.org/10.1016/j.comcom.2020.05.022.
Der volle Inhalt der QuelleMonica Mehrotra, Md Shamsul Haque Ansari,. "Lightweight Cryptography based Communication Model for Device Identification, Mutual Authentication, and Encryption in a Smart City Environment." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 986–94. http://dx.doi.org/10.17762/ijritcc.v11i9.8989.
Der volle Inhalt der QuelleSheela, D., and G. Mahadevan. "Mobile Agent Based Enhanced Security for Wireless Sensor Networks." International Journal of Business Data Communications and Networking 10, no. 2 (2014): 15–29. http://dx.doi.org/10.4018/ijbdcn.2014040102.
Der volle Inhalt der QuelleКобцев, О. Е., А. И. Шеншин, В. М. Питолин, Л. В. Паринова, Ю. Г. Пастернак, and Ю. В. Макаров. "NETWORK ATTACKS BY COMPUTER VIRUSES: SPECIFIC INFORMATION SECURITY POLICY." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 27, no. 1(-) (2024): 67–80. http://dx.doi.org/10.36622/1682-7813.2024.27.1.004.
Der volle Inhalt der QuelleDolente, Filippo, Rosario Giuseppe Garroppo, and Michele Pagano. "A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions." Future Internet 16, no. 1 (2023): 1. http://dx.doi.org/10.3390/fi16010001.
Der volle Inhalt der QuelleNazir, Sajid, Shushma Patel, and Dilip Patel. "Autonomic Computing Architecture for SCADA Cyber Security." International Journal of Cognitive Informatics and Natural Intelligence 11, no. 4 (2017): 66–79. http://dx.doi.org/10.4018/ijcini.2017100104.
Der volle Inhalt der QuelleSlamet, Slamet. "Pelatihan jaringan komputer dan keamanannya bagi dosen dan mahasiswa Dili Institute of Technology (DIT) di Undika Surabaya." TEKMULOGI: Jurnal Pengabdian Masyarakat 3, no. 1 (2023): 59–66. http://dx.doi.org/10.17509/tmg.v3i1.58074.
Der volle Inhalt der QuelleLiang, Jiaqi, Yibei Wu, Jun’e Li, Xiong Chen, Heqin Tong, and Ming Ni. "Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks." Complexity 2021 (February 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/6659879.
Der volle Inhalt der QuelleRaxmanova, Saodat Djurayevna. "IMPROVING THE POSSIBILITIES OF USING COMPUTER NETWORKS IN HIGH SCHOOLS." Multidisciplinary Journal of Science and Technology 5, no. 5 (2025): 1165–70. https://doi.org/10.5281/zenodo.15511917.
Der volle Inhalt der QuellePeng, Yu, Xinrong Liu, Ming Li, et al. "Sensing network security prevention measures of BIM smart operation and maintenance system." Computer Communications 161 (September 2020): 360–67. http://dx.doi.org/10.1016/j.comcom.2020.07.039.
Der volle Inhalt der QuelleOuyang, Chun-Juan, Ming Leng, Jie-Wu Xia, and Huan Liu. "Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1790268.
Der volle Inhalt der Quelle