Academic literature on the topic 'Computer networks – security measures. Computer hackers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks – security measures. Computer hackers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer networks – security measures. Computer hackers"
VASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Full textRai, Ankush, and Jagadeesh Kannan R. "MICROTUBULE BASED NEURO-FUZZY NESTED FRAMEWORK FOR SECURITY OF CYBER PHYSICAL SYSTEM." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 230. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19646.
Full textChandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.
Full textAlfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.
Full textWu, Banghua, Shah Nazir, and Neelam Mukhtar. "Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication." Complexity 2020 (November 12, 2020): 1–12. http://dx.doi.org/10.1155/2020/6690569.
Full textVasilenko, M., O. Kozin, M. Kozina, and V. Rachuk. "CYBER RISKS IN THE MUNICIPAL ECONOMY DURING THE PANDEMIC: DAMAGES AND THE STRUGGLE FOR CYBER SECURITY." Municipal economy of cities 3, no. 156 (2020): 80–87. http://dx.doi.org/10.33042/2522-1809-2020-3-156-80-87.
Full textKhaleel, Amal Hameed, and Iman Qays Abduljaleel. "Secure image hiding in speech signal by steganography-mining and encryption." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1692. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1692-1703.
Full textHei, Xinhong, Wen Gao, Yichuan Wang, Lei Zhu, and Wenjiang Ji. "From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone." Wireless Communications and Mobile Computing 2020 (September 21, 2020): 1–13. http://dx.doi.org/10.1155/2020/8816023.
Full textChan, Siew H., and Suparak Janjarasjit. "Insight into hackers’ reaction toward information security breach." International Journal of Information Management 49 (December 2019): 388–96. http://dx.doi.org/10.1016/j.ijinfomgt.2019.07.010.
Full textKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Full textDissertations / Theses on the topic "Computer networks – security measures. Computer hackers"
Artore, Diane. "Honeynet design and implementation." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22614.
Full textLevine, John G. (John Glenn). "A Methodology for Detecting and Classifying Rootkit Exploits." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5139.
Full textBuys, Stephanus. "Log analysis aided by latent semantic mapping." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002963.
Full textOgbanufe, Obiageli. "Three Essays on Information Security Risk Management." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157576/.
Full textKisakye, Alex. "An investigation into information security practices implemented by Research and Educational Network of Uganda (RENU) member institution." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1004748.
Full textDalwadi, Chintan. "Network and data security." Birmingham, Ala. : University of Alabama at Birmingham, 2006. http://www.mhsl.uab.edu/dt/2006m/dalwadi.pdf.
Full textBailey, Carmen F. "Analysis of security solutions in large enterprises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.
Full textLU, WEN-PAI. "SECURITY OF COMMUNICATION IN COMPUTER NETWORKS (KEY MANAGEMENT, VERIFICATION)." Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/183922.
Full textSanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.
Full textKalutarage, H. K. "Effective monitoring of slow suspicious activites on computer networks." Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1.
Full textBooks on the topic "Computer networks – security measures. Computer hackers"
Whitaker, Andrew. Chained exploits: Advanced hacking attacks from start to finish. Addison-Wesley, 2009.
Find full textKent, Backman, and Corley James E, eds. Hands-on ethical hacking and network defense. 2nd ed. Course Technology, Cengage Learning, 2011.
Find full textChristopher, Paggen, ed. LAN switch security: What hackers know about your switches. Cisco Press, 2008.
Find full textMatthew, McFadden, ed. Defense against the black arts: How hackers do what they do and how to protect against it. Auerbach Publications, 2011.
Find full textChirillo, John. Hack attacks revealed: A complete reference for UNIX, Windows, and Linux with custom security toolkit. 2nd ed. Wiley Pub., 2002.
Find full textKent, Backman, and Corley James E, eds. Hands-on ethical hacking and network defense. Course Technology, 2013.
Find full textBook chapters on the topic "Computer networks – security measures. Computer hackers"
Michael, Mark. "Physical Security Threats and Measures." In Handbook of Computer Networks. John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch38.
Full textWilbur, Steve R., Jon Crowcroft, and Yuko Murayama. "MAC layer security measures in local area networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/3-540-51754-5_30.
Full textSrinivasa Rao, B., and P. Premchand. "Design and Implementation of a Hacker Detection Scheme: A Network Security Measure in Heterogeneous WSN." In Innovations in Computer Science and Engineering. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8201-6_56.
Full textStepień, Krzysztof, and Aneta Poniszewska-Marańda. "Towards the Security Measures of the Vehicular Ad-Hoc Networks." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05081-8_17.
Full textRohilla, Shourya, and Rejo Mathew. "Comparison of Cloud Computing Security Threats and Their Counter Measures." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_25.
Full textParwekar, Pritee, and Sparsh Arora. "Security Issues and Its Counter Measures in Mobile Ad Hoc Networks." In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03107-1_33.
Full textHanif, Muhammad Abdullah, Faiq Khalid, Rachmad Vidya Wicaksana Putra, et al. "Robust Computing for Machine Learning-Based Systems." In Dependable Embedded Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_20.
Full textCao, Xubin, and Yong Lu. "The Social Network Structure of a Computer Hacker Community." In Security and Privacy Assurance in Advancing Technologies. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-200-0.ch012.
Full textGaruba, Abdul Rahman. "Computer Virus Phenomena in Cybercafé." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch012.
Full textAdogbeji, Oghenevwogaga Benson. "Computer Security in Cybercafés." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch002.
Full textConference papers on the topic "Computer networks – security measures. Computer hackers"
Ghorbel, Ahmed, Imen Tajouri, Walid Elaydi, and Nouri Masmoudi. "The effect of the similarity measures and the interpolation techniques on fractional eigenfaces algorithm." In 2015 World Symposium on Computer Networks and Information Security (WSCNIS). IEEE, 2015. http://dx.doi.org/10.1109/wscnis.2015.7368300.
Full textFang, Chaojun. "Study on security problems and preventive measures of computer network and foreign trade and business." In 3rd International Conference on Green Communications and Networks. WIT Press, 2014. http://dx.doi.org/10.2495/gcn130101.
Full textHidalgo-Espinoza, Sergio, Kevin Chamorro-Cupuerán, and Oscar Chang-Tortolero. "Intrusion Detection in Computer Systems by using Artificial Neural Networks with Deep Learning Approaches." In 10th International Conference on Advances in Computing and Information Technology (ACITY 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101501.
Full textMurray, Mark. "Technology Dependence Beyond Control Systems." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0366.
Full text