Journal articles on the topic 'Computer networks – security measures. Computer hackers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer networks – security measures. Computer hackers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
VASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Full textRai, Ankush, and Jagadeesh Kannan R. "MICROTUBULE BASED NEURO-FUZZY NESTED FRAMEWORK FOR SECURITY OF CYBER PHYSICAL SYSTEM." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 230. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19646.
Full textChandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.
Full textAlfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.
Full textWu, Banghua, Shah Nazir, and Neelam Mukhtar. "Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication." Complexity 2020 (November 12, 2020): 1–12. http://dx.doi.org/10.1155/2020/6690569.
Full textVasilenko, M., O. Kozin, M. Kozina, and V. Rachuk. "CYBER RISKS IN THE MUNICIPAL ECONOMY DURING THE PANDEMIC: DAMAGES AND THE STRUGGLE FOR CYBER SECURITY." Municipal economy of cities 3, no. 156 (2020): 80–87. http://dx.doi.org/10.33042/2522-1809-2020-3-156-80-87.
Full textKhaleel, Amal Hameed, and Iman Qays Abduljaleel. "Secure image hiding in speech signal by steganography-mining and encryption." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1692. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1692-1703.
Full textHei, Xinhong, Wen Gao, Yichuan Wang, Lei Zhu, and Wenjiang Ji. "From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone." Wireless Communications and Mobile Computing 2020 (September 21, 2020): 1–13. http://dx.doi.org/10.1155/2020/8816023.
Full textChan, Siew H., and Suparak Janjarasjit. "Insight into hackers’ reaction toward information security breach." International Journal of Information Management 49 (December 2019): 388–96. http://dx.doi.org/10.1016/j.ijinfomgt.2019.07.010.
Full textKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Full textLittlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Full textKaneshige, Thomas. "Full service security shop to ward off hackers." Network Security 1995, no. 8 (1995): 6. http://dx.doi.org/10.1016/1353-4858(96)89737-6.
Full textJupin, John Arthur, Tole Sutikno, Mohd Arfian Ismail, Mohd Saberi Mohamad, Shahreen Kasim, and Deris Stiawan. "Review of the machine learning methods in the classification of phishing attack." Bulletin of Electrical Engineering and Informatics 8, no. 4 (2019): 1545–55. http://dx.doi.org/10.11591/eei.v8i4.1344.
Full textGuo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.
Full textIwendi, Celestine, Saif Ur Rehman, Abdul Rehman Javed, Suleman Khan, and Gautam Srivastava. "Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures." ACM Transactions on Internet Technology 21, no. 3 (2021): 1–22. http://dx.doi.org/10.1145/3448614.
Full textBuduri, Reddaiah, SrinivasaRao Kanusu, Swetha Chinthakunta, Amruthavani Godina, and Sivajyothi Siddavatam. "Linear Congruential Pseudorandom Numbered Hybrid Crypto-System with Genetic Algorithms." International Journal of Engineering and Advanced Technology 10, no. 2 (2020): 159–63. http://dx.doi.org/10.35940/ijeat.b2092.1210220.
Full textSmith, Martin. "Part 2 Personnel security measures within a computer installation." Computer Law & Security Review 6, no. 2 (1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.
Full textAisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.
Full textZhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.
Full textCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Full textShekhtman, Louis, and Erez Waisbard. "EngraveChain: A Blockchain-Based Tamper-Proof Distributed Log System." Future Internet 13, no. 6 (2021): 143. http://dx.doi.org/10.3390/fi13060143.
Full textWang, Zhiqiang, Yuheng Lin, Zihan Zhuo, Jieming Gu, and Tao Yang. "GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing." Security and Communication Networks 2021 (June 28, 2021): 1–14. http://dx.doi.org/10.1155/2021/9946022.
Full textSelvi, M., and B. Ramakrishnan. "Secured Message Broadcasting in VANET using Blowfish Algorithm with Oppositional Deer Hunting Optimization." International Journal of Computer Network and Information Security 13, no. 2 (2021): 39–52. http://dx.doi.org/10.5815/ijcnis.2021.02.04.
Full textKhatri, Narayan, Rakesh Shrestha, and Seung Yeob Nam. "Security Issues with In-Vehicle Networks, and Enhanced Countermeasures Based on Blockchain." Electronics 10, no. 8 (2021): 893. http://dx.doi.org/10.3390/electronics10080893.
Full textDu, Yi-Hong, and Shi-Hua Liu. "Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks." Security and Communication Networks 2018 (June 7, 2018): 1–7. http://dx.doi.org/10.1155/2018/4691203.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textObiniyi, Afolayan A., Ezugwu E. Absalom, and Mohammed Dikko. "Network Security and Firewall Technology." International Journal of Dependable and Trustworthy Information Systems 2, no. 2 (2011): 40–60. http://dx.doi.org/10.4018/jdtis.2011040103.
Full textAcemyan, Claudia Ziegler, Philip Kortum, Jeffrey Xiong, and Dan S. Wallach. "2FA Might Be Secure, But It’s Not Usable: A Summative Usability Assessment of Google’s Two-factor Authentication (2FA) Methods." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62, no. 1 (2018): 1141–45. http://dx.doi.org/10.1177/1541931218621262.
Full textKounavis, Michael, David Durham, Sergej Deutsch, and Ken Grewal. "Security definitions, entropy measures and constructions for implicitly detecting data corruption." Computer Communications 160 (July 2020): 815–46. http://dx.doi.org/10.1016/j.comcom.2020.05.022.
Full textZhao, Jinxiong, Xun Zhang, Fuqiang Di, et al. "Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective." Security and Communication Networks 2021 (February 12, 2021): 1–14. http://dx.doi.org/10.1155/2021/6699108.
Full textHewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Full textMookerjee, Vijay, Radha Mookerjee, Alain Bensoussan, and Wei T. Yue. "When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination." Information Systems Research 22, no. 3 (2011): 606–23. http://dx.doi.org/10.1287/isre.1100.0341.
Full textZhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.
Full textPeng, Yu, Xinrong Liu, Ming Li, et al. "Sensing network security prevention measures of BIM smart operation and maintenance system." Computer Communications 161 (September 2020): 360–67. http://dx.doi.org/10.1016/j.comcom.2020.07.039.
Full textFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks." Journal of Information Technology Research 7, no. 3 (2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.
Full textCuinas, Inigo. "An Introduction to Cybersecurity at Physical Layer: Obstacles at Radio Channel to Mitigate Hackers’ Chance." Elektronika ir Elektrotechnika 26, no. 6 (2020): 58–65. http://dx.doi.org/10.5755/j01.eie.26.6.28006.
Full textSable, Piyush. "Designing Image Based Captcha using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 3678–82. http://dx.doi.org/10.22214/ijraset.2021.35532.
Full textFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks." Journal of Information Technology Research 8, no. 1 (2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.
Full textMo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.
Full textHeinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.
Full textFeng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, and Qi Han. "A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment." Complexity 2021 (June 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.
Full textSheela, D., and G. Mahadevan. "Mobile Agent Based Enhanced Security for Wireless Sensor Networks." International Journal of Business Data Communications and Networking 10, no. 2 (2014): 15–29. http://dx.doi.org/10.4018/ijbdcn.2014040102.
Full textBilal, Muhammad, Muhammad Asif, and Abid Bashir. "Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications." Security and Communication Networks 2018 (November 1, 2018): 1–10. http://dx.doi.org/10.1155/2018/6315039.
Full textChen, Binjie, Fushan Wei, and Chunxiang Gu. "Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms." Security and Communication Networks 2021 (February 25, 2021): 1–10. http://dx.doi.org/10.1155/2021/6643763.
Full textLee, Yousik, Samuel Woo, Jungho Lee, Yunkeun Song, Heeseok Moon, and Dong Hoon Lee. "Enhanced Android App-Repackaging Attack on In-Vehicle Network." Wireless Communications and Mobile Computing 2019 (February 3, 2019): 1–13. http://dx.doi.org/10.1155/2019/5650245.
Full textSamreen, Shirina. "Packet Dropping Counter Measures in a MANET Through Reliable Routing Protocol Leveraging a Trust Management Framework." International Journal of Mobile Computing and Multimedia Communications 9, no. 3 (2018): 60–75. http://dx.doi.org/10.4018/ijmcmc.2018070104.
Full textOuyang, Chun-Juan, Ming Leng, Jie-Wu Xia, and Huan Liu. "Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1790268.
Full textNazir, Sajid, Shushma Patel, and Dilip Patel. "Autonomic Computing Architecture for SCADA Cyber Security." International Journal of Cognitive Informatics and Natural Intelligence 11, no. 4 (2017): 66–79. http://dx.doi.org/10.4018/ijcini.2017100104.
Full textLiu, Rosina. "Is Security, is Audit, and Control Measures in Telecommunication Toll Fraud." EDPACS 25, no. 3 (1997): 1–11. http://dx.doi.org/10.1080/07366989709452320.
Full textLu, Yi, Menghan Liu, Jie Zhou, and Zhigang Li. "Intrusion Detection Method Based on Adaptive Clonal Genetic Algorithm and Backpropagation Neural Network." Security and Communication Networks 2021 (July 13, 2021): 1–12. http://dx.doi.org/10.1155/2021/9938586.
Full text