Journal articles on the topic 'Computer networks – Security measures – Zimbabwe'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer networks – Security measures – Zimbabwe.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
NIKLEKAJ, Malvina. "Security in Computer Networks: Threats, Challenges, and Protection." Ingenious 3, no. 1 (2023): 51–60. http://dx.doi.org/10.58944/mcne2043.
Full textMtengwa, Bonnie Batsirai, Agripah Kandiero, and Stanislas Bigirimana. "Drivers of Mobile Money Services Development in Zimbabwe." International Journal of E-Business Research 17, no. 1 (2021): 42–64. http://dx.doi.org/10.4018/ijebr.2021010104.
Full textKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textSavytska, Liudmyla, Tetiana Korobeinikova, Oleh Kostiuk, Iryna Kolesnyk, and Oleksandr Dudnyk. "INTERNET OF THINGS PROTECTION MEANS IN THE CORPORATE COMPUTER NETWORK." Information technology and computer engineering 59, no. 1 (2024): 83–93. http://dx.doi.org/10.31649/1999-9941-2024-59-1-83-93.
Full textGuo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.
Full textLittlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Full textMo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.
Full textNwabueze, C. A., and R. E. Usiade. "Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks." International Journal of Trend in Scientific Research and Development 4, no. 2 (2020): 721–26. https://doi.org/10.5281/zenodo.3843000.
Full textCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Full textFang, Du, Zhang Kaiyuan, and Qian Jin. "Research on Information Security of Computer Networks in Universities based on Artificial Intelligence." Journal of Big Data and Computing 2, no. 3 (2024): 189–93. https://doi.org/10.62517/jbdc.202401329.
Full textLalit, Jain. "Computer Network: An Implementation of Important Security Awareness Public Wi-Fi." International Journal of Innovative Science and Research Technology 8, no. 5 (2023): 2400–2403. https://doi.org/10.5281/zenodo.8015814.
Full textZhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.
Full textKuprashvili, Henri. "Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)." Works of Georgian Technical University, no. 2(524) (June 6, 2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.
Full textSavytska, Liudmyla, Tetiana Korobeinikova, Ihor Leontiev, and Serhii Bohomolov. "METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK." Information technology and computer engineering 58, no. 3 (2023): 41–52. http://dx.doi.org/10.31649/1999-9941-2023-58-3-41-52.
Full textHewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Full textSmith, Martin. "Part 2 Personnel security measures within a computer installation." Computer Law & Security Review 6, no. 2 (1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.
Full textAghaei, John, and Morgan Beren. "An In-Depth Study on Privacy Law, Computer Viruses and Their Prevention." Mathematical Modeling and Algorithm Application 2, no. 1 (2024): 20–22. http://dx.doi.org/10.54097/dva59m48.
Full textHeinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.
Full textXing, Kongduo. "A Practical Study of Big Data Technology in Computer Network Information Security Processing." Journal of Electronic Research and Application 7, no. 6 (2023): 36–41. http://dx.doi.org/10.26689/jera.v7i6.5667.
Full textGwaka, Leon Tinashe. "Computer Supported Livestock Systems: The Potential of Digital Platforms to Revitalize a Livestock System in Rural Zimbabwe." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022): 1–28. http://dx.doi.org/10.1145/3555085.
Full textFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks." Journal of Information Technology Research 7, no. 3 (2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.
Full textYao, Benkun. "q-Rung Orthopair Fuzzy Approach for Multiple-Attribute Group Decision-Making and Application to Commercial Computer Network Security Evaluation." International Journal of Fuzzy System Applications 13, no. 1 (2024): 1–19. http://dx.doi.org/10.4018/ijfsa.356366.
Full textAlfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.
Full textWang, Xi, and Lei Shi. "Design of computer network security storage system based on cloud computing technology." Journal of Physics: Conference Series 2083, no. 4 (2021): 042084. http://dx.doi.org/10.1088/1742-6596/2083/4/042084.
Full textResearcher. "PRIVACY AND SECURITY IN AUTONOMOUS VEHICLE NETWORKS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 7–26. https://doi.org/10.5281/zenodo.13149456.
Full textDr. Kashyap C. Patel, Dr. Sachin A. Goswami, Dr. Saurabh A. Dave, and Ajaykumar Patel. "Crippling Connectivity : Unveiling the Network Disruption Potential of Vehicular Rogue Access Points." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 3 (2024): 632–43. http://dx.doi.org/10.32628/cseit241036.
Full textZhang, Ke. "A wormhole attack detection method for tactical wireless sensor networks." PeerJ Computer Science 9 (August 29, 2023): e1449. http://dx.doi.org/10.7717/peerj-cs.1449.
Full textA. D., Azernikov, Norkina A. N., Myseva E. R., and Chicherov K. A. "Innovative Technologies in Combating Cyber Crime." KnE Social Sciences 3, no. 2 (2018): 248. http://dx.doi.org/10.18502/kss.v3i2.1550.
Full textAhmad, S. Mashhour, and Saleh Zakaria. "Wireless Networks Security in Jordan: A Field Study." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 43–52. https://doi.org/10.5281/zenodo.4435315.
Full textZhou, Zhengchun, and Wenyao Shen. "HoneyPot : Enhancing Cybersecurity through a computer simulation technology." Highlights in Science, Engineering and Technology 105 (June 30, 2024): 97–101. http://dx.doi.org/10.54097/0q8h9k30.
Full textZhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.
Full textVASILENKO, Nikolai, Valeriia SLATVINSKA, and Valeriy RACHUK. "ANALYSIS OF UNAUTHORIZED ACCESS TO COMPUTER NETWORKS IN THE CONTEXT OF THEIR SECURITY MEASURES." Information Technology and Society, no. 2 (13) (2024): 12–16. http://dx.doi.org/10.32689/maup.it.2024.2.2.
Full textAye, Mya Sandar, Min Ya, and Myat Nwe Win Khin. "Fundamental Areas of Cyber Security on Latest Technology." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 981–83. https://doi.org/10.5281/zenodo.3589949.
Full textFouzar, Youcef, Ahmed Lakhssassi, and Ramakrishna Mundugar. "Secure Video Communication Using Multi-Equation Multi-Key Hybrid Cryptography." Future Internet 15, no. 12 (2023): 387. http://dx.doi.org/10.3390/fi15120387.
Full textVaishali, Tyagi, and Parul Tomar Dr. "Review on Various Security Attacks in Ad Hoc Networks." International Journal of Trend in Scientific Research and Development 2, no. 5 (2018): 270–74. https://doi.org/10.31142/ijtsrd15830.
Full textRam, M. Sethu, and R. Anandan. "Adaptive Multi-Layer Security Framework (AMLSF) for real-time applications in smart city networks." Journal of Autonomous Intelligence 7, no. 5 (2024): 1370. http://dx.doi.org/10.32629/jai.v7i5.1370.
Full textFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks." Journal of Information Technology Research 8, no. 1 (2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.
Full textFeng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, and Qi Han. "A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment." Complexity 2021 (June 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.
Full textKounavis, Michael, David Durham, Sergej Deutsch, and Ken Grewal. "Security definitions, entropy measures and constructions for implicitly detecting data corruption." Computer Communications 160 (July 2020): 815–46. http://dx.doi.org/10.1016/j.comcom.2020.05.022.
Full textMonica Mehrotra, Md Shamsul Haque Ansari,. "Lightweight Cryptography based Communication Model for Device Identification, Mutual Authentication, and Encryption in a Smart City Environment." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 986–94. http://dx.doi.org/10.17762/ijritcc.v11i9.8989.
Full textSheela, D., and G. Mahadevan. "Mobile Agent Based Enhanced Security for Wireless Sensor Networks." International Journal of Business Data Communications and Networking 10, no. 2 (2014): 15–29. http://dx.doi.org/10.4018/ijbdcn.2014040102.
Full textКобцев, О. Е., А. И. Шеншин, В. М. Питолин, Л. В. Паринова, Ю. Г. Пастернак, and Ю. В. Макаров. "NETWORK ATTACKS BY COMPUTER VIRUSES: SPECIFIC INFORMATION SECURITY POLICY." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 27, no. 1(-) (2024): 67–80. http://dx.doi.org/10.36622/1682-7813.2024.27.1.004.
Full textDolente, Filippo, Rosario Giuseppe Garroppo, and Michele Pagano. "A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions." Future Internet 16, no. 1 (2023): 1. http://dx.doi.org/10.3390/fi16010001.
Full textNazir, Sajid, Shushma Patel, and Dilip Patel. "Autonomic Computing Architecture for SCADA Cyber Security." International Journal of Cognitive Informatics and Natural Intelligence 11, no. 4 (2017): 66–79. http://dx.doi.org/10.4018/ijcini.2017100104.
Full textSlamet, Slamet. "Pelatihan jaringan komputer dan keamanannya bagi dosen dan mahasiswa Dili Institute of Technology (DIT) di Undika Surabaya." TEKMULOGI: Jurnal Pengabdian Masyarakat 3, no. 1 (2023): 59–66. http://dx.doi.org/10.17509/tmg.v3i1.58074.
Full textLiang, Jiaqi, Yibei Wu, Jun’e Li, Xiong Chen, Heqin Tong, and Ming Ni. "Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks." Complexity 2021 (February 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/6659879.
Full textRaxmanova, Saodat Djurayevna. "IMPROVING THE POSSIBILITIES OF USING COMPUTER NETWORKS IN HIGH SCHOOLS." Multidisciplinary Journal of Science and Technology 5, no. 5 (2025): 1165–70. https://doi.org/10.5281/zenodo.15511917.
Full textPeng, Yu, Xinrong Liu, Ming Li, et al. "Sensing network security prevention measures of BIM smart operation and maintenance system." Computer Communications 161 (September 2020): 360–67. http://dx.doi.org/10.1016/j.comcom.2020.07.039.
Full textOuyang, Chun-Juan, Ming Leng, Jie-Wu Xia, and Huan Liu. "Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1790268.
Full text