Journal articles on the topic 'Computer software – Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer software – Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Full textKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Full textSun, Ning Ning, and Li Hua Ma. "Research and Maintenance of Computer Network Security." Applied Mechanics and Materials 687-691 (November 2014): 2431–34. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2431.
Full textCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Full textVijayaraghavan, V., Sanjoy Paul, and N. Rajarathnam. "iMeasure Security (iMS): A Framework for Quantitative Assessment of Security Measures and its Impacts." Information Security Journal: A Global Perspective 19, no. 4 (2010): 213–25. http://dx.doi.org/10.1080/19393551003762223.
Full textAituganova, Zh T., B. A. Talpakova, and B. K. Zhussipbek. "EFFECTIVE WAYS TO INCREASE THE SECURITY OF STORING INFORMATION IN A DATABASE." BULLETIN Series of Physics & Mathematical Sciences 70, no. 2 (2020): 199–206. http://dx.doi.org/10.51889/2020-2.1728-7901.31.
Full textAziz, Israa T., and Ihsan H. Abdulqadder. "An Overview on SDN and NFV Security Orchestration in Cloud Network Environment." Cihan University-Erbil Scientific Journal 5, no. 1 (2021): 20–27. http://dx.doi.org/10.24086/cuesj.v5n1y2021.pp20-27.
Full textLiu, Rosina. "Is Security, is Audit, and Control Measures in Telecommunication Toll Fraud." EDPACS 25, no. 3 (1997): 1–11. http://dx.doi.org/10.1080/07366989709452320.
Full textBoutnaru, Shlomi, and Arnon Hershkovitz. "Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language." Interdisciplinary Journal of e-Skills and Lifelong Learning 11 (2015): 123–47. http://dx.doi.org/10.28945/2292.
Full textA. D., Azernikov, Norkina A. N., Myseva E. R., and Chicherov K. A. "Innovative Technologies in Combating Cyber Crime." KnE Social Sciences 3, no. 2 (2018): 248. http://dx.doi.org/10.18502/kss.v3i2.1550.
Full textHulak, Hennadii, Volodymyr Buriachok, Pavlo Skladannyi, and Lydia Kuzmenko. "CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 6–28. http://dx.doi.org/10.28925/2663-4023.2020.10.628.
Full textZhang, Wan Chen. "Design of Firewall Security Control Program." Applied Mechanics and Materials 556-562 (May 2014): 5999–6002. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5999.
Full textDeng, Qiao, Hui Zhang, Jun Li, Xuejun Hou, and Hao Wang. "Study of Downhole Shock Loads for Ultra-Deep Well Perforation and Optimization Measures." Energies 12, no. 14 (2019): 2743. http://dx.doi.org/10.3390/en12142743.
Full textWang, Qian, Jiadong Ren, Xiaoli Yang, Yongqiang Cheng, Darryl N. Davis, and Changzhen Hu. "Security Feature Measurement for Frequent Dynamic Execution Paths in Software System." Security and Communication Networks 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/5716878.
Full textJyothi, G., Ch V. Bhargavi, G. Mani, Ch Usha Kumari, and E. Laxmi Lydia. "Analysis of Various Security Methods of Virtual Machines in Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 12 (2020): 5368–77. http://dx.doi.org/10.1166/jctn.2020.9430.
Full textNazir, Sajid, Shushma Patel, and Dilip Patel. "Autonomic Computing Architecture for SCADA Cyber Security." International Journal of Cognitive Informatics and Natural Intelligence 11, no. 4 (2017): 66–79. http://dx.doi.org/10.4018/ijcini.2017100104.
Full textQadri, Yazdan Ahmad, Rashid Ali, Arslan Musaddiq, Fadi Al-Turjman, Dae Wan Kim, and Sung Won Kim. "The limitations in the state-of-the-art counter-measures against the security threats in H-IoT." Cluster Computing 23, no. 3 (2020): 2047–65. http://dx.doi.org/10.1007/s10586-019-03036-7.
Full textRoy Sarkar, Kuheli. "Assessing insider threats to information security using technical, behavioural and organisational measures." Information Security Technical Report 15, no. 3 (2010): 112–33. http://dx.doi.org/10.1016/j.istr.2010.11.002.
Full textLee, Sangdo, and Jun-Ho Huh. "An effective security measures for nuclear power plant using big data analysis approach." Journal of Supercomputing 75, no. 8 (2018): 4267–94. http://dx.doi.org/10.1007/s11227-018-2440-4.
Full textEr-rajy, Latifa, My Ahmed El Kiram, and Mohamed El Ghazouani. "New Security Risk Value Estimate Method for Android Applications." Computer Journal 63, no. 4 (2019): 593–603. http://dx.doi.org/10.1093/comjnl/bxz109.
Full textFerreira, Ana, and Soraia Teles. "Persuasion: How phishing emails can influence users and bypass security measures." International Journal of Human-Computer Studies 125 (May 2019): 19–31. http://dx.doi.org/10.1016/j.ijhcs.2018.12.004.
Full textDas, Amit, and Habib Ullah Khan. "Security behaviors of smartphone users." Information & Computer Security 24, no. 1 (2016): 116–34. http://dx.doi.org/10.1108/ics-04-2015-0018.
Full textGodi, Sudhakar, and Rajasekhar Kurra. "Novel security issues and mitigation measures in cloud computing: an Indian perspective." International Journal of Computer Applications in Technology 58, no. 4 (2018): 267. http://dx.doi.org/10.1504/ijcat.2018.095946.
Full textGodi, Sudhakar, and Rajasekhar Kurra. "Novel security issues and mitigation measures in cloud computing: an Indian perspective." International Journal of Computer Applications in Technology 58, no. 4 (2018): 267. http://dx.doi.org/10.1504/ijcat.2018.10017214.
Full textYu, Heng, Yimin Wang, Feng Wang, and Peiyun Qiu. "Understanding Impacts of Security Check on Passenger Flow in a Metro Station and Improving Measures: A Case Study in Guangzhou, China." Journal of Advanced Transportation 2019 (February 3, 2019): 1–9. http://dx.doi.org/10.1155/2019/7438545.
Full textKhan, Muhammad Salman, Ken Ferens, and Witold Kinsner. "A Chaotic Complexity Measure for Cognitive Machine Classification of Cyber-Attacks on Computer Networks." International Journal of Cognitive Informatics and Natural Intelligence 8, no. 3 (2014): 45–69. http://dx.doi.org/10.4018/ijcini.2014070104.
Full textFei, Jiaxuan, Qigui Yao, Mingliang Chen, Xiangqun Wang, and Jie Fan. "The Abnormal Detection for Network Traffic of Power IoT Based on Device Portrait." Scientific Programming 2020 (November 24, 2020): 1–9. http://dx.doi.org/10.1155/2020/8872482.
Full textChang, Juan, Jian Hua Zhang, Dian Ji Zhang, and Zhi Gang Liu. "Research on Computer Information System of Disaster Warning Based on ANSYS and MATLAB." Applied Mechanics and Materials 484-485 (January 2014): 958–62. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.958.
Full textJäppinen, Pekka, Mika Yrjölä, and Jari Porras. "Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service." Journal of Communications Software and Systems 1, no. 2 (2017): 107. http://dx.doi.org/10.24138/jcomss.v1i2.308.
Full textSteinbart, Paul John, Robyn L. Raschke, Graham Gal, and William N. Dilla. "SECURQUAL: An Instrument for Evaluating the Effectiveness of Enterprise Information Security Programs." Journal of Information Systems 30, no. 1 (2015): 71–92. http://dx.doi.org/10.2308/isys-51257.
Full textMurugesan, M., P. Balamurugan, J. Santhosh, and G. Arulkumaran. "Threats and Emerging Developments in Cyber Security." Webology 17, no. 2 (2020): 587–98. http://dx.doi.org/10.14704/web/v17i2/web17053.
Full textMittal, Ruchi, and M. P. S. Bhatia. "Detection of Suspicious or Un-Trusted Users in Crypto-Currency Financial Trading Applications." International Journal of Digital Crime and Forensics 13, no. 1 (2021): 79–93. http://dx.doi.org/10.4018/ijdcf.2021010105.
Full textRajivan, Prashanth, Pablo Moriano, Timothy Kelley, and L. Jean Camp. "Factors in an end user security expertise instrument." Information & Computer Security 25, no. 2 (2017): 190–205. http://dx.doi.org/10.1108/ics-04-2017-0020.
Full textHuo, Xiao Jing, Rui Qing Zhang, Hui Wang, Dong Ping Qian, and Jia Xu Teng. "Real-Time Measurement of Friction Coefficient in the Frictional Performance Test of Brake Disk." Key Engineering Materials 373-374 (March 2008): 484–87. http://dx.doi.org/10.4028/www.scientific.net/kem.373-374.484.
Full textSkotnes, Ruth Østgaard. "Management commitment and awareness creation – ICT safety and security in electric power supply network companies." Information & Computer Security 23, no. 3 (2015): 302–16. http://dx.doi.org/10.1108/ics-02-2014-0017.
Full textGayathri, V. M., and R. Nedunchelian. "Mitigating combinatorial attacks in node to node communication using high level security measures based on analysis of efficiency factor through regression and deviation." Cluster Computing 22, S1 (2018): 165–76. http://dx.doi.org/10.1007/s10586-018-2004-7.
Full textYin, Qiang, and Gong Fa Li. "Test Analysis of the 60 Tons Converter." Applied Mechanics and Materials 494-495 (February 2014): 432–35. http://dx.doi.org/10.4028/www.scientific.net/amm.494-495.432.
Full textRietz, René, Radoslaw Cwalinski, Hartmut König, and Andreas Brinner. "An SDN-Based Approach to Ward Off LAN Attacks." Journal of Computer Networks and Communications 2018 (November 21, 2018): 1–12. http://dx.doi.org/10.1155/2018/4127487.
Full textÇepik, Hilal, Ömer Aydın, and Gökhan Dalkılıç. "Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device." Proceedings 74, no. 1 (2021): 1. http://dx.doi.org/10.3390/proceedings2021074001.
Full textNorouzzadeh Gil Molk, Ali Mohammad, Mohammad Reza Aref, and Reza Ramazani Khorshiddoust. "Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications." Computational Intelligence and Neuroscience 2021 (September 10, 2021): 1–17. http://dx.doi.org/10.1155/2021/3583275.
Full textSaeed A Alqahtani, Mohammed, and Eila Erfani. "Exploring the Relationship Between Technology Adoption and Cyber Security Compliance." International Journal of Electronic Government Research 17, no. 4 (2021): 40–62. http://dx.doi.org/10.4018/ijegr.2021100103.
Full textPan, Wen-Tsao, Yi Liu, Huan Jiang, et al. "Model Construction of Enterprise Financial Early Warning Based on Quantum FOA-SVR." Scientific Programming 2021 (September 15, 2021): 1–8. http://dx.doi.org/10.1155/2021/5018917.
Full textPecheniuk, A. V. "Conceptual principles for ensuring effective protection of information in the context of economic security of the enterprise." Ekonomìka ta upravlìnnâ APK, no. 1 (155) (May 21, 2020): 84–92. http://dx.doi.org/10.33245/2310-9262-2020-155-1-84-92.
Full textAlshare, Khaled A., Peggy L. Lane, and Michael R. Lane. "Information security policy compliance: a higher education case study." Information & Computer Security 26, no. 1 (2018): 91–108. http://dx.doi.org/10.1108/ics-09-2016-0073.
Full textHidayat, Rahmat, Iwan Tri Riyadi Yanto, Azizul Azhar Ramli, and Mohd Farhan Md Fudzee. "Similarity measure fuzzy soft set for phishing detection." International Journal of Advances in Intelligent Informatics 7, no. 1 (2021): 101. http://dx.doi.org/10.26555/ijain.v7i1.605.
Full textEt.al, DR B. BARACKATH. "“The Impact Of Digital Wallets Threats And Safety Measures On The Level Of Usage” – A Study With Reference To Chennai." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 95–100. http://dx.doi.org/10.17762/turcomat.v12i6.1272.
Full textSong, Meng Hua. "Analysis of Risks for Virtualization Technology." Applied Mechanics and Materials 539 (July 2014): 374–77. http://dx.doi.org/10.4028/www.scientific.net/amm.539.374.
Full textCarrillo-Mondejar, Javier, Juan Manuel Castelo Gomez, Carlos Núñez-Gómez, Jose Roldán Gómez, and José Luis Martínez. "Automatic Analysis Architecture of IoT Malware Samples." Security and Communication Networks 2020 (October 26, 2020): 1–12. http://dx.doi.org/10.1155/2020/8810708.
Full textSteinbart, Paul John, Robyn L. Raschke, Graham Gal, and William N. Dilla. "Information Security Professionals' Perceptions about the Relationship between the Information Security and Internal Audit Functions." Journal of Information Systems 27, no. 2 (2013): 65–86. http://dx.doi.org/10.2308/isys-50510.
Full textKarlsson, Fredrik, Martin Karlsson, and Joachim Åström. "Measuring employees’ compliance – the importance of value pluralism." Information & Computer Security 25, no. 3 (2017): 279–99. http://dx.doi.org/10.1108/ics-11-2016-0084.
Full text