Academic literature on the topic 'Home computer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Home computer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Home computer security"
Schmalz, Edward A. "Computer Security." Californian Journal of Health Promotion 3, no. 3 (September 1, 2005): 8–12. http://dx.doi.org/10.32398/cjhp.v3i3.643.
Full textDenning, Tamara, Tadayoshi Kohno, and Henry M. Levy. "Computer security and the modern home." Communications of the ACM 56, no. 1 (January 2013): 94–103. http://dx.doi.org/10.1145/2398356.2398377.
Full textThompson, Nik, Tanya Jane McGill, and Xuequn Wang. "“Security begins at home”: Determinants of home computer and mobile device security behavior." Computers & Security 70 (September 2017): 376–91. http://dx.doi.org/10.1016/j.cose.2017.07.003.
Full textBethke, Barney. "Home Page Security Risks." EDPACS 24, no. 1 (July 1996): 14–17. http://dx.doi.org/10.1080/07366989609451723.
Full textRose, D. "Revolution in home security." Communications Engineer 1, no. 1 (February 1, 2003): 36–39. http://dx.doi.org/10.1049/ce:20030109.
Full textXu, Meijia, Qiying Dong, Mai Zhou, Chenyu Wang, and Yangyang Liu. "Security Analysis on “Anonymous Authentication Scheme for Smart Home Environment with Provable Security”." Wireless Communications and Mobile Computing 2020 (November 14, 2020): 1–4. http://dx.doi.org/10.1155/2020/8838363.
Full textLetswamotse, Babedi B., Arun Cyril Jose, and Reza Malekian. "Improving smart home security; integrating behaviour prediction into smart home." International Journal of Sensor Networks 28, no. 4 (2018): 253. http://dx.doi.org/10.1504/ijsnet.2018.10017822.
Full textZhang, Junge, Yanhu Shan, and Kaiqi Huang. "ISEE Smart Home (ISH): Smart video analysis for home security." Neurocomputing 149 (February 2015): 752–66. http://dx.doi.org/10.1016/j.neucom.2014.08.002.
Full textKim, Geon Woo, Deok Gyu Lee, Jong Wook Han, and Sang Wook Kim. "Security policy specification for home network." International Journal of Ad Hoc and Ubiquitous Computing 4, no. 6 (2009): 372. http://dx.doi.org/10.1504/ijahuc.2009.028665.
Full textWang Xinxin, and Zhao Jianlin. "Design of Wireless Intelligent Home Security System." International Journal of Digital Content Technology and its Applications 7, no. 6 (March 31, 2013): 282–89. http://dx.doi.org/10.4156/jdcta.vol7.issue6.32.
Full textDissertations / Theses on the topic "Home computer security"
Frisk, Ulf, and Semir Drocic. "The State of Home Computer Security." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.
Full textHundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security.
This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed in the following chapter. These threats include worms, email worms, spyware and trojan horses. After this chapter some possible solutions for improving home computer security are presented. Finally this master thesis contains a short user survey to find out what the problems are in the real world and what can be doneto improve the current situation.
Uhlán, Christian. "Security in Digital Home Visits." Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74989.
Full textEdwards, Keith. "Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/947.
Full textÅhlfeldt, Rose-mharie. "Information Security in Home Healthcare." Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-618.
Full textHealthcare is very information-intensive. Hence, it has become necessary to use the support of computers in order to efficiently improve such an information-intensive organisation.
This thesis points out deficiencies in the area of information security in home healthcare regarding personal integrity and secrecy. Home healthcare is, in Sweden, performed by the municipalities. The work is based on the recommendations and common advice for processing of personal data compiled by the Data Inspection Board. Two municipalities in the Västra Götaland Region have been investigated. One of the municipalities has a manual system and the other has a computerized system for personal data management.
The work includes a field study where persons from both municipalities have been observed. It also includes interviews based on the comprehensive questions from the Data Inspection Board and questions arisen from the observations.
The work shows that a very clear need of training among personnel involved in home healthcare. It also shows the need for elaborate security measures including levels on access profiles. A weak point concerning security is also the heavy use of facsimile transmission for information distribution.
Tang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.
Full textChristensson, Daniel, and Emelie Eriksson. "The Smart Home From a Security Perspective." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40185.
Full textModig, Dennis. "Assessing performance and security in virtualized home residential gateways." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-9966.
Full textJonnalagadda, Hari Krishna. "Secure Communication Scheme in Smart Home Environment." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6270.
Full textClaar, Chester L. "The Adoption of Computer Security: An Analysis of Home Personal Computer User Behavior Using the Health Belief Model." DigitalCommons@USU, 2011. https://digitalcommons.usu.edu/etd/878.
Full textAndersen, Adelina. "Exploring Security and Privacy Practices of Home IoT Users." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-303002.
Full textInternet of Things (IoT) enheter har blivit vanligt förekommande i hem vilket gör deras säkerhet och integritet allt viktigare. Det har tidigare visats att användare av IoT i hemmet kan utgöra ett hot mot sig själva om de saknar kunskap om enheterna och kännedom om potentiella hot. För att undersöka hur användarnas vanor kring säkerhet och integitet kan förbättras är det först nödvändigt att utforska de nuvarande vanorna och vad som påverkar dessa. Detta undersöks i tio intervjuer som visar att vanorna främst påverkas av bekvämlighet, motivation och ansträngningen som krävs av användaren. Utifrån dessa insikter föreslås det att fysisk interaktion används som ett komplement till digitala lösningar för att förbättra vanorna kring säkerhet och integritet. Genom att ha ett fysiskt objekt som på ett enkelt sätt kan förmedla enheternas nuvarande status och är lika tillgängligt för alla medlemmar i ett hushåll kan säkerhet och integritet bli mer uppnåeligt för alla användare, oavsett deras nivå av kunskap och erfarenhet.
Books on the topic "Home computer security"
Greene, Thomas C. Computer Security for the Home and Small Office. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0711-5.
Full textSpeed, Tim. The personal Internet security guidebook: Keeping hackers and crackers out of your home. San Diego, Calif: Academic, 2002.
Find full textHolappa, Jarkko. Security threats and requirements for Java-based applications in the networked home environment. Espoo [Finland]: Technical Research Centre of Finland, 2001.
Find full textAlexander, Philip. Home and small business guide to protecting your computer network, electronic assets, and privacy. Westport, CT: Praeger Publishers, 2009.
Find full textAndrew, Brandt, ed. How to do everything with Windows XP home networking. New York: McGraw-Hill/Osborne, 2004.
Find full textSoper, Mark Edward. Absolute beginner's guide to home automation. Indianapolis, Ind: Que, 2005.
Find full textMünchen, Universität der Bundeswehr. Verteilte intelligente Mikrosysteme für den privaten Lebensbereich: VIMP : Verbundprojekt im Rahmen des BMBF-Forderungsschwerpunkts Mikrosystemtechnik : Abschlussseminar. Neubiberg bei München: Univ. der Bundeswehr München, 1999.
Find full textBidgoli, Hossein. The Internet Encyclopedia, G O, Volume 2. New York: John Wiley & Sons, Ltd., 2004.
Find full textBidgoli, Hossein. The Internet Encyclopedia, Volume 3. New York: John Wiley & Sons, Ltd., 2004.
Find full textBook chapters on the topic "Home computer security"
Hariri, Ali, Nicolas Giannelos, and Budi Arief. "Selective Forwarding Attack on IoT Home Security Kits." In Computer Security, 360–73. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2_23.
Full textTatang, Dennis, Tim Suurland, and Thorsten Holz. "Study of DNS Rebinding Attacks on Smart Home Devices." In Computer Security, 391–401. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2_25.
Full textYang, Lei, Chris Seasholtz, Bo Luo, and Fengjun Li. "Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways." In Computer Security, 575–94. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6_28.
Full textGregoriades, Andreas, Samuel Obadan, Harris Michail, Vicky Papadopoulou, and Despina Michael. "A Robotic System for Home Security Enhancement." In Lecture Notes in Computer Science, 43–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13778-5_6.
Full textWeerawardhana, Sachini, Subhojeet Mukherjee, Indrajit Ray, and Adele Howe. "Automated Extraction of Vulnerability Information for Home Computer Security." In Foundations and Practice of Security, 356–66. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17040-4_24.
Full textGonzález González, Oscar Arturo, Alina Mariana Pérez Soberanes, Víctor Hugo García Ortega, and Julio César Sosa Savedra. "Embedded Human Detection System for Home Security." In Communications in Computer and Information Science, 48–60. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62554-2_4.
Full textMundargi, Zarinabegam K., Isa Muslu, Susen Naik, Raju A. Nadaf, and Suvarna Kabadi. "Home Security Using Smart Photo Frame." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019), 758–68. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_84.
Full textPastor, Antonio, and Jesús Folgueira. "Practical Experience in NFV Security Field: Virtual Home Gateway." In Computer Communications and Networks, 127–48. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64653-4_5.
Full textKizza, Joseph Migga. "Conquering the Last Frontier in the Digital Invasion: The Home Front." In Guide to Computer Network Security, 511–24. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_24.
Full textKizza, Joseph Migga. "Conquering the Last Frontier in the Digital Invasion: The Home Front." In Guide to Computer Network Security, 535–48. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_25.
Full textConference papers on the topic "Home computer security"
Wash, Rick. "Folk models of home computer security." In the Sixth Symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1837110.1837125.
Full textWash, Rick. "Incentive design for home computer security." In CHI '07 extended abstracts. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1240866.1240882.
Full textEbrahim Abidi, M., Ani Liza Asnawi, N. FM Azmin, A. Z. Jusoh, S. Noorjannah Ibrahim, Huda Adibah Mohd Ramli, and Norun Abdul Malek. "Development of Voice Control and Home Security for Smart Home Automation." In 2018 7th International Conference on Computer and Communication Engineering (ICCCE). IEEE, 2018. http://dx.doi.org/10.1109/iccce.2018.8539258.
Full textHowe, Adele E., Indrajit Ray, Mark Roberts, Malgorzata Urbanska, and Zinta Byrne. "The Psychology of Security for the Home Computer User." In 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change. IEEE, 2012. http://dx.doi.org/10.1109/sp.2012.23.
Full textZhefan Jiang, Sangok Kim, Kanghee Lee, Hyunchul Bae, and Sangwook Kim. "Security service framework for home network." In Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05). IEEE, 2005. http://dx.doi.org/10.1109/icis.2005.112.
Full textFarid, Faizan, Muhammad Rehan, Faiza Faizan, and M. Tahir Qadri. "Home automation and security system via PSTN." In 2010 2nd International Conference on Education Technology and Computer (ICETC). IEEE, 2010. http://dx.doi.org/10.1109/icetc.2010.5529301.
Full textSneha, Talapala, Ssneha Balasubramanian, Vaishali R, Jay Vishaal J, Beulah A, and S. Angel Deborah. "Home Security System for the Hearing Impaired." In 2021 5th International Conference on Computer, Communication and Signal Processing (ICCCSP). IEEE, 2021. http://dx.doi.org/10.1109/icccsp52374.2021.9465502.
Full textMills, Annette, and Natasha Sahi. "An Empirical Study of Home User Intentions towards Computer Security." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2019. http://dx.doi.org/10.24251/hicss.2019.583.
Full textForoughi, Farhad, Hossein Hadipour, and Ahmad M. Shafiee. "High-Performance Monitoring Sensors for Home Computer Users Security Profiling." In 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE, 2020. http://dx.doi.org/10.1109/cybersa49311.2020.9139627.
Full textGai, Ayush, Sami Azam, Bharanidharan Shanmugam, Mirjam Jonkman, and Friso De Boer. "Categorisation of security threats for smart home appliances." In 2018 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2018. http://dx.doi.org/10.1109/iccci.2018.8441213.
Full text