Academic literature on the topic 'Home computer security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Home computer security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Home computer security"

1

Schmalz, Edward A. "Computer Security." Californian Journal of Health Promotion 3, no. 3 (September 1, 2005): 8–12. http://dx.doi.org/10.32398/cjhp.v3i3.643.

Full text
Abstract:
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home. This article is a brief overview of some of the precautions that should be taken on a daily basis to protect your computer systems, files, data, and other pertinent information.
APA, Harvard, Vancouver, ISO, and other styles
2

Denning, Tamara, Tadayoshi Kohno, and Henry M. Levy. "Computer security and the modern home." Communications of the ACM 56, no. 1 (January 2013): 94–103. http://dx.doi.org/10.1145/2398356.2398377.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thompson, Nik, Tanya Jane McGill, and Xuequn Wang. "“Security begins at home”: Determinants of home computer and mobile device security behavior." Computers & Security 70 (September 2017): 376–91. http://dx.doi.org/10.1016/j.cose.2017.07.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bethke, Barney. "Home Page Security Risks." EDPACS 24, no. 1 (July 1996): 14–17. http://dx.doi.org/10.1080/07366989609451723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rose, D. "Revolution in home security." Communications Engineer 1, no. 1 (February 1, 2003): 36–39. http://dx.doi.org/10.1049/ce:20030109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Meijia, Qiying Dong, Mai Zhou, Chenyu Wang, and Yangyang Liu. "Security Analysis on “Anonymous Authentication Scheme for Smart Home Environment with Provable Security”." Wireless Communications and Mobile Computing 2020 (November 14, 2020): 1–4. http://dx.doi.org/10.1155/2020/8838363.

Full text
Abstract:
As an important application of the Internet of Things, smart home has greatly facilitated our life. Since the communication channels of smart home are insecure and the transmitted data are usually sensitive, a secure and anonymous user authentication scheme is required. Numerous attempts have been taken to design such authentication schemes. Recently, Shuai et al. (Computer & Security 86(2019):132146) designed an anonymous authentication scheme for smart home using elliptic curve cryptography. They claimed that the proposed scheme is secure against various attacks and provides ideal attributes. However, we show that their scheme cannot resist inside attack and offline dictionary attack and also fails to achieve forward secrecy. Furthermore, we give some suggestions to enhance the security of the scheme. These suggestions also apply to other user authentication schemes with similar flaws.
APA, Harvard, Vancouver, ISO, and other styles
7

Letswamotse, Babedi B., Arun Cyril Jose, and Reza Malekian. "Improving smart home security; integrating behaviour prediction into smart home." International Journal of Sensor Networks 28, no. 4 (2018): 253. http://dx.doi.org/10.1504/ijsnet.2018.10017822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Junge, Yanhu Shan, and Kaiqi Huang. "ISEE Smart Home (ISH): Smart video analysis for home security." Neurocomputing 149 (February 2015): 752–66. http://dx.doi.org/10.1016/j.neucom.2014.08.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Geon Woo, Deok Gyu Lee, Jong Wook Han, and Sang Wook Kim. "Security policy specification for home network." International Journal of Ad Hoc and Ubiquitous Computing 4, no. 6 (2009): 372. http://dx.doi.org/10.1504/ijahuc.2009.028665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang Xinxin, and Zhao Jianlin. "Design of Wireless Intelligent Home Security System." International Journal of Digital Content Technology and its Applications 7, no. 6 (March 31, 2013): 282–89. http://dx.doi.org/10.4156/jdcta.vol7.issue6.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Home computer security"

1

Frisk, Ulf, and Semir Drocic. "The State of Home Computer Security." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.

Full text
Abstract:

Hundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security.

This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed in the following chapter. These threats include worms, email worms, spyware and trojan horses. After this chapter some possible solutions for improving home computer security are presented. Finally this master thesis contains a short user survey to find out what the problems are in the real world and what can be doneto improve the current situation.

APA, Harvard, Vancouver, ISO, and other styles
2

Uhlán, Christian. "Security in Digital Home Visits." Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74989.

Full text
Abstract:
The purpose of this thesis is to study security for digital home visits, where traditional home visits are replaced by digital home visits using digital technology. The report examines the safety aspects for welfare technology solutions where data is collected from sensor systems and digital platforms and examines di↵erent Swedish laws that implies on a digital home visit. The study proposes an implementation of a prototype application to support users, relatives, and healthcare professionals to conduct digital home visits in a safe manner. The chosen scenario of the digital home visit was to check whether the person has eaten food during the day or not. This was done in a lab kitchen at Lule°a University of Technology with help of Z-wave sensors and a implemented systems. The result is displayed on a secure website. The solution is discussed and compared to other technical solutions of this problem and also to several Swedish laws. This paper finishes with a section aimed to provide a variety of recommendations when implementing a similar system.
APA, Harvard, Vancouver, ISO, and other styles
3

Edwards, Keith. "Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/947.

Full text
Abstract:
Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the incentive to take security awareness training on their own. Research in security awareness and security behavior has produced conflicting results. Therefore, it is not clear, how security aware home computer users are or to what extent security awareness affects the security behavior of home computer users. The goal of this study was to determine if there is a relationship between security awareness and users practicing good security behavior. This study adapted its research model from the health belief model (HBM), which accesses a patient’s decision to perform health related activities. The research model included the HBM constructs of perceived severity, perceived susceptibility, perceived threat, perceived benefits, perceived barriers, cues to action, and self-efficacy. The research model also contained the security awareness (SA) and concern for information privacy (CFIP) constructs. The model used SA to ascertain the effect of security awareness on a person’s self-efficacy in information security (SEIS), perceived threat, CFIP, and security behavior. The research model included CFIP to ascertain its effect on security behavior. The developed survey measured the participants' security awareness, concern for information privacy, self-efficacy, expectations of security actions, perceived security threats, cues to action, and security behavior. SurveyMonkey administered the survey. SurveyMonkey randomly selected 267 participants from its 30 million-member base. The findings of this study indicate home computer users are security aware. SA does not have a direct effect on a user’s security behavior, perceived threat, or CFIP. However, it does have influence on SEIS. SEIS has a weak effect on expectations. CFIP has an effect on a user’s security behavior after removing perceived threat from the research model. Perceived susceptibility has a direct effect on a user’s security behavior, but perceived severity or perceived threat does not.
APA, Harvard, Vancouver, ISO, and other styles
4

Åhlfeldt, Rose-mharie. "Information Security in Home Healthcare." Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-618.

Full text
Abstract:

Healthcare is very information-intensive. Hence, it has become necessary to use the support of computers in order to efficiently improve such an information-intensive organisation.

This thesis points out deficiencies in the area of information security in home healthcare regarding personal integrity and secrecy. Home healthcare is, in Sweden, performed by the municipalities. The work is based on the recommendations and common advice for processing of personal data compiled by the Data Inspection Board. Two municipalities in the Västra Götaland Region have been investigated. One of the municipalities has a manual system and the other has a computerized system for personal data management.

The work includes a field study where persons from both municipalities have been observed. It also includes interviews based on the comprehensive questions from the Data Inspection Board and questions arisen from the observations.

The work shows that a very clear need of training among personnel involved in home healthcare. It also shows the need for elaborate security measures including levels on access profiles. A weak point concerning security is also the heavy use of facsimile transmission for information distribution.

APA, Harvard, Vancouver, ISO, and other styles
5

Tang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.

Full text
Abstract:
With the fast development of wireless networks and devices, Mobile IP is expected to be used widely so that mobile users can access the Internet anywhere, anytime without interruption. However, some problems, such as firewall traversal and use of private IP addresses, restrict use of Mobile IP. The objective of this thesis is to design original schemes that can enable a mobile node at abroad to access its home network as well as the Internet securely and that can help Mobile IP to be used widely and commercially. Our solutions are secure, efficient, and scalable. They can be implemented and maintained easily. In this thesis, we mainly consider Mobile IPv4, instead of Mobile IPv6. Three research topics are discussed. In each topic, the challenges are investigated and the new solutions are presented. The first research topic solves the firewall traversal problems in Mobile IP. A mobile node cannot access its firewall-protected home network if it fails the authentication by the firewall. We propose that an IPsec tunnel be established between the firewall and the foreign agent for firewall traversal and that an IPsec transport security association be shared by the mobile node and a correspondent node for end-to-end security. The second topic researches further on firewall traversal problems and investigates the way of establishing security associations among network entities. A new security model and a new key distribution method are developed. With the help of the security model and keys, the firewall and the relevant network entities set up IPsec security associations to achieve firewall traversal. A mobile node from a private home network cannot communicate with other hosts with its private home address when it is visiting a public foreign network. A novel and useful solution is presented in the third research topic. We suggest that the mobile node use its Network Access Identifier (NAI) as its identification and obtain a public home address from its home agent. In addition, a new tunnel between the mobile node and its home agent is proposed.
APA, Harvard, Vancouver, ISO, and other styles
6

Christensson, Daniel, and Emelie Eriksson. "The Smart Home From a Security Perspective." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40185.

Full text
Abstract:
Based on the fact that many electronic devices are digitalized in our world in order to facilitate our lives, there is a large potential for development in the home. Smart Home solutions are giving us the opportunity to control and manage for example alarms, electricity and surveillance but the technology's rapid improvement paves the way for issues related to security. The objectives for this work will bring up common communication technologies, security and vulnerabilities in the context of a Smart Home and what could be done for future work. In order to investigate the objectives, a literature study has been conducted together with an experiment. The experiment result exploits a weakness in a common Smart Home technology used in the network enable devices in the form of threats and vulnerabilities. In order to mitigate and minimize threats and vulnerabilities one conclusion is that a security policy could be produced. This security policy should provide the user with good practice of how to manage security in order to mitigate vulnerabilities and threats within the Smart Home.
APA, Harvard, Vancouver, ISO, and other styles
7

Modig, Dennis. "Assessing performance and security in virtualized home residential gateways." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-9966.

Full text
Abstract:
Over the past years the use of digital devices has increased heavily, and home networks continue to grow in size and complexity. By the use of virtualized residential gateways, advanced functionality can be moved away from the home and thereby decrease the administrative burden for the home user. Using virtualizing residential gateways instead of physical devices creates new challenges. This project is looking in to how the choice of virtualization technology impacts performance and security by investigating operating system level virtualization in contrast to full virtualization for use in home residential gateways. Results show that operating system level virtualization uses fewer resources in terms of disk, memory, and processor in virtualized residential gateways. The results also show that with choice of setups and virtualization technologies different security issues arises, which has been analyzed in lab environment. Recommendations regarding solutions to security issues are proposed in the concluding parts of this thesis.
APA, Harvard, Vancouver, ISO, and other styles
8

Jonnalagadda, Hari Krishna. "Secure Communication Scheme in Smart Home Environment." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6270.

Full text
Abstract:
Internet of Things, has started to mark its existence from past few years. Right from its inception with a coke machine at Carnegie Mellon University, it has come a long way, connecting billions of devices to internet. This journey is well supported by the advancements in networking, hardware miniaturization and sensing capabilities. Diverse nature of applications of Internet of Things, has cut the communication barriers between the varieties of fields ranging from manufacturing industry to health-care industry. Smart Home is one such application of Internet of Things. Connectivity of home appliances, to achieve automation in living, defines Smart Home. Out of welter of applications that are derived from Internet of Things, this thesis concentrates on Smart Home. Smart Home, in practical is expected to conserve lot of energy, by achieving automation of home appliances, on par with best living experience. Existing technologies such as Z-wave, One-Net, ZigBee, Insteon, had already occupied the Smart Home communication. However, these technologies face the problem of identifying the smart devices uniquely and also exhibit security vulnerabilities. Proposed scheme exploits accelerometer fingerprinting to identify the smart devices uniquely. Security vulnerabilities of existing protocols are addressed by encrypting the data on move with CCM mode of AES encryption.
APA, Harvard, Vancouver, ISO, and other styles
9

Claar, Chester L. "The Adoption of Computer Security: An Analysis of Home Personal Computer User Behavior Using the Health Belief Model." DigitalCommons@USU, 2011. https://digitalcommons.usu.edu/etd/878.

Full text
Abstract:
The primary purpose of this research was to examine the adoption of computer security software in the home computer environment. The use of the Health Belief Model as a framework to design a model to examine home user adoption of computer security provided the basis for this research. The method of the investigation was a cross-sectional study using a self-reported web-based survey to test the theoretical model derived from the Health Belief Model. The survey targeted individuals who are responsible for the selection, installation, and maintenance of software on their home computers. The data collection relied on a snowball sampling technique that recruited a total of 186 participants who completed the online survey. The research model contains a total of 26 hypothesized relationships that were tested using multiple regression analysis techniques. The research model contains six main predicting variables (perceived vulnerability, perceived severity, perceived benefits, perceived barriers, self-efficacy, and cues to action) and four moderating variables (age, gender, education, and prior experience of attack). The model explains 30.4% of the variance in computer security usage, the dependent variable in the research model. The results demonstrate that certain constructs found in the Health Belief Model are more effective than others in motivating individuals to utilize computer security software. Specifically, the results show that perceived vulnerability (H1), perceived barriers (H4), self-efficacy (H5), and the two-way interactions of age and barriers (H8d), education and benefits (H9c), prior experience and perceived severity (H10b), and prior experience and self-efficacy (H10e) had significant effects on computer security usage. Additionally, prior experience was found to have a significant main effect on the dependent variable. Information from this research provides evidence that the Health Belief Model can be used to study the computer security usage behavior of home computer users. Further, the relationship of perceived vulnerability and computer security usage provides a way for practitioners to increase computer security usage behavior through targeted media campaigns.
APA, Harvard, Vancouver, ISO, and other styles
10

Andersen, Adelina. "Exploring Security and Privacy Practices of Home IoT Users." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-303002.

Full text
Abstract:
Internet of Things (IoT) devices are becoming more and more common in homes, making the security and privacy of these increasingly important. Previous research has found that home IoT users can become a threat to themselves if they lack knowledge of their devices and awareness of potential threats. To investigate how the users’ security and privacy practices can be improved, it is necessary to understand the current everyday practices and what impacts these. This is examined in 10 interviews, revealing that the practices are primarily influenced by convenience, motivation and the effort required from the user. Using these insights, this thesis suggests that tangible interaction needs to be used as a complement to digital solutions to improve the security and privacy practices. By having a physical object that in a simple way can inform everyone of the current security and privacy situation and is equally accessible for all members of a household, the security and privacy can become more attainable for all users no matter their level of knowledge and experience.
Internet of Things (IoT) enheter har blivit vanligt förekommande i hem vilket gör deras säkerhet och integritet allt viktigare. Det har tidigare visats att användare av IoT i hemmet kan utgöra ett hot mot sig själva om de saknar kunskap om enheterna och kännedom om potentiella hot. För att undersöka hur användarnas vanor kring säkerhet och integitet kan förbättras är det först nödvändigt att utforska de nuvarande vanorna och vad som påverkar dessa. Detta undersöks i tio intervjuer som visar att vanorna främst påverkas av bekvämlighet, motivation och ansträngningen som krävs av användaren. Utifrån dessa insikter föreslås det att fysisk interaktion används som ett komplement till digitala lösningar för att förbättra vanorna kring säkerhet och integritet. Genom att ha ett fysiskt objekt som på ett enkelt sätt kan förmedla enheternas nuvarande status och är lika tillgängligt för alla medlemmar i ett hushåll kan säkerhet och integritet bli mer uppnåeligt för alla användare, oavsett deras nivå av kunskap och erfarenhet.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Home computer security"

1

Greene, Thomas C. Computer Security for the Home and Small Office. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0711-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Speed, Tim. The personal Internet security guidebook: Keeping hackers and crackers out of your home. San Diego, Calif: Academic, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Holappa, Jarkko. Security threats and requirements for Java-based applications in the networked home environment. Espoo [Finland]: Technical Research Centre of Finland, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alexander, Philip. Home and small business guide to protecting your computer network, electronic assets, and privacy. Westport, CT: Praeger Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Andrew, Brandt, ed. How to do everything with Windows XP home networking. New York: McGraw-Hill/Osborne, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

J, Velte Toby, ed. Build your own smart home. New York: McGraw-Hill/Osborne, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Soper, Mark Edward. Absolute beginner's guide to home automation. Indianapolis, Ind: Que, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

München, Universität der Bundeswehr. Verteilte intelligente Mikrosysteme für den privaten Lebensbereich: VIMP : Verbundprojekt im Rahmen des BMBF-Forderungsschwerpunkts Mikrosystemtechnik : Abschlussseminar. Neubiberg bei München: Univ. der Bundeswehr München, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bidgoli, Hossein. The Internet Encyclopedia, G O, Volume 2. New York: John Wiley & Sons, Ltd., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bidgoli, Hossein. The Internet Encyclopedia, Volume 3. New York: John Wiley & Sons, Ltd., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Home computer security"

1

Hariri, Ali, Nicolas Giannelos, and Budi Arief. "Selective Forwarding Attack on IoT Home Security Kits." In Computer Security, 360–73. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tatang, Dennis, Tim Suurland, and Thorsten Holz. "Study of DNS Rebinding Attacks on Smart Home Devices." In Computer Security, 391–401. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Lei, Chris Seasholtz, Bo Luo, and Fengjun Li. "Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways." In Computer Security, 575–94. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99073-6_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gregoriades, Andreas, Samuel Obadan, Harris Michail, Vicky Papadopoulou, and Despina Michael. "A Robotic System for Home Security Enhancement." In Lecture Notes in Computer Science, 43–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13778-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Weerawardhana, Sachini, Subhojeet Mukherjee, Indrajit Ray, and Adele Howe. "Automated Extraction of Vulnerability Information for Home Computer Security." In Foundations and Practice of Security, 356–66. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17040-4_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

González González, Oscar Arturo, Alina Mariana Pérez Soberanes, Víctor Hugo García Ortega, and Julio César Sosa Savedra. "Embedded Human Detection System for Home Security." In Communications in Computer and Information Science, 48–60. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62554-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mundargi, Zarinabegam K., Isa Muslu, Susen Naik, Raju A. Nadaf, and Suvarna Kabadi. "Home Security Using Smart Photo Frame." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019), 758–68. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pastor, Antonio, and Jesús Folgueira. "Practical Experience in NFV Security Field: Virtual Home Gateway." In Computer Communications and Networks, 127–48. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64653-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kizza, Joseph Migga. "Conquering the Last Frontier in the Digital Invasion: The Home Front." In Guide to Computer Network Security, 511–24. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kizza, Joseph Migga. "Conquering the Last Frontier in the Digital Invasion: The Home Front." In Guide to Computer Network Security, 535–48. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Home computer security"

1

Wash, Rick. "Folk models of home computer security." In the Sixth Symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1837110.1837125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wash, Rick. "Incentive design for home computer security." In CHI '07 extended abstracts. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1240866.1240882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ebrahim Abidi, M., Ani Liza Asnawi, N. FM Azmin, A. Z. Jusoh, S. Noorjannah Ibrahim, Huda Adibah Mohd Ramli, and Norun Abdul Malek. "Development of Voice Control and Home Security for Smart Home Automation." In 2018 7th International Conference on Computer and Communication Engineering (ICCCE). IEEE, 2018. http://dx.doi.org/10.1109/iccce.2018.8539258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Howe, Adele E., Indrajit Ray, Mark Roberts, Malgorzata Urbanska, and Zinta Byrne. "The Psychology of Security for the Home Computer User." In 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change. IEEE, 2012. http://dx.doi.org/10.1109/sp.2012.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhefan Jiang, Sangok Kim, Kanghee Lee, Hyunchul Bae, and Sangwook Kim. "Security service framework for home network." In Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05). IEEE, 2005. http://dx.doi.org/10.1109/icis.2005.112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Farid, Faizan, Muhammad Rehan, Faiza Faizan, and M. Tahir Qadri. "Home automation and security system via PSTN." In 2010 2nd International Conference on Education Technology and Computer (ICETC). IEEE, 2010. http://dx.doi.org/10.1109/icetc.2010.5529301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sneha, Talapala, Ssneha Balasubramanian, Vaishali R, Jay Vishaal J, Beulah A, and S. Angel Deborah. "Home Security System for the Hearing Impaired." In 2021 5th International Conference on Computer, Communication and Signal Processing (ICCCSP). IEEE, 2021. http://dx.doi.org/10.1109/icccsp52374.2021.9465502.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mills, Annette, and Natasha Sahi. "An Empirical Study of Home User Intentions towards Computer Security." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2019. http://dx.doi.org/10.24251/hicss.2019.583.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Foroughi, Farhad, Hossein Hadipour, and Ahmad M. Shafiee. "High-Performance Monitoring Sensors for Home Computer Users Security Profiling." In 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). IEEE, 2020. http://dx.doi.org/10.1109/cybersa49311.2020.9139627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gai, Ayush, Sami Azam, Bharanidharan Shanmugam, Mirjam Jonkman, and Friso De Boer. "Categorisation of security threats for smart home appliances." In 2018 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2018. http://dx.doi.org/10.1109/iccci.2018.8441213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography