Journal articles on the topic 'Home computer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Home computer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Schmalz, Edward A. "Computer Security." Californian Journal of Health Promotion 3, no. 3 (September 1, 2005): 8–12. http://dx.doi.org/10.32398/cjhp.v3i3.643.
Full textDenning, Tamara, Tadayoshi Kohno, and Henry M. Levy. "Computer security and the modern home." Communications of the ACM 56, no. 1 (January 2013): 94–103. http://dx.doi.org/10.1145/2398356.2398377.
Full textThompson, Nik, Tanya Jane McGill, and Xuequn Wang. "“Security begins at home”: Determinants of home computer and mobile device security behavior." Computers & Security 70 (September 2017): 376–91. http://dx.doi.org/10.1016/j.cose.2017.07.003.
Full textBethke, Barney. "Home Page Security Risks." EDPACS 24, no. 1 (July 1996): 14–17. http://dx.doi.org/10.1080/07366989609451723.
Full textRose, D. "Revolution in home security." Communications Engineer 1, no. 1 (February 1, 2003): 36–39. http://dx.doi.org/10.1049/ce:20030109.
Full textXu, Meijia, Qiying Dong, Mai Zhou, Chenyu Wang, and Yangyang Liu. "Security Analysis on “Anonymous Authentication Scheme for Smart Home Environment with Provable Security”." Wireless Communications and Mobile Computing 2020 (November 14, 2020): 1–4. http://dx.doi.org/10.1155/2020/8838363.
Full textLetswamotse, Babedi B., Arun Cyril Jose, and Reza Malekian. "Improving smart home security; integrating behaviour prediction into smart home." International Journal of Sensor Networks 28, no. 4 (2018): 253. http://dx.doi.org/10.1504/ijsnet.2018.10017822.
Full textZhang, Junge, Yanhu Shan, and Kaiqi Huang. "ISEE Smart Home (ISH): Smart video analysis for home security." Neurocomputing 149 (February 2015): 752–66. http://dx.doi.org/10.1016/j.neucom.2014.08.002.
Full textKim, Geon Woo, Deok Gyu Lee, Jong Wook Han, and Sang Wook Kim. "Security policy specification for home network." International Journal of Ad Hoc and Ubiquitous Computing 4, no. 6 (2009): 372. http://dx.doi.org/10.1504/ijahuc.2009.028665.
Full textWang Xinxin, and Zhao Jianlin. "Design of Wireless Intelligent Home Security System." International Journal of Digital Content Technology and its Applications 7, no. 6 (March 31, 2013): 282–89. http://dx.doi.org/10.4156/jdcta.vol7.issue6.32.
Full textTaiwo, Olutosin, and Absalom E. Ezugwu. "Internet of Things-Based Intelligent Smart Home Control System." Security and Communication Networks 2021 (September 23, 2021): 1–17. http://dx.doi.org/10.1155/2021/9928254.
Full textMansfield-Devine, Steve. "Close to home: building in-house security expertise." Computer Fraud & Security 2019, no. 9 (September 2019): 16–19. http://dx.doi.org/10.1016/s1361-3723(19)30098-3.
Full textTak, Sungwoo, Sudhir Dixit, and E. K. Park. "An end-to-end home network security framework." Computer Communications 27, no. 5 (March 2004): 412–22. http://dx.doi.org/10.1016/j.comcom.2003.10.001.
Full textParwate, Abhijeet K. "IOT Home Automation over the Cloud." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 25, 2021): 2683–86. http://dx.doi.org/10.22214/ijraset.2021.35443.
Full textMalarvizhi, C., V. Kalaipoonguzhali, and J. Anitha. "Microcontroller ATmega 328Pand GSM Based Advanced Home Security System." International Journal of Smart Home 11, no. 6 (June 30, 2017): 11–20. http://dx.doi.org/10.14257/ijsh.2017.11.6.02.
Full textPilgermann, Michael, Thomas Bocklisch, and Reiner Creutzburg. "Conception and implementation of a course for professional training and education in the field of IoT and smart home security." Electronic Imaging 2020, no. 3 (January 26, 2020): 277–1. http://dx.doi.org/10.2352/issn.2470-1173.2020.3.mobmu-276.
Full textFurnell, Steven, and Jayesh Navin Shah. "Home working and cyber security – an outbreak of unpreparedness?" Computer Fraud & Security 2020, no. 8 (August 2020): 6–12. http://dx.doi.org/10.1016/s1361-3723(20)30084-1.
Full textZ. "Development of Security System for Smart Home Applications." Journal of Computer Science 8, no. 10 (October 1, 2012): 1627–34. http://dx.doi.org/10.3844/jcssp.2012.1627.1634.
Full textDesnanjaya, I. Gusti Made Ngurah, and I. Nyoman Alit Arsana. "Home security monitoring system with IoT-based Raspberry Pi." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 3 (June 1, 2021): 1295. http://dx.doi.org/10.11591/ijeecs.v22.i3.pp1295-1302.
Full textHu, Yu, and Tao Zhou. "The Smart Home Security System Based on Wireless Sensor Network." Advanced Materials Research 204-210 (February 2011): 1490–93. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1490.
Full textArif, Samrah, M. Arif Khan, Sabih Ur Rehman, Muhammad Ashad Kabir, and Muhammad Imran. "Investigating Smart Home Security: Is Blockchain the Answer?" IEEE Access 8 (2020): 117802–16. http://dx.doi.org/10.1109/access.2020.3004662.
Full textHegde, Arpita Prakash. "Smart Security System Using Image Recognition." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 20, 2021): 1936–39. http://dx.doi.org/10.22214/ijraset.2021.36758.
Full textZhang, Jinxin, and Meng Wu. "Blockchain Use in IoT for Privacy-Preserving Anti-Pandemic Home Quarantine." Electronics 9, no. 10 (October 21, 2020): 1746. http://dx.doi.org/10.3390/electronics9101746.
Full textSaxena, Utkarsh, J. S. Sodhi, and Rajneesh Tanwar. "Augmenting smart home network security using blockchain technology." International Journal of Electronic Security and Digital Forensics 12, no. 1 (2020): 99. http://dx.doi.org/10.1504/ijesdf.2020.10025326.
Full textSaxena, Utkarsh, J. S. Sodhi, and Rajneesh Tanwar. "Augmenting smart home network security using blockchain technology." International Journal of Electronic Security and Digital Forensics 12, no. 1 (2020): 99. http://dx.doi.org/10.1504/ijesdf.2020.103881.
Full textAlhasnawi, Bilal, and Basil Jasim. "Wireless Controlled Smart Home System." Iraqi Journal for Electrical and Electronic Engineering 13, no. 1 (June 1, 2017): 123–37. http://dx.doi.org/10.37917/ijeee.13.1.14.
Full textShuai, Mengxia, Nenghai Yu, Hongxia Wang, and Ling Xiong. "Anonymous authentication scheme for smart home environment with provable security." Computers & Security 86 (September 2019): 132–46. http://dx.doi.org/10.1016/j.cose.2019.06.002.
Full textSanjeev. "A Review of Security System for Smart Home Applications." Journal of Computer Science 8, no. 7 (July 1, 2012): 1165–70. http://dx.doi.org/10.3844/jcssp.2012.1165.1170.
Full textBarnett, Arnold, Robert Shumsky, Mark Hansen, Amedeo Odoni, and Geoffrey Gosling. "Safe At Home? An Experiment in Domestic Airline Security." Operations Research 49, no. 2 (April 2001): 181–95. http://dx.doi.org/10.1287/opre.49.2.181.13529.
Full textAnderson and Agarwal. "Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions." MIS Quarterly 34, no. 3 (2010): 613. http://dx.doi.org/10.2307/25750694.
Full textChen, Dong Hong, Shuang Ke, Ji Quan Chen, and Xiai Chen. "Design of Intelligent Home Control System Based on a Variety of Network." Applied Mechanics and Materials 397-400 (September 2013): 1291–95. http://dx.doi.org/10.4028/www.scientific.net/amm.397-400.1291.
Full textSheela, D., and G. Mahadevan. "Mobile Agent Based Enhanced Security for Wireless Sensor Networks." International Journal of Business Data Communications and Networking 10, no. 2 (April 2014): 15–29. http://dx.doi.org/10.4018/ijbdcn.2014040102.
Full textMishra, Amitabh, Thomas Reichherzer, Ezhil Kalaimannan, Norman Wilde, and Ruben Ramirez. "Trade-offs involved in the choice of cloud service configurations when building secure, scalable, and efficient Internet-of-Things networks." International Journal of Distributed Sensor Networks 16, no. 2 (February 2020): 155014772090819. http://dx.doi.org/10.1177/1550147720908199.
Full textTung, Shu Chu, Wu Jeng Li, and Shih Miao Huang. "A Web-Based Android Supervisory Control System." Applied Mechanics and Materials 284-287 (January 2013): 3211–15. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3211.
Full textNaoui, Sarra, Mohamed Elhoucine Elhdhili, and Leila Azouz Saidane. "Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security." Wireless Personal Communications 110, no. 4 (November 16, 2019): 2109–30. http://dx.doi.org/10.1007/s11277-019-06832-x.
Full textZhou, Yousheng, and Longan Wang. "A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity." Security and Communication Networks 2020 (June 28, 2020): 1–19. http://dx.doi.org/10.1155/2020/2637916.
Full textYang, Ye Fen, Jun Zhang, and Dong Hai Zeng. "The Design and Realization of Remote Voice Control System Based on the Intelligent Home." Applied Mechanics and Materials 530-531 (February 2014): 1112–18. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.1112.
Full textAhmed, Mohammed Imtyaz, and G. Kannan. "Cloud-Based Remote RFID Authentication for Security of Smart Internet of Things Applications." Journal of Information & Knowledge Management 20, Supp01 (January 30, 2021): 2140004. http://dx.doi.org/10.1142/s0219649221400049.
Full textÇepik, Hilal, Ömer Aydın, and Gökhan Dalkılıç. "Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device." Proceedings 74, no. 1 (March 2, 2021): 1. http://dx.doi.org/10.3390/proceedings2021074001.
Full textMcGill, Tanya, and Nik Thompson. "Old risks, new challenges: exploring differences in security between home computer and mobile device use." Behaviour & Information Technology 36, no. 11 (July 18, 2017): 1111–24. http://dx.doi.org/10.1080/0144929x.2017.1352028.
Full textKhoa, Tran Anh, Le Mai Bao Nhu, Hoang Hai Son, Nguyen Minh Trong, Cao Hoang Phuc, Nguyen Thi Hoang Phuong, Nguyen Van Dung, Nguyen Hoang Nam, Dong Si Thien Chau, and Dang Ngoc Minh Duc. "Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–18. http://dx.doi.org/10.1155/2020/8896637.
Full textXiao, Yinhao, Yizhen Jia, Xiuzhen Cheng, Jiguo Yu, Zhenkai Liang, and Zhi Tian. "I Can See Your Brain: Investigating Home-Use Electroencephalography System Security." IEEE Internet of Things Journal 6, no. 4 (August 2019): 6681–91. http://dx.doi.org/10.1109/jiot.2019.2910115.
Full textSaputro, Andik, Nanang Saputro, and Hendro Wijayanto. "DEMILITARIZED ZONE AND PORT KNOCKING METHODS FOR COMPUTER NETWORK SECURITY." Cyber Security dan Forensik Digital 3, no. 2 (December 11, 2020): 22–27. http://dx.doi.org/10.14421/csecurity.2020.3.2.2150.
Full textBaek, Jinsuk, Munene W. Kanampiu, and Cheonshik Kim. "A Secure Internet of Things Smart Home Network: Design and Configuration." Applied Sciences 11, no. 14 (July 7, 2021): 6280. http://dx.doi.org/10.3390/app11146280.
Full textMavropoulos, Orestis, Haralambos Mouratidis, Andrew Fish, Emmanouil Panaousis, and Christos Kalloniatis. "A conceptual model to support security analysis in the internet of things." Computer Science and Information Systems 14, no. 2 (2017): 557–78. http://dx.doi.org/10.2298/csis160110016m.
Full textYüksel, Benjamin, Klaus Schwarz, and Reiner Creutzburg. "AI-based anomaly detection for cyberattacks on Windows systems - Creation of a prototype for automated monitoring of the process environment." Electronic Imaging 2020, no. 3 (January 26, 2020): 331–1. http://dx.doi.org/10.2352/issn.2470-1173.2020.3.mobmu-304.
Full textRadzi, Syafeeza Ahmad, M. K. Mohd Fitri Alif, Y. Nursyifaa Athirah, A. S. Jaafar, A. H. Norihan, and M. S. Saleha. "IoT based facial recognition door access control home security system using raspberry pi." International Journal of Power Electronics and Drive Systems (IJPEDS) 11, no. 1 (March 1, 2020): 417. http://dx.doi.org/10.11591/ijpeds.v11.i1.pp417-424.
Full textBrouwer, Natasa, André Heck, and Guusje Smit. "Proctoring to improve teaching practice." MSOR Connections 15, no. 2 (January 26, 2017): 25. http://dx.doi.org/10.21100/msor.v15i2.414.
Full textBraeken, An, Pawani Porambage, Milos Stojmenovic, and Lambros Lambrinos. "eDAAAS: Efficient distributed anonymous authentication and access in smart homes." International Journal of Distributed Sensor Networks 12, no. 12 (December 2016): 155014771668203. http://dx.doi.org/10.1177/1550147716682037.
Full textChifor, Bogdan-Cosmin, Ion Bica, Victor-Valeriu Patriciu, and Florin Pop. "A security authorization scheme for smart home Internet of Things devices." Future Generation Computer Systems 86 (September 2018): 740–49. http://dx.doi.org/10.1016/j.future.2017.05.048.
Full text