Journal articles on the topic 'Information security practice tests'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information security practice tests.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Rabrenović, Aleksandra, and Rajko Radević. "LIMITS OF THE RIGHT TO FREE ACCESS TO INFORMATION IN THE SECURITY SECTOR – CASE OF MONTENEGRO." Strani pravni život 60, no. 3 (2016): 23–37. https://doi.org/10.56461/spz16302r.
Full textLi, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.
Full textRoberts, Linda. "THE INFLUENCE OF PERSONAL CHARACTERISTICS ON SECURITY AWARENESS IN ORGANIZATIONAL SETTINGS." International Research Journal of Library and Information Sciences 2, no. 2 (2025): 1–6. https://doi.org/10.55640/irjlis-v02i02-01.
Full textSamios, Michael, Christos P. Evangelidis, and Emmanouil Serrelis. "Assessment of Information Security Vulnerabilities in Common Seismological Equipment." Seismological Research Letters 92, no. 2A (2021): 933–40. http://dx.doi.org/10.1785/0220200151.
Full textRohn, Eli, Gilad Sabari, and Guy Leshem. "Explaining small business InfoSec posture using social theories." Information & Computer Security 24, no. 5 (2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.
Full textMadhu R. "An Approach of Sandbox Technology for Improving the Security in Online Healthcare Systems." Journal of Information Systems Engineering and Management 10, no. 43s (2025): 703–14. https://doi.org/10.52783/jisem.v10i43s.8469.
Full textYang, Wei, and Anni Jia. "Side-Channel Leakage Detection with One-Way Analysis of Variance." Security and Communication Networks 2021 (March 5, 2021): 1–13. http://dx.doi.org/10.1155/2021/6614702.
Full textIkhalia, Ehinome, Alan Serrano, David Bell, and Panos Louvieris. "Online social network security awareness: mass interpersonal persuasion using a Facebook app." Information Technology & People 32, no. 5 (2019): 1276–300. http://dx.doi.org/10.1108/itp-06-2018-0278.
Full textKubiak, Ireneusz, and Artur Przybysz. "Fourier and Chirp-Z Transforms in the Estimation Values Process of Horizontal and Vertical Synchronization Frequencies of Graphic Displays." Applied Sciences 12, no. 10 (2022): 5281. http://dx.doi.org/10.3390/app12105281.
Full textRicciardi, Carlo, Adelmo Gubitosi, Donatella Vecchione, et al. "Comparing Two Approaches for Thyroidectomy: A Health Technology Assessment through DMAIC Cycle." Healthcare 10, no. 1 (2022): 124. http://dx.doi.org/10.3390/healthcare10010124.
Full textMundt, Christopher C. "Pyramiding for Resistance Durability: Theory and Practice." Phytopathology® 108, no. 7 (2018): 792–802. http://dx.doi.org/10.1094/phyto-12-17-0426-rvw.
Full textAakanksha, Kashish Jain, Neha Giri, and Anamika Gupta. "Assessing Vulnerabilities in Voice Assistants: Comparative Analysis of Google Assistant, Siri, and Alexa." Advances in Knowledge-Based Systems, Data Science, and Cybersecurity 02, no. 01 (2025): 197–214. https://doi.org/10.54364/cybersecurityjournal.2025.1110.
Full textAkashi, Nozomi, Kohei Nakajima, Mitsuru Shibayama, and Yasuo Kuniyoshi. "A mechanical true random number generator." New Journal of Physics 24, no. 1 (2022): 013019. http://dx.doi.org/10.1088/1367-2630/ac45ca.
Full textMeira, Jessica Vieira de Souza, Murat Hancer, Sara Joana Gadotti dos Anjos, and Anita Eves. "Human resources practices and employee motivation in the hospitality industry: A cross-cultural research." Tourism and hospitality management 29, no. 2 (2023): 157–67. http://dx.doi.org/10.20867/thm.29.2.1.
Full textTagang, Jonathan Daboh, Ado Ahmed, Samaila I. Ningi, and Ibrahim O. Shittu. "An Assessment of Information Management Practices and the Containment of Financial Crimes in Nigeria." FUDMA Journal of Accounting and Finance Research [FUJAFR] 2, no. 4 (2024): 82–90. https://doi.org/10.33003/fujafr-2024.v2i4.143.82-90.
Full textFiačan, Jakub, Jozef Jenis, Damián Čechmánek, Slavomír Hrček, and Pavol Michal. "Structural Design and Safety Verification of a Service Hatch Used at Airports by FEM Analysis." Infrastructures 8, no. 4 (2023): 73. http://dx.doi.org/10.3390/infrastructures8040073.
Full textNagaraj, Kalyan, Biplab Bhattacharjee, Amulyashree Sridhar, and Sharvani GS. "Detection of phishing websites using a novel twofold ensemble model." Journal of Systems and Information Technology 20, no. 3 (2018): 321–57. http://dx.doi.org/10.1108/jsit-09-2017-0074.
Full textLIN, ANNIE W., FRANK A. GRANATA, ABIGAIL K. TRIPPEL, et al. "Food Handling Concerns and Practices at Home during the COVID-19 Pandemic by Food Security Status." Journal of Food Protection 85, no. 3 (2021): 518–26. http://dx.doi.org/10.4315/jfp-21-216.
Full textAbeer Salim Jamil, Raghad Abdulaali Azeez, and Nidaa Flaih Hassan. "An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 01 (2023): 93–106. http://dx.doi.org/10.3991/ijoe.v19i01.36901.
Full textBaizat, Faisal, Zainab Rahma, and Sumaia Abusaid. "The Dark Side of IT: The Negative Aspects of Information Technology." International Journal of Technology and Systems 7, no. 2 (2022): 95–115. http://dx.doi.org/10.47604/ijts.1709.
Full textMahdi, Ali A., and Mays M. Hoobi. "Robust and Efficient Methods for Key Generation using Chaotic Maps and A2C Algorithm." Mesopotamian Journal of CyberSecurity 5, no. 1 (2025): 301–18. https://doi.org/10.58496/mjcs/2025/019.
Full textChandra Prasad, S. Hari, Mohammed H. Fallah, D. Rahul, Anita Gehlot, and Kosaraju Satyanarayana. "Tampered energy meter information conveyed to concerned authority by wireless communication." E3S Web of Conferences 564 (2024): 07011. http://dx.doi.org/10.1051/e3sconf/202456407011.
Full textSosa-Martínez, María de Jesús, Isaac Jair León-Lozano, Yuliana García-Jiménez, Brenda Garduño-Orbe, Alfredo Josimar Lagarza-Moreno, and Guillermina Juanico-Morales. "Frequency of Dyslipidemias and Cardiovascular Risk Determination in Patients with Systemic Arterial Hypertension." Atención Familiar 24, no. 4 (2023): 239–44. http://dx.doi.org/10.22201/fm.14058871p.2023.486535.
Full textHaryanti, Fitri, Sri Hartini, Akhmadi, et al. "Maternal knowledge on nutritional-focused nurturing care and associated factors among women with stunted children aged 6-23 months in Yogyakarta, Indonesia: A cross-sectional study." Belitung Nursing Journal 10, no. 4 (2024): 472–80. http://dx.doi.org/10.33546/bnj.3481.
Full textG, Anahita, Krishnapriya KPM, Shiva Prasad R, and Mohan Kumar N. "HD-Sign: Hardware Based Digital Signature Generation Using True Random Number Generator." International Journal of Engineering & Technology 7, no. 3.8 (2018): 147. http://dx.doi.org/10.14419/ijet.v7i3.8.16850.
Full textGokul G L, Lakshmi T, and Don K R. "Biocompatibility of Dental Materials - A Review." International Journal of Research in Pharmaceutical Sciences 11, SPL3 (2020): 1634–37. http://dx.doi.org/10.26452/ijrps.v11ispl3.3487.
Full textMaksymenko, M. I. "CURRENT ISSUES OF VIOLENT CRIMES IN PENAL INSTITUTIONS PREVENTION." Scientific Herald of Sivershchyna. Series: Law 2022, no. 1 (2022): 94–102. http://dx.doi.org/10.32755/sjlaw.2022.01.094.
Full textCho, Dong-Hyun, Si-Hyun Kim, and Je-Ho Hwang. "Container Terminal-Inland Transportation Linkage Platform Model Factor Analysis." Korea International Trade Research Institute 19, no. 3 (2023): 131–44. http://dx.doi.org/10.16980/jitc.19.3.202306.131.
Full textAgudina, V. A. "SPECIFIC USE OF SCREENING IMMUNOCHROMATOGRAPHIC TESTS FOR THE PRIMARY DETECTION OF FACTS OF PSYCHOACTIVE SUBSTANCE USE IN URINE AND SALIVA." Marine Medicine 5, no. 2 (2019): 83–94. http://dx.doi.org/10.22328/2413-5747-2019-5-2-83-94.
Full textMattila, Juha Kai. "Cyber Defence is More Than Just Cybersecurity." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 436–44. https://doi.org/10.34190/eccws.24.1.3458.
Full textBaykuş, Nurdan, Aaron Anil Chadee, Nurgül Yalçın, and Hazi Mohammad Azamathulla. "Role of the Regulation Framework in Occupational Safety in Construction Excavation Works—A Survey Analysis in Turkey." Safety 10, no. 4 (2024): 87. http://dx.doi.org/10.3390/safety10040087.
Full textKosari, Sam, Kwang Choon Yee, Stephanie Mulhall, et al. "Pharmacists’ Perspectives on the Use of My Health Record." Pharmacy 8, no. 4 (2020): 190. http://dx.doi.org/10.3390/pharmacy8040190.
Full textYurev, Artemiy Sergeevich. "Fuzzing of Polymorphic Systems within Microsevice Structures." Proceedings of the Institute for System Programming of the RAS 36, no. 1 (2024): 45–60. http://dx.doi.org/10.15514/ispras-2024-36(1)-4.
Full textHulea, Mihai, Radu Miron, and Vlad Muresan. "Digital Product Passport Implementation Based on Multi-Blockchain Approach with Decentralized Identifier Provider." Applied Sciences 14, no. 11 (2024): 4874. http://dx.doi.org/10.3390/app14114874.
Full textKovalenko, O. O., O. V. Silagin, and D. V. Vlasenko. "Contour models of the e-book environment in the system «JETIQ VNTU»." Optoelectronic Information-Power Technologies 48, no. 2 (2024): 242–48. http://dx.doi.org/10.31649/1681-7893-2024-48-2-242-248.
Full textKot, Edyta. "Development of a technologically advanced IT system enabling automated processing of information collected in forensic biometric databases in order to combat crime or identify people." Issues of Forensic Science 308 (2020): 69–74. http://dx.doi.org/10.34836/pk.2020.308.5.
Full textOzkaya, Yasemin, and Bakiye Nurdan Tekgul. "Reliability Of E-Health Records and The Importance of Patient Self-Reporting in International Health Information Sharing." Eurasian Journal of Family Medicine 13, no. 3 (2024): 145–46. http://dx.doi.org/10.33880/ejfm.2024130308.
Full textAleksandrowicz, Tomasz. "Forecasting Threats to State Security in Theory and in Practice. Toolbox for the Analyst." Internal Security 15, no. 1 (2023): 7–21. http://dx.doi.org/10.5604/01.3001.0053.9579.
Full textRosas, Lisa G., Catherine Nasrallah, Van Ta Park, et al. "Perspectives on Precision Health Among Racial/Ethnic Minority Communities and the Physicians That Serve Them." Ethnicity & Disease 30, Suppl 1 (2020): 137–48. http://dx.doi.org/10.18865/ed.30.s1.137.
Full textJawalkar, Santosh Kumar. "Ethical Horizons in Immersive Technologies: Addressing Privacy, Security, and Psychological Impact of AR/VR Adoption." International Journal of Multidisciplinary Research and Growth Evaluation. 5, no. 5 (2024): 1083–91. https://doi.org/10.54660/.ijmrge.2024.5.5.1083-1091.
Full textGrachev, Ya L., and V. G. Sidorenko. "Steganalysis of the methods of concealing information in graphic containers." Dependability 21, no. 3 (2021): 39–46. http://dx.doi.org/10.21683/1729-2646-2021-21-3-39-46.
Full textPodoynitsyn, V. M., A. O. Yafonkin, O. V. Manzhai, and O. M. Verlamov. "Legal basis of defense standardization of the European Union." Analytical and Comparative Jurisprudence, no. 2 (May 11, 2024): 766–72. http://dx.doi.org/10.24144/2788-6018.2024.02.126.
Full textSawka, Maciej, and Marcin Niemiec. "A Sponge-Based Key Expansion Scheme for Modern Block Ciphers." Energies 15, no. 19 (2022): 6864. http://dx.doi.org/10.3390/en15196864.
Full textZhao, Wenbo, and Caochuan Ma. "Modification of Intertwining Logistic Map and a Novel Pseudo Random Number Generator." Symmetry 16, no. 2 (2024): 169. http://dx.doi.org/10.3390/sym16020169.
Full textLiu, Chaojie, Timothy Bartram, and Sandra G. Leggat. "Link of Patient Care Outcome to Occupational Differences in Response to Human Resource Management: A Cross-Sectional Comparative Study on Hospital Doctors and Nurses in China." International Journal of Environmental Research and Public Health 17, no. 12 (2020): 4379. http://dx.doi.org/10.3390/ijerph17124379.
Full textHaggenmüller, Sarah, Eva Krieghoff-Henning, Tanja Jutzi, et al. "Digital Natives’ Preferences on Mobile Artificial Intelligence Apps for Skin Cancer Diagnostics: Survey Study." JMIR mHealth and uHealth 9, no. 8 (2021): e22909. http://dx.doi.org/10.2196/22909.
Full textMohd Nassir, Nur Fahimah, Ummul Fahri Abdul Rauf, Zuraini Zainol, and Asyraf Afthanorhan. "Malaysia’s Insider Threat Risk: Developing a Tool." International Research Journal of Multidisciplinary Scope 05, no. 04 (2024): 187–200. http://dx.doi.org/10.47857/irjms.2024.05i04.01436.
Full textObura, M., G. Oballim, J. O. Ochuodho, F. N. W. Maina, and V. E. Anjichi. "Seed Management and Quality of Farmer Saved Seeds of Bambara groundnut from North Western, Northern and Eastern Uganda." Ghana Journal of Agricultural Science 56, no. 1 (2021): 1–15. http://dx.doi.org/10.4314/gjas.v56i1.1.
Full textGizaw, Abraham Tamirat, Pradeep Sopory, and Morankar Sudhakar. "Determinants of knowledge, attitude and self-efficacy towards complementary feeding among rural mothers: Baseline data of a cluster-randomized control trial in South West Ethiopia." PLOS ONE 18, no. 11 (2023): e0293267. http://dx.doi.org/10.1371/journal.pone.0293267.
Full textRaut, Rekha. "Socio-Health Profile of Residents in Bhaktapur in Elder Care Homes." Educational Journal 3, no. 1 (2024): 50–58. https://doi.org/10.3126/ej.v3i1.82047.
Full text