Journal articles on the topic 'Information security toolkit'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 49 journal articles for your research on the topic 'Information security toolkit.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Calix, Ricardo A., Sumendra B. Singh, Tingyu Chen, Dingkai Zhang, and Michael Tu. "Cyber Security Tool Kit (CyberSecTK): A Python Library for Machine Learning and Cyber Security." Information 11, no. 2 (February 11, 2020): 100. http://dx.doi.org/10.3390/info11020100.
Full textMacy, Jason. "Product vs toolkit: API and IAM security." Network Security 2019, no. 6 (June 2019): 13–15. http://dx.doi.org/10.1016/s1353-4858(19)30073-x.
Full textMasloboev, A. V. "A multi-agent technology for network-centric control information support of regional security." Informacionno-technologicheskij vestnik, no. 2 (July 30, 2018): 92–102. http://dx.doi.org/10.21499/2409-1650-2018-2-92-102.
Full textKlychova, Guzaliya, Alsu Zakirova, Angelina Dyatlova, Augul Klychova, and Nailya Zalyalova. "METHODOLOGICAL TOOLKIT FOR ENSURING ECONOMIC SECURITY IN THE PERSONNEL MANAGEMENT SYSTEM." Vestnik of Kazan State Agrarian University 15, no. 3 (November 30, 2020): 107–13. http://dx.doi.org/10.12737/2073-0462-2020-107-113.
Full textMasloboev, A. V. "Software system «Network-centric managerial structures synthesizer»." Informacionno-technologicheskij vestnik 14, no. 4 (December 30, 2017): 145–55. http://dx.doi.org/10.21499/2409-1650-2017-4-145-155.
Full textWerner, J., Y. Lee, B. Malin, A. Ledeczi, and J. Mathe. "Model-based Design of Clinical Information Systems." Methods of Information in Medicine 47, no. 05 (2008): 399–408. http://dx.doi.org/10.3414/me9121.
Full textZatonatskiy, D. "Diagnostics of Insider Risks and Threats in Personnel Security Management of the Enterprise." Bulletin of Taras Shevchenko National University of Kyiv. Economics, no. 204 (2019): 20–27. http://dx.doi.org/10.17721/1728-2667.2019/204-3/3.
Full textJaïdi, Faouzi, Faten Labbene Ayachi, and Adel Bouhoula. "A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures." Security and Communication Networks 2018 (2018): 1–22. http://dx.doi.org/10.1155/2018/7142170.
Full textGonzalez-Granadillo, Gustavo, Sofia Anna Menesidou, Dimitrios Papamartzivanos, Ramon Romeu, Diana Navarro-Llobet, Caxton Okoh, Sokratis Nifakos, Christos Xenakis, and Emmanouil Panaousis. "Automated Cyber and Privacy Risk Management Toolkit." Sensors 21, no. 16 (August 15, 2021): 5493. http://dx.doi.org/10.3390/s21165493.
Full textNatsiavas, Pantelis, Giovanni Mazzeo, Giuliana Faiella, Paolo Campegiani, Jos Dumortier, Oana Stan, Marco Nalin, et al. "Developing an infrastructure for secure patient summary exchange in the EU context: Lessons learned from the KONFIDO project." Health Informatics Journal 27, no. 2 (April 2021): 146045822110214. http://dx.doi.org/10.1177/14604582211021459.
Full textGrubov, Volodymyr. "CONTROLNET: THE AMOUNT OF TECHNOLOGIES IN THE SERVICE OF LARGE POLICY." Politology bulletin, no. 80 (2018): 86–96. http://dx.doi.org/10.17721/2415-881x.2018.80.86-96.
Full textVankevich, Alena, Iryna Kalinouskaya, Olga Zaitseva, and Alena Korabava. "Equilibrium of Labor Market: New Security Instruments in the Context of Digitalization." SHS Web of Conferences 93 (2021): 03017. http://dx.doi.org/10.1051/shsconf/20219303017.
Full textBaturina, E. "INFORMATION-ANALYTICAL SYSTEM OF MONITORING OF THE SHADOW OF NON-CASH FLOW: BASIC ELEMENTS, AUTHOR’S SIMULATION ALGORITHM." Vestnik Universiteta 1, no. 7 (September 7, 2019): 144–51. http://dx.doi.org/10.26425/1816-4277-2019-7-144-151.
Full textKazakova, Natalia, and Anna Sivkova. "FINANCIAL SECURITY AND ECONOMIC DEVELOPMENT: METHODS OF ANALYSIS AND RISK MANAGEMENT (THE CASE OF RUSSIA)." EUrASEANs: journal on global socio-economic dynamics, no. 2(9) (March 30, 2018): 68–80. http://dx.doi.org/10.35678/2539-5645.2(9).2018.68-80.
Full textBarba, M. C., E. Blasi, M. Cafaro, S. Fiore, M. Mirto, and G. Aloisio. "A Web Service-based Grid Portal for Edgebreaker Compression." Methods of Information in Medicine 44, no. 02 (2005): 233–38. http://dx.doi.org/10.1055/s-0038-1633953.
Full textKendzierskyj, Stefan, Hamid Jahankhani, and SHU I. Ndumbe. "Blockchain for Strengthening the Privacy of Healthcare Data." International Journal of Strategic Engineering 2, no. 1 (January 2019): 14–28. http://dx.doi.org/10.4018/ijose.2019010102.
Full textGhosh, Sagarika, Marzia Zaman, Gary Sakauye, and Srinivas Sampalli. "An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme." Applied Sciences 11, no. 5 (February 26, 2021): 2082. http://dx.doi.org/10.3390/app11052082.
Full textHabets, Petra, Inge Jeandarme, and Harry G. Kennedy. "Applicability of the DUNDRUM-1 in a forensic Belgium setting." Journal of Forensic Practice 21, no. 1 (January 31, 2019): 85–94. http://dx.doi.org/10.1108/jfp-11-2018-0043.
Full textHryhoruk, Pavlo Mykhailovych, Nila Anatoliivna Khrushch, and Olha Valeriivna Chuniak. "CONCEPTION OF MODELING THE SYSTEM OF ENSURING FINANCIAL ECONOMIC SECURITY." SCIENTIFIC BULLETIN OF POLISSIA, no. 1(17) (2019): 158–65. http://dx.doi.org/10.25140/2410-9576-2019-1(17)-158-165.
Full textJamil, Faisal, Shabir Ahmad, Naeem Iqbal, and Do-Hyeun Kim. "Towards a Remote Monitoring of Patient Vital Signs Based on IoT-Based Blockchain Integrity Management Platforms in Smart Hospitals." Sensors 20, no. 8 (April 13, 2020): 2195. http://dx.doi.org/10.3390/s20082195.
Full textChivukula, Sreerama Prabhu, Rajasekhar Krovvidi, and Aneesh Sreevallabh Chivukula. "Eucalyptus Cloud to Remotely Provision e-Governance Applications." Journal of Computer Networks and Communications 2011 (2011): 1–15. http://dx.doi.org/10.1155/2011/268987.
Full textAmalia-Gianina, Străteanu, Simona Nicoleta Stan, and Laurenţiu Ciornei. "Fundamental Issues of Environmental Education and the Impact of Socio-Economic Development on Public Health, in Globalization Context." Annals ”Valahia” University of Targoviste - Agriculture 13, no. 1 (April 1, 2019): 29–33. http://dx.doi.org/10.2478/agr-2019-0007.
Full textYakonovskaya, T. B., and A. I. Zhigulskaya. "Features of evaluating the economic security of peat industry enterprises in the Tver Region of Russia (the industry review)." Gornye nauki i tekhnologii = Mining Science and Technology (Russia) 6, no. 1 (April 6, 2021): 5–15. http://dx.doi.org/10.17073/2500-0632-2021-1-5-15.
Full textMerhej Radhi, Abdulkareem. "Risk assessment optimization for decision support using intelligent model based on fuzzy inference renewable rules." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (August 1, 2020): 1028. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp1028-1035.
Full textPeng, Peng, Ivens Portugal, Paulo Alencar, and Donald Cowan. "A face recognition software framework based on principal component analysis." PLOS ONE 16, no. 7 (July 22, 2021): e0254965. http://dx.doi.org/10.1371/journal.pone.0254965.
Full textMladjan, Mrdjan M., and Dusan Z. Markovic. "Diagrams of Power and Strategic Decision Making: the Case of Strategic Alliances in the Automotive Industry." Management:Journal of Sustainable Business and Management Solutions in Emerging Economies 24, no. 3 (October 17, 2019): 21. http://dx.doi.org/10.7595/management.fon.2019.0015.
Full textMorozov, Ilya. "Political Communicativistics: The Evolution of Understanding the Role of Information in Political Process." Vestnik Volgogradskogo gosudarstvennogo universiteta. Serija 4. Istorija. Regionovedenie. Mezhdunarodnye otnoshenija 26, no. 3 (June 30, 2021): 58–71. http://dx.doi.org/10.15688/jvolsu4.2021.3.6.
Full textWoomer, Paul, Wellisa Mulei, and Samuel Maina. "An ICT Strategy Based upon E-Teaching and E-Learning in Response to the COVID-19 Crisis in Africa." Journal of International Agricultural and Extension Education 28, no. 2 (March 15, 2021): 51–67. http://dx.doi.org/10.5191/jiaee.2021.28205.
Full textNadhamuni, Sunita, Oommen John, Mallari Kulkarni, Eshan Nanda, Sethuraman Venkatraman, Devesh Varma, Satchit Balsari, et al. "Driving digital transformation of comprehensive primary health services at scale in India: an enterprise architecture framework." BMJ Global Health 6, Suppl 5 (July 2021): e005242. http://dx.doi.org/10.1136/bmjgh-2021-005242.
Full textМульска, Ольга П. "ІНСТИТУЦІОНАЛЬНЕ ЗАБЕЗПЕЧЕННЯ ДЕРЖАВНОЇ ПОЛІТИКИ УПРАВЛІННЯ МІГРАЦІЙНИМИ ПРОЦЕСАМИ В УКРАЇНІ." Bulletin of the Kyiv National University of Technologies and Design. Series: Economic sciences 153, no. 6 (July 4, 2021): 30–40. http://dx.doi.org/10.30857/2413-0117.2020.6.4.
Full textKárász, Balázs, and Csaba Kollár. "Leadership Responsibilities in Information Security Awareness Development." Academic and Applied Research in Military and Public 19, no. 2 (2020): 79–91. http://dx.doi.org/10.32565/aarms.2020.2.6.
Full textKárász, Balázs, and Imre Négyesi. "Information Security Responsibilities of Critical (Information) Infrastructures in the Aspect of Human Risk Factors." Hadtudományi Szemle 13, no. 3 (2020): 71–86. http://dx.doi.org/10.32563/hsz.2020.3.6.
Full textHuang, Xin, and Wenzhong Zhu. "Chinese corporations’ conception of sustainable development: an innovative view of corpus analysis." Chinese Management Studies 11, no. 1 (April 3, 2017): 180–90. http://dx.doi.org/10.1108/cms-12-2016-0265.
Full textMedhi, Subhash, Abhijit Bora, and Tulshi Bezboruah. "Security Impact on e-ATM Windows Communication Foundation Services using Certificate based Authentication and Protection." International Journal of Information Retrieval Research 6, no. 3 (July 2016): 37–51. http://dx.doi.org/10.4018/ijirr.2016070103.
Full textHsu, Chien-Lung, Wei-Xin Chen, and Tuan-Vinh Le. "An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things." Sensors 20, no. 22 (November 12, 2020): 6471. http://dx.doi.org/10.3390/s20226471.
Full textKruk, Michael C., Britt Parker, John J. Marra, Kevin Werner, Richard Heim, Russell Vose, and Philip Malsale. "Engaging with Users of Climate Information and the Coproduction of Knowledge." Weather, Climate, and Society 9, no. 4 (October 1, 2017): 839–49. http://dx.doi.org/10.1175/wcas-d-16-0127.1.
Full textLukianenko, Iryna. "Shadow economy growth in Ukraine as a negative factor of its development." University Economic Bulletin, no. 39 (December 20, 2018): 101–13. http://dx.doi.org/10.31470/2306-546x-2018-39-101-113.
Full textUmar, Amjad. "Computer Aided Planning for Wireless Systems." International Journal of Business Data Communications and Networking 8, no. 1 (January 2012): 56–67. http://dx.doi.org/10.4018/jbdcn.2012010104.
Full textCharoenthammachoke, Kananut, Natt Leelawat, Jing Tang, and Akira Kodaka. "Business Continuity Management: A Preliminary Systematic Literature Review Based on ScienceDirect Database." Journal of Disaster Research 15, no. 5 (August 1, 2020): 546–55. http://dx.doi.org/10.20965/jdr.2020.p0546.
Full textLyssakov, Nikolay D., and Elena N. Lyssakova. "Aviation psychology: development stage in science and education." Perspectives of Science and Education 51, no. 3 (July 1, 2021): 430–38. http://dx.doi.org/10.32744/pse.2021.3.30.
Full text"A System Emulation for Malware Detection in Routers." International Journal of Innovative Technology and Exploring Engineering 8, no. 11 (September 10, 2019): 32–40. http://dx.doi.org/10.35940/ijitee.j9909.0981119.
Full textMantzana, Vasiliki, Eftichia Georgiou, Ioannis Chasiotis, Ilias Gkotsis, Tim H. Stelkens-Kobsch, Vasileios Kazoukas, Nikolaos Papagiannopoulos, Anastasios Nikas, and Filippos Komninos. "Airports’ Crisis Management Processes and Stakeholders Involved." Annals of Disaster Risk Sciences 3, no. 1 (November 17, 2020). http://dx.doi.org/10.51381/adrs.v3i1.47.
Full text"Forensic Analysis of a Ransomware." International Journal of Innovative Technology and Exploring Engineering 9, no. 3 (January 10, 2020): 3618–22. http://dx.doi.org/10.35940/ijitee.c8385.019320.
Full textPalamarchuk, Halyna. "Information and Communication Activities of the OSCE Special Monitoring Mission in the Context of the Conflict in Eastern Ukraine." Visnyk of the Lviv University. Series International Relations, no. 47 (December 20, 2019). http://dx.doi.org/10.30970/vir.2019.47.0.10986.
Full textMerrill, Rebecca D., Ali Imorou Bah Chabi, Elvira McIntyre, Jules Venance Kouassi, Martial Monney Alleby, Corrine Codja, Ouyi Tante, et al. "An approach to integrate population mobility patterns and sociocultural factors in communicable disease preparedness and response." Humanities and Social Sciences Communications 8, no. 1 (January 25, 2021). http://dx.doi.org/10.1057/s41599-020-00704-7.
Full textEicken, Hajo, Andrew Mahoney, Joshua Jones, Thomas Heinrichs, Dayne Broderson, Hank Statscewich, Thomas Weingartner, et al. "Sustained Observations of Changing Arctic Coastal and Marine Environments and Their Potential Contribution to Arctic Maritime Domain Awareness: A Case Study in Northern Alaska." ARCTIC 71, no. 5 (April 10, 2018). http://dx.doi.org/10.14430/arctic4622.
Full textCarlucci, Matthew, Algimantas Kriščiūnas, Haohan Li, Povilas Gibas, Karolis Koncevičius, Art Petronis, and Gabriel Oh. "DiscoRhythm: an easy-to-use web application and R package for discovering rhythmicity." Bioinformatics, November 8, 2019. http://dx.doi.org/10.1093/bioinformatics/btz834.
Full textMcGuire, Mark. "Ordered Communities." M/C Journal 7, no. 6 (January 1, 2005). http://dx.doi.org/10.5204/mcj.2474.
Full textHadley, Bree Jamila, and Sandra Gattenhof. "Measurable Progress? Teaching Artsworkers to Assess and Articulate the Impact of Their Work." M/C Journal 14, no. 6 (November 22, 2011). http://dx.doi.org/10.5204/mcj.433.
Full text