Journal articles on the topic 'Internet – security measures. sears'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Internet – security measures. sears.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
McCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Full textZhou, Zhong Wei, and Lei Shi. "Security Research and Measures for the Internet of Things." Advanced Materials Research 748 (August 2013): 910–14. http://dx.doi.org/10.4028/www.scientific.net/amr.748.910.
Full textChen, Jing. "Analysis on Network Security and Corresponding Preventive Measures." Applied Mechanics and Materials 241-244 (December 2012): 2312–15. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2312.
Full textNiu, Minghao, and Hong Dai. "Internet of Things Information Security and Preventive Measures." Academic Journal of Science and Technology 4, no. 2 (2023): 93–96. http://dx.doi.org/10.54097/ajst.v4i2.3977.
Full textWang, Hongqiao. "On Computer Communication Network Security Maintenance Measures." Studies in Social Science Research 4, no. 3 (2023): p134. http://dx.doi.org/10.22158/sssr.v4n3p134.
Full textGupta, Sanjay Kumar, and Sandeep Vanjale. "Cyber Security Measures for Internet of Things Devices." International Journal of Engineering Research and Technology 13, no. 8 (2020): 1830. http://dx.doi.org/10.37624/ijert/13.8.2020.1830-1839.
Full textSang, Yun Chang, and Xin Gao. "Security Issues and Protective Measures of the Internet of Things Architecture." Advanced Materials Research 765-767 (September 2013): 1007–10. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1007.
Full textHe, Beige. "The Advance of Internet of Things Security Threats and Possible Measures." Highlights in Science, Engineering and Technology 68 (October 9, 2023): 202–11. http://dx.doi.org/10.54097/hset.v68i.12067.
Full textGomes, Leandre, Abhinav Deshmukh, and Nilesh Anute. "Cyber Security and Internet Banking: Issues and Preventive Measures." Journal of Information Technology and Sciences 8, no. 2 (2022): 31–42. http://dx.doi.org/10.46610/joits.2022.v08i02.005.
Full textМинаев, В. А., Б. А. Швырев, and Т. Р. Ромашкин. "INTERNET OF THINGS SECURITY: KEY SOLUTIONS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 2(-) (2023): 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.
Full textDu, Yu Lin. "Research on the Information Security of Internet Bank." Applied Mechanics and Materials 687-691 (November 2014): 1925–29. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1925.
Full textWang, Xiao Feng. "Research on Security Issues of the Internet of Things." Advanced Materials Research 989-994 (July 2014): 4261–64. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4261.
Full textChen, Jing. "Analysis on Internet Attack and Security." Advanced Materials Research 605-607 (December 2012): 2387–90. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.2387.
Full textImdad, Maria, Deden Witarsyah Jacob, Hairulnizam Mahdin, Zirawani Baharum, Shazlyn Milleana Shaharudin, and Mohd Sanusi Azmi. "Internet of things: security requirements, attacks and counter measures." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 3 (2020): 1520. http://dx.doi.org/10.11591/ijeecs.v18.i3.pp1520-1530.
Full textKumar Yogi, Manas, Y. Himatej, and M. Mahesh reddy. "IOT Security Challenges and Measures to Mitigate: Novel Perspectives." International Journal of Engineering & Technology 7, no. 2.7 (2018): 854. http://dx.doi.org/10.14419/ijet.v7i2.7.11081.
Full textSharma, Shruti, Rajkumar Saini, Sumit Saini, and Tushar Sharma. "Network Security Essentials: Understanding Its Key Attacks and Potential Security Mechanism." Industrial Engineering Journal 52 (2023): 175–84. http://dx.doi.org/10.36893/iej.2023.v52.174-184.
Full textPratik, P. Watwani. "Security Aspects in Internet and Mobile Communication." INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH Pubished in - Volume 4 | Issue 2 | July 2016, Pubished in - Volume 4 | Issue 2 | July 2016 (2017): Page Number(s) — 2123–2132. https://doi.org/10.5281/zenodo.583722.
Full textWenceslaus Ritte, James. "Security Concerns in Internet of Things." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 2898–901. http://dx.doi.org/10.22214/ijraset.2021.36977.
Full textRueda-Rueda, Johan Smith, and Jesus M. T. Portocarrero. "Framework-based security measures for Internet of Thing: A literature review." Open Computer Science 11, no. 1 (2021): 346–54. http://dx.doi.org/10.1515/comp-2020-0220.
Full textVASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textBACÎŞ, Irina-Bristena. "Types of Threats and Appropriate Countermeasures for Internet Communications." International Journal of Information Security and Cybercrime 10, no. 1 (2021): 27–37. http://dx.doi.org/10.19107/ijisc.2021.01.03.
Full textKADAM, NILIMA PANDURANG, TRUPTI SANTOSH RAUT, and VIJAY BABAN SHINDE. "NETWORK SECURITY AND SECURITY LAWS AND REGULATIONS LITERATURE REVIEW." JournalNX - A Multidisciplinary Peer Reviewed Journal ICACTM (May 4, 2018): 116–19. https://doi.org/10.5281/zenodo.1410176.
Full textPatil, Sambhajiraje, Shitiz Upreti, Anmol Kapoor, and Jyoti Parashar. "Mitigating Risks in the Internet of Things: Contemporary Security Challenges and Defensive Measures." JOURNAL OF INTELLIGENT SYSTEMS AND COMPUTING 4, no. 2 (2023): 14–22. https://doi.org/10.51682/jiscom.v4i2.38.
Full textAbdurazakov, Adam A., and Milana M. Namaeva. "INFORMATION SECURITY ISSUES IN E-COMMERCE." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 2/5, no. 155 (2025): 77–82. https://doi.org/10.36871/ek.up.p.r.2025.02.05.008.
Full textMaria, Imdad, Witarsyah Jacob Deden, Mahdin Hairulnizam, Baharum Zirawani, Milleana Shaharudin Shazlyn, and Sanusi Azmi Mohd. "Internet of things (IoT); security requirements, attacks and counter measures." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 18, no. 3 (2020): 1520–30. https://doi.org/10.11591/ijeecs.v18.i3.pp1520-1530.
Full textHiyam Hatem Jabbar. "Identifying Network Security Issues in the Applications of Internet of Things (IoT)." Journal of Information Systems Engineering and Management 10, no. 39s (2025): 998–1012. https://doi.org/10.52783/jisem.v10i39s.7416.
Full textSavytska, Liudmyla, Tetiana Korobeinikova, Oleh Kostiuk, Iryna Kolesnyk, and Oleksandr Dudnyk. "INTERNET OF THINGS PROTECTION MEANS IN THE CORPORATE COMPUTER NETWORK." Information technology and computer engineering 59, no. 1 (2024): 83–93. http://dx.doi.org/10.31649/1999-9941-2024-59-1-83-93.
Full textCao, Xiyu. "The application of artificial intelligence in internet security." Applied and Computational Engineering 18, no. 1 (2023): 230–35. http://dx.doi.org/10.54254/2755-2721/18/20230995.
Full textBashir et. al., Adil. "Internet of Things Security Issues, Threats, Attacks and Counter Measures." International Journal of Computing and Digital Systemss 7, no. 2 (2018): 111–20. http://dx.doi.org/10.12785/ijcds/070206.
Full textFakiha, Bandr. "Business Organization Security Strategies to Cyber Security Threats." International Journal of Safety and Security Engineering 11, no. 1 (2021): 101–4. http://dx.doi.org/10.18280/ijsse.110111.
Full textWitczyńska, Katarzyna. "Network security - security methods in transnational corporations (TNC)." Logistics and Transport 45, no. 1 (2020): 55–58. http://dx.doi.org/10.26411/83-1734-2015-1-45-4-20.
Full textSong, Xinde. "Research on Security Protection Architecture of Energy Internet Information Communication." MATEC Web of Conferences 228 (2018): 02010. http://dx.doi.org/10.1051/matecconf/201822802010.
Full textFaiz, Mohammad, and A.K. Daniel. "Threats and Challenges for Security Measures on the Internet of Things." Law, State and Telecommunications Review 14, no. 1 (2022): 71–97. http://dx.doi.org/10.26512/lstr.v14i1.38843.
Full textAgarwal, Sanyam, Veer Daksh Agarwal, Vipin Mittal, and Ishaan Agarwal. "Review of Effect of Internet of Things(IoT) in Cybercrime." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 4672–78. http://dx.doi.org/10.22214/ijraset.2023.54519.
Full textBu, Bing, Lei Wang, Zhenyang Pi, and Weiguo Fang. "Stackelberg Model of Anti-terrorism Resource Allocation in Express Transportation Security Checks." E3S Web of Conferences 253 (2021): 02020. http://dx.doi.org/10.1051/e3sconf/202125302020.
Full textRode, Mrs K. N. "Network Security and Cyber Security: A Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 3404–7. http://dx.doi.org/10.22214/ijraset.2022.44501.
Full textMargaret Dumebi Okpor, Kizito Eluemunor Anazia, and Daniel Ukpenusiowho. "A novel hybrid database security management technique." International Journal of Science and Research Archive 11, no. 2 (2024): 1555–65. http://dx.doi.org/10.30574/ijsra.2024.11.2.0652.
Full textMohammed, Anwar. "Cybersecurity for Internet of Things (IoT): Vulnerabilities and Protection Strategies." Cybersecurity for Internet of Things (IoT): Vulnerabilities and Protection Strategies 7 (September 15, 2021): 1–19. https://doi.org/10.5281/zenodo.14760137.
Full textZhurylo, Oleh, and Oleksii Liashenko. "Architecture and iot security systems based on fog computing." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 1 (27) (July 2, 2024): 54–66. http://dx.doi.org/10.30837/itssi.2024.27.054.
Full textGalatenko, V. A., and K. A. Kostyukhin. "IoT Information Security: Fundamental Statements Review." Programmnaya Ingeneria 11, no. 5 (2020): 259–69. http://dx.doi.org/10.17587/prin.11.259-269.
Full textQi, Kun. "Security Application of 5G Technology in Industrial Internet." Journal of Electronic Research and Application 6, no. 1 (2022): 11–14. http://dx.doi.org/10.26689/jera.v6i1.3545.
Full textClark, M'Kaila J., and Lila Rajabion. "A Strategic Approach to IoT Security by Working Towards a Secure IoT Future." International Journal of Hyperconnectivity and the Internet of Things 7, no. 1 (2023): 1–18. http://dx.doi.org/10.4018/ijhiot.317088.
Full textIBRAHIM ABDUL ABDULRAHMAN, GABRIEL TOSIN AYODELE, GRACE EFAHN EGBEDION, JACOB ALEBIOSU, EZEAGBA JETTA SOMTOCHUKWU, and OMOTOLANI ENIOLA AKINBOLAJO. "Securing Internet of Things (IoT) ecosystems: Addressing scalability, authentication, and privacy challenges." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 523–34. https://doi.org/10.30574/wjarr.2025.26.1.0999.
Full textAlisultanova, Iman A., Galina A. Ovseenko, and Bella Kh Visaitova. "ANALYSIS OF NETWORK INFORMATION SECURITY STRATEGIES IN HIGHER EDUCATION INSTITUTIONS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 5/5, no. 146 (2024): 30–35. http://dx.doi.org/10.36871/ek.up.p.r.2024.05.05.005.
Full textNur A'fyfah Zaimy, Mohamad Fadli Zolkipli, and Norliza Katuk. "A review of hacking techniques in IoT systems and future trends of hacking on IoT environment." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 723–31. http://dx.doi.org/10.30574/wjarr.2023.17.2.0310.
Full textNur, A'fyfah Zaimy, Fadli Zolkipli Mohamad, and Katuk Norliza. "A review of hacking techniques in IoT systems and future trends of hacking on IoT environment." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 723–31. https://doi.org/10.5281/zenodo.8109576.
Full textJasim, Wael Abdulateef, Yusra Mohammed Kwyja, Ahmed Mohammed Fadhil Al-Mfarji, Nameer Hashim Qasim, and Moroj Mohammed. "An Exhaustive Examination of Architectural Methods for Hardware Security Mechanisms in IoT Devices." Radioelectronics. Nanosystems. Information Technologies. 16, no. 5 (2024): 643–56. http://dx.doi.org/10.17725/j.rensit.2024.16.643.
Full textDebajit, Datta, and J. Dheeba. "Exploration of Various Attacks and Security Measures Related to the Internet of Things." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 2 (2020): 175–84. https://doi.org/10.35940/ijrte.B3353.079220.
Full textNordin, Siti Aminah, Zakiah Mohd Yusoff, Muhammad Hanif Faisal, and Khairul Kamarudin. "Securing high-value electronic equipment: an internet of things driven approach for camera security." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 3 (2024): 2763. http://dx.doi.org/10.11591/ijai.v13.i3.pp2763-2772.
Full text