Academic literature on the topic 'Networks computers (security)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Networks computers (security).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Networks computers (security)"

1

Hewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Full text
Abstract:
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable
APA, Harvard, Vancouver, ISO, and other styles
2

Ming, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.

Full text
Abstract:
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are looph
APA, Harvard, Vancouver, ISO, and other styles
4

Zhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.

Full text
Abstract:
In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by secu
APA, Harvard, Vancouver, ISO, and other styles
5

Akhriana, Asmah, and Andi Irmayana. "WEB APP PENDETEKSI JENIS SERANGAN JARINGAN KOMPUTER DENGAN MEMANFAATKAN SNORT DAN LOG HONEYPOT." CCIT Journal 12, no. 1 (2019): 85–96. http://dx.doi.org/10.33050/ccit.v12i1.604.

Full text
Abstract:
Along with the current development of Information Technology is always changing to make the security of an information is very important, especially on a network connected to the internet. But what is unfortunate is that the imbalance between each development of a technology is not accompanied by developments in the security system itself, so that there are quite a lot of systems that are still weak and have to be increased by the security wall. This study aims to design a Web-based App interface to facilitate users or administrators in securing network computers from various types of attacks.
APA, Harvard, Vancouver, ISO, and other styles
6

Prabhakar, Abhishek, Amod Tiwari, and Vinay Kumar Pathak. "Demand of Wireless Network and Security in Current Research." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 6 (2015): 5809–13. http://dx.doi.org/10.24297/ijct.v14i6.1918.

Full text
Abstract:
Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in
APA, Harvard, Vancouver, ISO, and other styles
7

Suharyanto, Cosmas Eko, and Viriyadharma Gopama. "PEMANFAATAN MINI KOMPUTER RASPBERRY SEBAGAI NETWORK MONITORING TOOL PORTABLE." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 1 (2019): 133–38. http://dx.doi.org/10.33480/jitk.v5i1.707.

Full text
Abstract:
This study aims to design a portable monitoring system using the Raspberry mini computer. As a case study, we conducted this research at Credit Union Tunas Harapan, which is based in Batam, Indonesia. We implemented the system with additional tools to monitor networks, namely Wireshark and Nagios. On the local network, we managed to monitor broadcasting from the switch. We have also analyzed several issues on network security. The use of architectural Raspberry mini computers is a very flexible tool.
APA, Harvard, Vancouver, ISO, and other styles
8

Tosun, Nilgün. "Social Networks as a Learning and Teaching Environment and Security in Social Networks." Journal of Education and Training Studies 6, no. 11a (2018): 194. http://dx.doi.org/10.11114/jets.v6i11a.3817.

Full text
Abstract:
Technology is in a constantly evolving and changing structure since the existence of mankind. Because of this dynamic structure, technology fulfills a number of functions such as facilitating people's lives, time, profit from work, profit from cost, making life more enjoyable. At the same time, technology is used in all areas of life, and it also causes changes and transformations in these areas. Education is one of these areas, perhaps the most important, that technology affects. The hunter society, written with nails, made an important step with the paper's invention, and the written documen
APA, Harvard, Vancouver, ISO, and other styles
9

PASCARIU, Cristian, Ionuţ-Daniel BARBU, and Ioan BACIVAROV. "Using Embedded Platforms to Monitor Network Security." International Journal of Information Security and Cybercrime 7, no. 2 (2018): 9–13. http://dx.doi.org/10.19107/ijisc.2018.02.01.

Full text
Abstract:
Although in these moments wireless routers are accessible for consumer use in public places as well as in households, from a security perspective, wireless networks pose an increased risk, not only for unauthorized access to the network, but more important for manipulating the information flow of other users on the network. Man-in-the-middle attacks enable attackers to impersonate legitimate services and intercept communications from the users in an attempt to steal sensitive information. In this paper the authors propose a solution based on embedded devices to detect attackers that manipulate
APA, Harvard, Vancouver, ISO, and other styles
10

Fathurrahmad, Fathurrahmad, and Salman Yusuf. "Implementasi Jaringan VPN dengan Routing Protocol terhadap Jaringan Multiprotocol Label Switching (MPLS)." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (2019): 29. http://dx.doi.org/10.35870/jtik.v3i1.83.

Full text
Abstract:
The convergence of the internet and telecommunications is growing, with applications in it increasingly dependent on the availability of large bandwidth, with its QoS settings requiring networks and elements in them that provide full support for data security and increased network performance. The need for data transmission technology that not only facilitates routing and discovery of the best paths but can also provide security in data communication. This study discusses the implementation of VPN networks with routing protocols on the Multiprotocol Label Switching (MPLS) network. After implem
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Networks computers (security)"

1

Katsikas, Stamatios. "Game theoretic models of networks security." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/102611/.

Full text
Abstract:
Decision making in the context of crime execution and crime prevention can be successfully investigated with the implementation of game-theoretic tools. Evolutionary and mean-field game theory allow for the consideration of a large number of interacting players organized in social and behavioural structures, which typically characterize this context. Alternatively, `traditional' game-theoretic approaches can be applied for studying the security of an arbitrary network on a two player non-cooperative game. Theoretically underpinned by these instruments, in this thesis we formulate and analyse g
APA, Harvard, Vancouver, ISO, and other styles
2

Lurain, Sher. "Networking security : risk assessment of information systems /." Online version of thesis, 1990. http://hdl.handle.net/1850/10587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Holtje, Carl. "Security in serverless network environments /." Link to online version, 2004. https://ritdml.rit.edu/dspace/handle/1850/439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Zhixiong. "Scalable role & organization based access control and its administration." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3110.

Full text
Abstract:
Thesis (Ph.D.)--George Mason University, 2008.<br>Vita: p. 121. Thesis directors: Ravi S. Sandhu, Daniel Menascé. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed July 7, 2008). Includes bibliographical references (p. 113-120). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
5

Montehermoso, Ronald Centeno. "Microsoft Windows Server 2003 : security enhancements and new features /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FMontehermoso.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, Sept. 2004.<br>Thesis Advisor(s): Douglas E. Brinkley. Includes bibliographical references (p. 111-118). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
6

Nwanze, Nnamdi Chike. "Anomaly-based intrusion detection using using lightweight stateless payload inspection." Diss., Online access via UMI:, 2009.

Find full text
Abstract:
Thesis (Ph. D.)--State University of New York at Binghamton, Thomas J. Watson School of Engineering and Applied Science, Department of Electrical and Computer Engineering, 2009.<br>Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
7

Deas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.

Full text
Abstract:
Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks to solve this problem through creating a digital identity that is exchangeable across organisational boundaries. Through the setup of collaboration agreements between multiple domains, users can easily switch across domains without being required to sign in again. However, use of this technology comes with risks of user identity and personal information being compromised. Criminals make use of spoofed websites and social engineering tech
APA, Harvard, Vancouver, ISO, and other styles
8

Chan, Kevin Sean. "Towards securing networks of resource constrained devices a study of cryptographic primitives and key distribution schemes /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26651.

Full text
Abstract:
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.<br>Committee Chair: Fekri, Faramarz; Committee Member: James McClellan; Committee Member: John Copeland; Committee Member: Steven McLaughlin; Committee Member: Yajun Mei. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
9

Irwin, Barry Vivian William. "A framework for the application of network telescope sensors in a global IP network." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1004835.

Full text
Abstract:
The use of Network Telescope systems has become increasingly popular amongst security researchers in recent years. This study provides a framework for the utilisation of this data. The research is based on a primary dataset of 40 million events spanning 50 months collected using a small (/24) passive network telescope located in African IP space. This research presents a number of differing ways in which the data can be analysed ranging from low level protocol based analysis to higher level analysis at the geopolitical and network topology level. Anomalous traffic and illustrative anecdotes ar
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Ibrahim, Mohamed Hussain. "Source authentication in group communication." Thesis, Electronic version, 2005. http://hdl.handle.net/1959.14/549.

Full text
Abstract:
Title from screen page; viewed 10 Oct 2005.<br>Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Dept. of Computing, 2004.<br>Bibliography: leaves 163-175.<br>Introduction -- Cryptographic essentials -- Multicast: structure and security -- Authentication of multicast streams -- Authentication of concast communication -- Authentication of transit flows -- One-time signatures for authenticating group communication -- Authentication of anycast communication -- Authentication of joining operation - Conclusion and future directions.<br>Electronic publication; f
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Networks computers (security)"

1

Justin, Clarke, ed. Network security tools. O'Reilly Media, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

McNab, Chris. Network security assessment. 2nd ed. O'Reilly Media, Inc., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

McNab, Chris. Network security assessment. 2nd ed. O'Reilly Media, Inc., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Network security assessment. 2nd ed. O'Reilly Media, Inc., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Network Security Assessment. O'Reilly Media, Inc., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

McNab, Chris. Network security assessment. 2nd ed. O'Reilly Media, Inc., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Edward, Witzke, ed. Implementing security for ATM networks. Artech House, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brenton, Chris. Mastering network security. 2nd ed. SYBEX, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mastering network security. Network, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Thermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Networks computers (security)"

1

Gligor, Virgil, and Jeannette M. Wing. "Towards a Theory of Trust in Networks of Humans and Computers." In Security Protocols XIX. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25867-1_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gligor, Virgil. "Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion)." In Security Protocols XIX. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25867-1_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wenngren, Gunnar. "The Susec School Project: Introducing Computer Security to Teachers and Pupils." In Computers and Networks in the Age of Globalization. Springer US, 2001. http://dx.doi.org/10.1007/978-0-387-35400-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ashley, Paul, and Mark Vandenwauver. "Computer Networks." In Practical Intranet Security. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5609-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Duffany, Jeffrey L. "Computer Security." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lefebvre, E. "Computer Network Security." In Multisensor Fusion. Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-010-0556-2_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Verschuren, Jan. "Security of Computer Networks." In State of the Art in Applied Cryptography. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49248-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Whiteley, David. "Networks and Computer Security." In An Introduction to Information Systems. Macmillan Education UK, 2013. http://dx.doi.org/10.1007/978-1-137-08467-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schneier, Bruce. "Networked-Computer Security." In Secrets and Lies. Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781119183631.ch10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bilski, Tomasz. "IP Storage Security Analysis." In Computer Networks. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31217-5_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Networks computers (security)"

1

"Session MA3b: Security in wireless networks." In 2010 44th Asilomar Conference on Signals, Systems and Computers. IEEE, 2010. http://dx.doi.org/10.1109/acssc.2010.5757461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Djenna, Amir, and Mohamed Batouche. "Security problems in cloud infrastructure." In 2014 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2014. http://dx.doi.org/10.1109/sncc.2014.6866505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ugwuanyi, Stephen, and James Irvine. "Security Analysis of IoT Networks and Platforms." In 2020 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2020. http://dx.doi.org/10.1109/isncc49221.2020.9297267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yermalovich, Pavel. "Dashboard Visualization Techniques in Information Security." In 2020 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2020. http://dx.doi.org/10.1109/isncc49221.2020.9297291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Session MA1b: Securing crowded and open networks: Physical-layer security in 5G (invited)." In 2017 51st Asilomar Conference on Signals, Systems, and Computers. IEEE, 2017. http://dx.doi.org/10.1109/acssc.2017.8335123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Leca, Cristian L. "Overview of Romania 802.11 wireless networks security." In 2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2017. http://dx.doi.org/10.1109/ecai.2017.8166386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Oracevic, Alma, Selma Dilek, and Suat Ozdemir. "Security in internet of things: A survey." In 2017 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2017. http://dx.doi.org/10.1109/isncc.2017.8072001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yilmaz, Berat, Ertugrul Barak, and Suat Ozdemir. "Improving WebRTC Security via Blockchain Based Smart Contracts." In 2020 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2020. http://dx.doi.org/10.1109/isncc49221.2020.9297333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nabil, Moukafih, Sabir Soukainat, Abdelmajid Lakbabi, and Orhanou Ghizlane. "SIEM selection criteria for an efficient contextual security." In 2017 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2017. http://dx.doi.org/10.1109/isncc.2017.8072035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gelenbe, Erol, Joanna Domanska, Tadeusz Czachorski, Anastasis Drosou, and Dimitrios Tzovaras. "Security for Internet of Things: The SerIoT Project." In 2018 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2018. http://dx.doi.org/10.1109/isncc.2018.8531004.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Networks computers (security)"

1

Johannes, James D., Andrew Fanning, Kyle Hoover, Tim Lewis, and Marsha Robinson. Computer Network Security and Directory Services Architecture. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada392366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!