Academic literature on the topic 'Networks computers (security)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Networks computers (security).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Networks computers (security)"
Hewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Full textMing, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textZhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.
Full textAkhriana, Asmah, and Andi Irmayana. "WEB APP PENDETEKSI JENIS SERANGAN JARINGAN KOMPUTER DENGAN MEMANFAATKAN SNORT DAN LOG HONEYPOT." CCIT Journal 12, no. 1 (2019): 85–96. http://dx.doi.org/10.33050/ccit.v12i1.604.
Full textPrabhakar, Abhishek, Amod Tiwari, and Vinay Kumar Pathak. "Demand of Wireless Network and Security in Current Research." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 6 (2015): 5809–13. http://dx.doi.org/10.24297/ijct.v14i6.1918.
Full textSuharyanto, Cosmas Eko, and Viriyadharma Gopama. "PEMANFAATAN MINI KOMPUTER RASPBERRY SEBAGAI NETWORK MONITORING TOOL PORTABLE." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 1 (2019): 133–38. http://dx.doi.org/10.33480/jitk.v5i1.707.
Full textTosun, Nilgün. "Social Networks as a Learning and Teaching Environment and Security in Social Networks." Journal of Education and Training Studies 6, no. 11a (2018): 194. http://dx.doi.org/10.11114/jets.v6i11a.3817.
Full textPASCARIU, Cristian, Ionuţ-Daniel BARBU, and Ioan BACIVAROV. "Using Embedded Platforms to Monitor Network Security." International Journal of Information Security and Cybercrime 7, no. 2 (2018): 9–13. http://dx.doi.org/10.19107/ijisc.2018.02.01.
Full textFathurrahmad, Fathurrahmad, and Salman Yusuf. "Implementasi Jaringan VPN dengan Routing Protocol terhadap Jaringan Multiprotocol Label Switching (MPLS)." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (2019): 29. http://dx.doi.org/10.35870/jtik.v3i1.83.
Full textDissertations / Theses on the topic "Networks computers (security)"
Katsikas, Stamatios. "Game theoretic models of networks security." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/102611/.
Full textLurain, Sher. "Networking security : risk assessment of information systems /." Online version of thesis, 1990. http://hdl.handle.net/1850/10587.
Full textHoltje, Carl. "Security in serverless network environments /." Link to online version, 2004. https://ritdml.rit.edu/dspace/handle/1850/439.
Full textZhang, Zhixiong. "Scalable role & organization based access control and its administration." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3110.
Full textMontehermoso, Ronald Centeno. "Microsoft Windows Server 2003 : security enhancements and new features /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FMontehermoso.pdf.
Full textNwanze, Nnamdi Chike. "Anomaly-based intrusion detection using using lightweight stateless payload inspection." Diss., Online access via UMI:, 2009.
Find full textDeas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.
Full textChan, Kevin Sean. "Towards securing networks of resource constrained devices a study of cryptographic primitives and key distribution schemes /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26651.
Full textIrwin, Barry Vivian William. "A framework for the application of network telescope sensors in a global IP network." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1004835.
Full textAl-Ibrahim, Mohamed Hussain. "Source authentication in group communication." Thesis, Electronic version, 2005. http://hdl.handle.net/1959.14/549.
Full textBooks on the topic "Networks computers (security)"
Thermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2007.
Find full textBook chapters on the topic "Networks computers (security)"
Gligor, Virgil, and Jeannette M. Wing. "Towards a Theory of Trust in Networks of Humans and Computers." In Security Protocols XIX. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25867-1_22.
Full textGligor, Virgil. "Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion)." In Security Protocols XIX. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25867-1_23.
Full textWenngren, Gunnar. "The Susec School Project: Introducing Computer Security to Teachers and Pupils." In Computers and Networks in the Age of Globalization. Springer US, 2001. http://dx.doi.org/10.1007/978-0-387-35400-2_4.
Full textAshley, Paul, and Mark Vandenwauver. "Computer Networks." In Practical Intranet Security. Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5609-1_3.
Full textDuffany, Jeffrey L. "Computer Security." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_1.
Full textLefebvre, E. "Computer Network Security." In Multisensor Fusion. Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-010-0556-2_37.
Full textVerschuren, Jan. "Security of Computer Networks." In State of the Art in Applied Cryptography. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49248-8_7.
Full textWhiteley, David. "Networks and Computer Security." In An Introduction to Information Systems. Macmillan Education UK, 2013. http://dx.doi.org/10.1007/978-1-137-08467-5_9.
Full textSchneier, Bruce. "Networked-Computer Security." In Secrets and Lies. Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781119183631.ch10.
Full textBilski, Tomasz. "IP Storage Security Analysis." In Computer Networks. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31217-5_24.
Full textConference papers on the topic "Networks computers (security)"
"Session MA3b: Security in wireless networks." In 2010 44th Asilomar Conference on Signals, Systems and Computers. IEEE, 2010. http://dx.doi.org/10.1109/acssc.2010.5757461.
Full textDjenna, Amir, and Mohamed Batouche. "Security problems in cloud infrastructure." In 2014 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2014. http://dx.doi.org/10.1109/sncc.2014.6866505.
Full textUgwuanyi, Stephen, and James Irvine. "Security Analysis of IoT Networks and Platforms." In 2020 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2020. http://dx.doi.org/10.1109/isncc49221.2020.9297267.
Full textYermalovich, Pavel. "Dashboard Visualization Techniques in Information Security." In 2020 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2020. http://dx.doi.org/10.1109/isncc49221.2020.9297291.
Full text"Session MA1b: Securing crowded and open networks: Physical-layer security in 5G (invited)." In 2017 51st Asilomar Conference on Signals, Systems, and Computers. IEEE, 2017. http://dx.doi.org/10.1109/acssc.2017.8335123.
Full textLeca, Cristian L. "Overview of Romania 802.11 wireless networks security." In 2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2017. http://dx.doi.org/10.1109/ecai.2017.8166386.
Full textOracevic, Alma, Selma Dilek, and Suat Ozdemir. "Security in internet of things: A survey." In 2017 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2017. http://dx.doi.org/10.1109/isncc.2017.8072001.
Full textYilmaz, Berat, Ertugrul Barak, and Suat Ozdemir. "Improving WebRTC Security via Blockchain Based Smart Contracts." In 2020 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2020. http://dx.doi.org/10.1109/isncc49221.2020.9297333.
Full textNabil, Moukafih, Sabir Soukainat, Abdelmajid Lakbabi, and Orhanou Ghizlane. "SIEM selection criteria for an efficient contextual security." In 2017 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2017. http://dx.doi.org/10.1109/isncc.2017.8072035.
Full textGelenbe, Erol, Joanna Domanska, Tadeusz Czachorski, Anastasis Drosou, and Dimitrios Tzovaras. "Security for Internet of Things: The SerIoT Project." In 2018 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2018. http://dx.doi.org/10.1109/isncc.2018.8531004.
Full textReports on the topic "Networks computers (security)"
Johannes, James D., Andrew Fanning, Kyle Hoover, Tim Lewis, and Marsha Robinson. Computer Network Security and Directory Services Architecture. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada392366.
Full text