Artículos de revistas sobre el tema "Internet – security measures. sears"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Internet – security measures. sears".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
McCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Texto completoZhou, Zhong Wei, and Lei Shi. "Security Research and Measures for the Internet of Things." Advanced Materials Research 748 (August 2013): 910–14. http://dx.doi.org/10.4028/www.scientific.net/amr.748.910.
Texto completoChen, Jing. "Analysis on Network Security and Corresponding Preventive Measures." Applied Mechanics and Materials 241-244 (December 2012): 2312–15. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2312.
Texto completoNiu, Minghao, and Hong Dai. "Internet of Things Information Security and Preventive Measures." Academic Journal of Science and Technology 4, no. 2 (2023): 93–96. http://dx.doi.org/10.54097/ajst.v4i2.3977.
Texto completoWang, Hongqiao. "On Computer Communication Network Security Maintenance Measures." Studies in Social Science Research 4, no. 3 (2023): p134. http://dx.doi.org/10.22158/sssr.v4n3p134.
Texto completoGupta, Sanjay Kumar, and Sandeep Vanjale. "Cyber Security Measures for Internet of Things Devices." International Journal of Engineering Research and Technology 13, no. 8 (2020): 1830. http://dx.doi.org/10.37624/ijert/13.8.2020.1830-1839.
Texto completoSang, Yun Chang, and Xin Gao. "Security Issues and Protective Measures of the Internet of Things Architecture." Advanced Materials Research 765-767 (September 2013): 1007–10. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1007.
Texto completoHe, Beige. "The Advance of Internet of Things Security Threats and Possible Measures." Highlights in Science, Engineering and Technology 68 (October 9, 2023): 202–11. http://dx.doi.org/10.54097/hset.v68i.12067.
Texto completoGomes, Leandre, Abhinav Deshmukh, and Nilesh Anute. "Cyber Security and Internet Banking: Issues and Preventive Measures." Journal of Information Technology and Sciences 8, no. 2 (2022): 31–42. http://dx.doi.org/10.46610/joits.2022.v08i02.005.
Texto completoМинаев, В. А., Б. А. Швырев, and Т. Р. Ромашкин. "INTERNET OF THINGS SECURITY: KEY SOLUTIONS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 2(-) (2023): 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.
Texto completoDu, Yu Lin. "Research on the Information Security of Internet Bank." Applied Mechanics and Materials 687-691 (November 2014): 1925–29. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1925.
Texto completoWang, Xiao Feng. "Research on Security Issues of the Internet of Things." Advanced Materials Research 989-994 (July 2014): 4261–64. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4261.
Texto completoChen, Jing. "Analysis on Internet Attack and Security." Advanced Materials Research 605-607 (December 2012): 2387–90. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.2387.
Texto completoImdad, Maria, Deden Witarsyah Jacob, Hairulnizam Mahdin, Zirawani Baharum, Shazlyn Milleana Shaharudin, and Mohd Sanusi Azmi. "Internet of things: security requirements, attacks and counter measures." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 3 (2020): 1520. http://dx.doi.org/10.11591/ijeecs.v18.i3.pp1520-1530.
Texto completoKumar Yogi, Manas, Y. Himatej, and M. Mahesh reddy. "IOT Security Challenges and Measures to Mitigate: Novel Perspectives." International Journal of Engineering & Technology 7, no. 2.7 (2018): 854. http://dx.doi.org/10.14419/ijet.v7i2.7.11081.
Texto completoSharma, Shruti, Rajkumar Saini, Sumit Saini, and Tushar Sharma. "Network Security Essentials: Understanding Its Key Attacks and Potential Security Mechanism." Industrial Engineering Journal 52 (2023): 175–84. http://dx.doi.org/10.36893/iej.2023.v52.174-184.
Texto completoPratik, P. Watwani. "Security Aspects in Internet and Mobile Communication." INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH Pubished in - Volume 4 | Issue 2 | July 2016, Pubished in - Volume 4 | Issue 2 | July 2016 (2017): Page Number(s) — 2123–2132. https://doi.org/10.5281/zenodo.583722.
Texto completoWenceslaus Ritte, James. "Security Concerns in Internet of Things." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 2898–901. http://dx.doi.org/10.22214/ijraset.2021.36977.
Texto completoRueda-Rueda, Johan Smith, and Jesus M. T. Portocarrero. "Framework-based security measures for Internet of Thing: A literature review." Open Computer Science 11, no. 1 (2021): 346–54. http://dx.doi.org/10.1515/comp-2020-0220.
Texto completoVASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Texto completoZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Texto completoBACÎŞ, Irina-Bristena. "Types of Threats and Appropriate Countermeasures for Internet Communications." International Journal of Information Security and Cybercrime 10, no. 1 (2021): 27–37. http://dx.doi.org/10.19107/ijisc.2021.01.03.
Texto completoKADAM, NILIMA PANDURANG, TRUPTI SANTOSH RAUT, and VIJAY BABAN SHINDE. "NETWORK SECURITY AND SECURITY LAWS AND REGULATIONS LITERATURE REVIEW." JournalNX - A Multidisciplinary Peer Reviewed Journal ICACTM (May 4, 2018): 116–19. https://doi.org/10.5281/zenodo.1410176.
Texto completoPatil, Sambhajiraje, Shitiz Upreti, Anmol Kapoor, and Jyoti Parashar. "Mitigating Risks in the Internet of Things: Contemporary Security Challenges and Defensive Measures." JOURNAL OF INTELLIGENT SYSTEMS AND COMPUTING 4, no. 2 (2023): 14–22. https://doi.org/10.51682/jiscom.v4i2.38.
Texto completoAbdurazakov, Adam A., and Milana M. Namaeva. "INFORMATION SECURITY ISSUES IN E-COMMERCE." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 2/5, no. 155 (2025): 77–82. https://doi.org/10.36871/ek.up.p.r.2025.02.05.008.
Texto completoMaria, Imdad, Witarsyah Jacob Deden, Mahdin Hairulnizam, Baharum Zirawani, Milleana Shaharudin Shazlyn, and Sanusi Azmi Mohd. "Internet of things (IoT); security requirements, attacks and counter measures." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 18, no. 3 (2020): 1520–30. https://doi.org/10.11591/ijeecs.v18.i3.pp1520-1530.
Texto completoHiyam Hatem Jabbar. "Identifying Network Security Issues in the Applications of Internet of Things (IoT)." Journal of Information Systems Engineering and Management 10, no. 39s (2025): 998–1012. https://doi.org/10.52783/jisem.v10i39s.7416.
Texto completoSavytska, Liudmyla, Tetiana Korobeinikova, Oleh Kostiuk, Iryna Kolesnyk, and Oleksandr Dudnyk. "INTERNET OF THINGS PROTECTION MEANS IN THE CORPORATE COMPUTER NETWORK." Information technology and computer engineering 59, no. 1 (2024): 83–93. http://dx.doi.org/10.31649/1999-9941-2024-59-1-83-93.
Texto completoCao, Xiyu. "The application of artificial intelligence in internet security." Applied and Computational Engineering 18, no. 1 (2023): 230–35. http://dx.doi.org/10.54254/2755-2721/18/20230995.
Texto completoBashir et. al., Adil. "Internet of Things Security Issues, Threats, Attacks and Counter Measures." International Journal of Computing and Digital Systemss 7, no. 2 (2018): 111–20. http://dx.doi.org/10.12785/ijcds/070206.
Texto completoFakiha, Bandr. "Business Organization Security Strategies to Cyber Security Threats." International Journal of Safety and Security Engineering 11, no. 1 (2021): 101–4. http://dx.doi.org/10.18280/ijsse.110111.
Texto completoWitczyńska, Katarzyna. "Network security - security methods in transnational corporations (TNC)." Logistics and Transport 45, no. 1 (2020): 55–58. http://dx.doi.org/10.26411/83-1734-2015-1-45-4-20.
Texto completoSong, Xinde. "Research on Security Protection Architecture of Energy Internet Information Communication." MATEC Web of Conferences 228 (2018): 02010. http://dx.doi.org/10.1051/matecconf/201822802010.
Texto completoFaiz, Mohammad, and A.K. Daniel. "Threats and Challenges for Security Measures on the Internet of Things." Law, State and Telecommunications Review 14, no. 1 (2022): 71–97. http://dx.doi.org/10.26512/lstr.v14i1.38843.
Texto completoAgarwal, Sanyam, Veer Daksh Agarwal, Vipin Mittal, and Ishaan Agarwal. "Review of Effect of Internet of Things(IoT) in Cybercrime." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 4672–78. http://dx.doi.org/10.22214/ijraset.2023.54519.
Texto completoBu, Bing, Lei Wang, Zhenyang Pi, and Weiguo Fang. "Stackelberg Model of Anti-terrorism Resource Allocation in Express Transportation Security Checks." E3S Web of Conferences 253 (2021): 02020. http://dx.doi.org/10.1051/e3sconf/202125302020.
Texto completoRode, Mrs K. N. "Network Security and Cyber Security: A Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 3404–7. http://dx.doi.org/10.22214/ijraset.2022.44501.
Texto completoMargaret Dumebi Okpor, Kizito Eluemunor Anazia, and Daniel Ukpenusiowho. "A novel hybrid database security management technique." International Journal of Science and Research Archive 11, no. 2 (2024): 1555–65. http://dx.doi.org/10.30574/ijsra.2024.11.2.0652.
Texto completoMohammed, Anwar. "Cybersecurity for Internet of Things (IoT): Vulnerabilities and Protection Strategies." Cybersecurity for Internet of Things (IoT): Vulnerabilities and Protection Strategies 7 (September 15, 2021): 1–19. https://doi.org/10.5281/zenodo.14760137.
Texto completoZhurylo, Oleh, and Oleksii Liashenko. "Architecture and iot security systems based on fog computing." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 1 (27) (July 2, 2024): 54–66. http://dx.doi.org/10.30837/itssi.2024.27.054.
Texto completoGalatenko, V. A., and K. A. Kostyukhin. "IoT Information Security: Fundamental Statements Review." Programmnaya Ingeneria 11, no. 5 (2020): 259–69. http://dx.doi.org/10.17587/prin.11.259-269.
Texto completoQi, Kun. "Security Application of 5G Technology in Industrial Internet." Journal of Electronic Research and Application 6, no. 1 (2022): 11–14. http://dx.doi.org/10.26689/jera.v6i1.3545.
Texto completoClark, M'Kaila J., and Lila Rajabion. "A Strategic Approach to IoT Security by Working Towards a Secure IoT Future." International Journal of Hyperconnectivity and the Internet of Things 7, no. 1 (2023): 1–18. http://dx.doi.org/10.4018/ijhiot.317088.
Texto completoIBRAHIM ABDUL ABDULRAHMAN, GABRIEL TOSIN AYODELE, GRACE EFAHN EGBEDION, JACOB ALEBIOSU, EZEAGBA JETTA SOMTOCHUKWU, and OMOTOLANI ENIOLA AKINBOLAJO. "Securing Internet of Things (IoT) ecosystems: Addressing scalability, authentication, and privacy challenges." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 523–34. https://doi.org/10.30574/wjarr.2025.26.1.0999.
Texto completoAlisultanova, Iman A., Galina A. Ovseenko, and Bella Kh Visaitova. "ANALYSIS OF NETWORK INFORMATION SECURITY STRATEGIES IN HIGHER EDUCATION INSTITUTIONS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 5/5, no. 146 (2024): 30–35. http://dx.doi.org/10.36871/ek.up.p.r.2024.05.05.005.
Texto completoNur A'fyfah Zaimy, Mohamad Fadli Zolkipli, and Norliza Katuk. "A review of hacking techniques in IoT systems and future trends of hacking on IoT environment." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 723–31. http://dx.doi.org/10.30574/wjarr.2023.17.2.0310.
Texto completoNur, A'fyfah Zaimy, Fadli Zolkipli Mohamad, and Katuk Norliza. "A review of hacking techniques in IoT systems and future trends of hacking on IoT environment." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 723–31. https://doi.org/10.5281/zenodo.8109576.
Texto completoJasim, Wael Abdulateef, Yusra Mohammed Kwyja, Ahmed Mohammed Fadhil Al-Mfarji, Nameer Hashim Qasim, and Moroj Mohammed. "An Exhaustive Examination of Architectural Methods for Hardware Security Mechanisms in IoT Devices." Radioelectronics. Nanosystems. Information Technologies. 16, no. 5 (2024): 643–56. http://dx.doi.org/10.17725/j.rensit.2024.16.643.
Texto completoDebajit, Datta, and J. Dheeba. "Exploration of Various Attacks and Security Measures Related to the Internet of Things." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 2 (2020): 175–84. https://doi.org/10.35940/ijrte.B3353.079220.
Texto completoNordin, Siti Aminah, Zakiah Mohd Yusoff, Muhammad Hanif Faisal, and Khairul Kamarudin. "Securing high-value electronic equipment: an internet of things driven approach for camera security." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 3 (2024): 2763. http://dx.doi.org/10.11591/ijai.v13.i3.pp2763-2772.
Texto completo