Artigos de revistas sobre o tema "Trust by the way of security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Trust by the way of security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Hungerford, Thomas. "A Better Way to Invest the Social Security Trust Fund." Challenge 49, no. 3 (2006): 90–104. http://dx.doi.org/10.2753/cha0577-5132490306.
Texto completo da fonteWang, Haoxiang. "Review on Trust Building Algorithms in IoT Security." Journal of ISMAC 3, no. 4 (2022): 326–37. http://dx.doi.org/10.36548/jismac.2021.4.004.
Texto completo da fonteBräunlich, Katharina, and Rüdiger Grimm. "Development of A Formal Security Model for Electronic Voting Systems." International Journal of Information Security and Privacy 7, no. 2 (2013): 1–28. http://dx.doi.org/10.4018/jisp.2013040101.
Texto completo da fonteGhazali, Osman, Chun Yang Leow, Shahzad Qaiser, et al. "Cloud-Based Global Online Marketplaces Review on Trust and Security." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (2019): 96. http://dx.doi.org/10.3991/ijim.v13i04.10523.
Texto completo da fonteZhakshylykova, T. A. "Psychological trust in social networks." Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), no. 8 (August 7, 2022): 542–46. http://dx.doi.org/10.33920/pol-01-2208-04.
Texto completo da fonteNajib, Warsun, Selo Sulistyo, and Widyawan. "QS-Trust: An IoT ecosystem security model incorporating quality of service and social factors for trust assessment." Communications in Science and Technology 9, no. 1 (2024): 153–60. http://dx.doi.org/10.21924/cst.9.1.2024.1419.
Texto completo da fonteKim, Sangyoung, and Taebok Lee. "Factors affecting information security compliance intention of military officer." Journal of Advances in Military Studies 5, no. 1 (2022): 5–33. http://dx.doi.org/10.37944/jams.v5i1.138.
Texto completo da fonteOrkida, Ilollari, and Islami Manjola. "Auditing as a way to increase cyber security." ECONOMICUS, no. 15 (March 24, 2017): 71–89. https://doi.org/10.5281/zenodo.7584751.
Texto completo da fonteVenkadesan Perumal. "Zero Trust SD-WAN: Enhancing Security and Efficiency in the Medical Industry." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1386–400. https://doi.org/10.32628/cseit25112495.
Texto completo da fonteSurendra N Koritala. "Zero-trust security models in financial planning systems." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 2161–71. https://doi.org/10.30574/wjarr.2025.25.3.0944.
Texto completo da fonteCao, Xiao Mei, Hai Tao Zhu, He Yang Shen, and Gui Hai Chen. "Proxy-Based Security-Feedback Trust Model in MP2P Network." Applied Mechanics and Materials 462-463 (November 2013): 1144–51. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.1144.
Texto completo da fonteKumawat, Shyamlal, and Prof Deepak Tomar. "Trust Models in Cloud Computing - A Perspective." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 6, no. 2 (2013): 752–56. http://dx.doi.org/10.24297/ijmit.v6i2.732.
Texto completo da fonteSiriwardana, S. M. D. N. "Hardware Security and Trust: Trends, Challenges, and Design Tools." International Research Journal of Innovations in Engineering and Technology 08, no. 01 (2024): 119–27. http://dx.doi.org/10.47001/irjiet/2024.801016.
Texto completo da fonteBasco-Galangco, R. B., and D. L. Chinayo. "The State of Police Legitimacy Through the People's Trust and Satisfaction in the Performance of the Police of Their Duties." American Journal of Multidisciplinary Research and Innovation 1, no. 6 (2022): 47–55. https://doi.org/10.54536/ajmri.v1i6.872.
Texto completo da fonteRagul, M., A. Aloysius, and V. Arulkumar. "Advancing IoT Security through Blockchain-Driven Dynamic Trust Evaluation." Indian Journal Of Science And Technology 18, no. 7 (2025): 526–38. https://doi.org/10.17485/ijst/v18i7.3783.
Texto completo da fonteRevanth P S B.E. "Blockchain-Secured and VPN Integrated Power Systems Management." Dandao Xuebao/Journal of Ballistics 37, no. 1 (2025): 25–34. https://doi.org/10.52783/dxjb.v37.166.
Texto completo da fonteSreevidya, B., and Dr M. Supriya. "Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 15, no. 1 (2024): 27–41. http://dx.doi.org/10.58346/jowua.2024.i1.003.
Texto completo da fonteEl-Sayed, Hesham, Sharmi Sankar, Heng Yu, and Gokulnath Thandavarayan. "Benchmarking of Recommendation Trust Computation for Trust/Trustworthiness Estimation in HDNs." International Journal of Computers Communications & Control 12, no. 5 (2017): 612. http://dx.doi.org/10.15837/ijccc.2017.5.2895.
Texto completo da fontePavlidis, Michalis, Haralambos Mouratidis, and Shareeful Islam. "Modelling Security Using Trust Based Concepts." International Journal of Secure Software Engineering 3, no. 2 (2012): 36–53. http://dx.doi.org/10.4018/jsse.2012040102.
Texto completo da fonteXu, Mingyang, Junli Guo, Haoyu Yuan, and Xinyu Yang. "Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture." Electronics 12, no. 4 (2023): 782. http://dx.doi.org/10.3390/electronics12040782.
Texto completo da fonteYan, Ye, and Fanghua Lu. "A Survey and Analysis on the Sense of Nuclear Safety & Security for the Public: A Chinese Perspective." Sustainability 10, no. 7 (2018): 2495. http://dx.doi.org/10.3390/su10072495.
Texto completo da fonteZhi, Kuiyun, Qiurong Tan, Si Chen, et al. "How Does Social Security Fairness Predict Trust in Government? The Serial Mediation Effects of Social Security Satisfaction and Life Satisfaction." International Journal of Environmental Research and Public Health 19, no. 11 (2022): 6867. http://dx.doi.org/10.3390/ijerph19116867.
Texto completo da fonteDr., Namita Mittal. "User Perceptions of Privacy and Security in Online Social Networks." International Journal of Innovative Science and Research Technology 8, no. 1 (2023): 91–94. https://doi.org/10.5281/zenodo.7547576.
Texto completo da fonteJoshi, Prince, Vishal Dhangar, Manish Muchhala, and Surajbhan Singh Mandloi. "Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 1630–37. http://dx.doi.org/10.22214/ijraset.2023.48889.
Texto completo da fonteSun, Po-Ling, and Cheng-Yuan Ku. "Review of threats on trust and reputation models." Industrial Management & Data Systems 114, no. 3 (2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.
Texto completo da fonteAlmarri, Seetah, and Ahmed Aljughaiman. "Blockchain Technology for IoT Security and Trust: A Comprehensive SLR." Sustainability 16, no. 23 (2024): 10177. http://dx.doi.org/10.3390/su162310177.
Texto completo da fonteManalu, Ignasius Falentino, Basrah Saidani, and Shandy Aditya. "Pengaruh Perceived Security dan Perceived Ease of Use terhadap Intention to Use Dengan Trust sebagai Intervening pada Penggunaan Aplikasi Pembayaran Digital di Jakarta." Jurnal Bisnis, Manajemen, dan Keuangan 3, no. 1 (2022): 186–97. http://dx.doi.org/10.21009/jbmk.0301.14.
Texto completo da fonteSingh, Supriya. "The Social Dimensions of the Security of Internet Banking." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (2006): 72–78. http://dx.doi.org/10.3390/jtaer1020014.
Texto completo da fonteCurtis, Shelby R., Jessica Rose Carre, and Daniel Nelson Jones. "Consumer security behaviors and trust following a data breach." Managerial Auditing Journal 33, no. 4 (2018): 425–35. http://dx.doi.org/10.1108/maj-11-2017-1692.
Texto completo da fonteUsman, Aminu Bello, William Liu, Quan Bai, and Ajit Narayanan. "Trust of the Same." International Journal of Information Security and Privacy 9, no. 2 (2015): 13–30. http://dx.doi.org/10.4018/ijisp.2015040102.
Texto completo da fonteNegi, Shalabh, and Jayanthi R. "SECURITY IMPROVEMENT AND TRUST ENHANCEMENT IN CLOUD-BASED SERVICES." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 481. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.20525.
Texto completo da fonteLalli, M., and J. Lawanya. "Ensuring the Security by Using Fuzzy Based Trust Routing Scheme in MANET." Asian Journal of Engineering and Applied Technology 7, no. 2 (2018): 74–79. http://dx.doi.org/10.51983/ajeat-2018.7.2.1002.
Texto completo da fonteOla, Adegboyega Adedolapo. "Electoral Violence and Arms Proliferation in Nigeria: Causes, Consequences and Way Forward." African Journal of Stability and Development (AJSD) 11, no. 2 (2018): 446–59. http://dx.doi.org/10.53982/ajsd.2018.1102.13-j.
Texto completo da fonteCvetković, Vladimir M., Milan Lipovac, Renate Renner, Svetlana Stanarević, and Zlatko Raonić. "A Predictive Framework for Understanding Multidimensional Security Perceptions Among Students in Serbia: The Role of Institutional, Socio-Economic, and Demographic Determinants of Sustainability." Sustainability 17, no. 11 (2025): 5030. https://doi.org/10.3390/su17115030.
Texto completo da fonteNurhatinah, Nurhatinah. "PENGARUH KEAMANAN, PRIVASI, DAN REPUTASI TERHADAP KEPERCAYAAN KONSUMEN ONLINE SHOPPING DI KOTA PADANG." Jurnal Ecogen 1, no. 4 (2018): 206. http://dx.doi.org/10.24036/jmpe.v1i1.4740.
Texto completo da fonteJagadamba, G., and B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment." International Journal of Systems and Service-Oriented Engineering 6, no. 4 (2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.
Texto completo da fonteWenander, Henrik. "Sincere Cooperation, Mutual Trust, and Mutual Recognition in Social Security Coordination." Review of European Administrative Law 13, no. 3 (2020): 89–108. http://dx.doi.org/10.7590/187479820x16007576818834.
Texto completo da fonteKhuspe, Snehal Tukaram. "A Study on the Impact of Cybersecurity Threats on Consumer Trust in E-Commerce: A Case of Navi Mumbai." International Journal of Economics, Business, Accounting, Agriculture and Management towards Paradigm Shift in Research (IJEBAMPSR) 2, no. 1 (2025): 172–76. https://doi.org/10.5281/zenodo.15294244.
Texto completo da fonteKapse, Smita, Latesh Malik, and Sanjay Kumar. "NTHCMB: DESIGN OF AN EFFICIENT NOVEL TRUST-BASED HYBRID CONSENSUS MODEL FOR SECURING BLOCKCHAIN DEPLOYMENTS." ASEAN Engineering Journal 14, no. 2 (2024): 83–90. http://dx.doi.org/10.11113/aej.v14.20763.
Texto completo da fonteDoton, Wlson. "THE ROLE OF DATA SECURITY IN THE WORLD OF EDUCATION TO INCREASE PARENTAL TRUST." Educational Researcher Journal 1, no. 3 (2024): 41–48. https://doi.org/10.71288/educationalresearcherjournal.v1i3.19.
Texto completo da fonteUdayana, IBN, Putri Dwi Cahyani, and Desti Nur Chotimah. "PENGARUH PERCEIVED SECURITY DAN INFORMATION QUALITY TERHADAP ONLINE PURCHASE INTENTION MELALUI TRUST (Study Kasus Pada Konsumen Sorabel di Yogyakarta)." Journal Competency of Business 2, no. 1 (2018): 53–68. http://dx.doi.org/10.47200/jcob.v2i1.659.
Texto completo da fontePatel, Jay. "Prospects of Cloud-Driven Deep Learning- Leading the Way for Safe and Secure AI." INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES 8, no. 3 (2020): 57–63. https://doi.org/10.55083/irjeas.2020.v08i03011.
Texto completo da fonteUrmetzer, Florian, and Isabelle Walinski. "User Acceptance and Mobile Payment Security." International Journal of E-Services and Mobile Applications 6, no. 2 (2014): 37–66. http://dx.doi.org/10.4018/ijesma.2014040104.
Texto completo da fonteChen, Guangxuan, Liping Ding, Jin Du, et al. "Trust Evaluation Strategy for Single Sign-on Solution in Cloud." International Journal of Digital Crime and Forensics 10, no. 1 (2018): 1–11. http://dx.doi.org/10.4018/ijdcf.2018010101.
Texto completo da fonteLeahy, Darragh, and Christina Thorpe. "Zero Trust Container Architecture (ZTCA)." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 111–20. http://dx.doi.org/10.34190/iccws.17.1.35.
Texto completo da fonteSyed, (Shawon) M. Rahman, and Lackey Robert. "E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES." International Journal of Network Security & Its Applications (IJNSA) 5, no. 2 (2013): 193–210. https://doi.org/10.5281/zenodo.4059648.
Texto completo da fonteD., Maheswari, and G. K. Kamalam Dr. "ART: AN ATTACK-RESISTANT TRUST MANAGEMENT SCHEME FOR MISBEHAVIOR DETECTION IN VANET." International Journal of Advanced Trends in Engineering and Technology 1, no. 2 (2017): 29–34. https://doi.org/10.5281/zenodo.345656.
Texto completo da fonteMa, Zhe, Xuhesheng Chen, Tiejiang Sun, Xukang Wang, Ying Cheng Wu, and Mengjie Zhou. "Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization." Future Internet 16, no. 5 (2024): 163. http://dx.doi.org/10.3390/fi16050163.
Texto completo da fonteNitta, Mellania Ariya, and Nuruni Ika Kusuma Wardhani. "Kepercayaan dalam Memediasi Keamanan dan Persepsi Resiko terhadap Minat Beli Konsumen." Journal of Management and Bussines (JOMB) 4, no. 2 (2022): 1105–20. http://dx.doi.org/10.31539/jomb.v4i2.5046.
Texto completo da fonteS.Rajaram. "Secure Routing Path Using Trust Values for Wireless Sensor Networks." International Journal on Cryptography and Information Security (IJCIS) 4, no. 2 (2014): 10. https://doi.org/10.5281/zenodo.7407765.
Texto completo da fonte