Journal articles on the topic 'Computer networks Security measures Australia'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Computer networks Security measures Australia.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Asre, Shashank, and Adnan Anwar. "Synthetic Energy Data Generation Using Time Variant Generative Adversarial Network." Electronics 11, no. 3 (January 24, 2022): 355. http://dx.doi.org/10.3390/electronics11030355.
Full textSlay, J., and B. Turnbull. "Computer Security Education and Research in Australia." IEEE Security & Privacy Magazine 4, no. 5 (September 2006): 60–63. http://dx.doi.org/10.1109/msp.2006.115.
Full textLittlewood, Bev, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid, and Dieter Gollmann. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (April 1, 1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Full textKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (March 1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Full textGuo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.
Full textKuprashvili, Henri. "Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)." Works of Georgian Technical University, no. 2(524) (June 6, 2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.
Full textSmith, Martin. "Part 2 Personnel security measures within a computer installation." Computer Law & Security Review 6, no. 2 (July 1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.
Full textMo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.
Full textAlfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (November 2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.
Full textZhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.
Full textKounavis, Michael, David Durham, Sergej Deutsch, and Ken Grewal. "Security definitions, entropy measures and constructions for implicitly detecting data corruption." Computer Communications 160 (July 2020): 815–46. http://dx.doi.org/10.1016/j.comcom.2020.05.022.
Full textHeinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, Stefan Katzenbeisser, Neeraj Suri, Henk Birkholz, Andreas Fuchs, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.
Full textHewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (July 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Full textFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks." Journal of Information Technology Research 7, no. 3 (July 2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.
Full textPeng, Yu, Xinrong Liu, Ming Li, Zheng Li, Tao Hu, Yangjun Xiao, Sheng Zhang, et al. "Sensing network security prevention measures of BIM smart operation and maintenance system." Computer Communications 161 (September 2020): 360–67. http://dx.doi.org/10.1016/j.comcom.2020.07.039.
Full textFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks." Journal of Information Technology Research 8, no. 1 (January 2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.
Full textSheela, D., and G. Mahadevan. "Mobile Agent Based Enhanced Security for Wireless Sensor Networks." International Journal of Business Data Communications and Networking 10, no. 2 (April 2014): 15–29. http://dx.doi.org/10.4018/ijbdcn.2014040102.
Full textWang, Xi, and Lei Shi. "Design of computer network security storage system based on cloud computing technology." Journal of Physics: Conference Series 2083, no. 4 (November 1, 2021): 042084. http://dx.doi.org/10.1088/1742-6596/2083/4/042084.
Full textZhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.
Full textOuyang, Chun-Juan, Ming Leng, Jie-Wu Xia, and Huan Liu. "Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1790268.
Full textYuan, Bingxia. "Sensor Network Security Risk Prediction and Control Method Based on Big Data Analysis." Security and Communication Networks 2022 (May 19, 2022): 1–7. http://dx.doi.org/10.1155/2022/7116013.
Full textNazir, Sajid, Shushma Patel, and Dilip Patel. "Autonomic Computing Architecture for SCADA Cyber Security." International Journal of Cognitive Informatics and Natural Intelligence 11, no. 4 (October 2017): 66–79. http://dx.doi.org/10.4018/ijcini.2017100104.
Full textFeng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, and Qi Han. "A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment." Complexity 2021 (June 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.
Full textWang, Xiaoli, Bharadwaj Veeravalli, Yulong Tan, and Zhihao Tong. "Security and Makespan Trade-Off Strategy in Fog-Enabled IoT Networks." Security and Communication Networks 2022 (May 23, 2022): 1–13. http://dx.doi.org/10.1155/2022/5184453.
Full textLiu, Rosina. "Is Security, is Audit, and Control Measures in Telecommunication Toll Fraud." EDPACS 25, no. 3 (September 1997): 1–11. http://dx.doi.org/10.1080/07366989709452320.
Full textA. D., Azernikov, Norkina A. N., Myseva E. R., and Chicherov K. A. "Innovative Technologies in Combating Cyber Crime." KnE Social Sciences 3, no. 2 (February 15, 2018): 248. http://dx.doi.org/10.18502/kss.v3i2.1550.
Full textLiang, Jiaqi, Yibei Wu, Jun’e Li, Xiong Chen, Heqin Tong, and Ming Ni. "Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks." Complexity 2021 (February 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/6659879.
Full textSafavi-Naini, Reihaneh, Alireza Poostindouz, and Viliam Lisy. "Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication." Security and Communication Networks 2018 (May 7, 2018): 1–15. http://dx.doi.org/10.1155/2018/8475818.
Full textNawaz, Naeem A., Kashif Ishaq, Uzma Farooq, Amna Khalil, Saim Rasheed, Adnan Abid, and Fadhilah Rosdi. "A comprehensive review of security threats and solutions for the online social networks industry." PeerJ Computer Science 9 (January 16, 2023): e1143. http://dx.doi.org/10.7717/peerj-cs.1143.
Full textSamreen, Shirina. "Packet Dropping Counter Measures in a MANET Through Reliable Routing Protocol Leveraging a Trust Management Framework." International Journal of Mobile Computing and Multimedia Communications 9, no. 3 (July 2018): 60–75. http://dx.doi.org/10.4018/ijmcmc.2018070104.
Full textDas, Amit, and Habib Ullah Khan. "Security behaviors of smartphone users." Information & Computer Security 24, no. 1 (March 14, 2016): 116–34. http://dx.doi.org/10.1108/ics-04-2015-0018.
Full textKhan, Burhan Ul Islam, Farhat Anwar, Farah Diyana Bt Abdul Rahman, Rashidah Funke Olanrewaju, Miss Laiha B. Mat Kiah, Md Arafatur Rahman, and Zuriati Janin. "EXPLORING MANET SECURITY ASPECTS: ANALYSIS OF ATTACKS AND NODE MISBEHAVIOUR ISSUES." Malaysian Journal of Computer Science 35, no. 4 (October 30, 2022): 307–38. http://dx.doi.org/10.22452/mjcs.vol35no4.2.
Full textAhmad, Bilal, Wang Jian, and Zain Anwar Ali. "Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions." Journal of Computer Networks and Communications 2018 (July 2, 2018): 1–10. http://dx.doi.org/10.1155/2018/6383145.
Full textAl-Otaibi, Yasser D. "A Shared Two-way Cybersecurity Model for Enhancing Cloud Service Sharing for Distributed User Applications." ACM Transactions on Internet Technology 22, no. 2 (May 31, 2022): 1–17. http://dx.doi.org/10.1145/3430508.
Full textSafi, Roozmehr, Glenn J. Browne, and Azadeh Jalali Naini. "Mis-spending on information security measures: Theory and experimental evidence." International Journal of Information Management 57 (April 2021): 102291. http://dx.doi.org/10.1016/j.ijinfomgt.2020.102291.
Full textShabbir, Aysha, Maryam Shabbir, Muhammad Rizwan, and Fahad Ahmad. "Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard." Security and Communication Networks 2019 (December 18, 2019): 1–16. http://dx.doi.org/10.1155/2019/2509898.
Full textWang, Keyong, Xiaoyue Guo, and Dequan Yang. "Research on the Effectiveness of Cyber Security Awareness in ICS Risk Assessment Frameworks." Electronics 11, no. 10 (May 23, 2022): 1659. http://dx.doi.org/10.3390/electronics11101659.
Full textSharma, Tanusree, Hunter A. Dyer, and Masooda Bashir. "Enabling User-centered Privacy Controls for Mobile Applications." ACM Transactions on Internet Technology 21, no. 1 (February 2021): 1–24. http://dx.doi.org/10.1145/3434777.
Full textBhatia, Deepshikha. "A Comprehensive Review on the Cyber Security Methods in Indian Organisation." International Journal of Advances in Soft Computing and its Applications 14, no. 1 (March 28, 2022): 103–24. http://dx.doi.org/10.15849/ijasca.220328.08.
Full textZhu, Qingyi, Yuhang Liu, Xuhang Luo, and Kefei Cheng. "A Malware Propagation Model Considering Conformity Psychology in Social Networks." Axioms 11, no. 11 (November 10, 2022): 632. http://dx.doi.org/10.3390/axioms11110632.
Full textAziz, Israa T., and Ihsan H. Abdulqadder. "An Overview on SDN and NFV Security Orchestration in Cloud Network Environment." Cihan University-Erbil Scientific Journal 5, no. 1 (June 20, 2021): 20–27. http://dx.doi.org/10.24086/cuesj.v5n1y2021.pp20-27.
Full textRietz, René, Radoslaw Cwalinski, Hartmut König, and Andreas Brinner. "An SDN-Based Approach to Ward Off LAN Attacks." Journal of Computer Networks and Communications 2018 (November 21, 2018): 1–12. http://dx.doi.org/10.1155/2018/4127487.
Full textNiveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath, and Magesh S. "Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform." International Journal of e-Collaboration 17, no. 4 (October 2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.
Full textTian, Zhenghao. "Embedded Real-Time Detection of Vehicles and Pedestrians Based on Minimal Networks." Mobile Information Systems 2022 (August 5, 2022): 1–9. http://dx.doi.org/10.1155/2022/3055282.
Full textJain, Jaishree, Arpit Jain, Saurabh Kumar Srivastava, Chaman Verma, Maria Simona Raboaca, and Zoltán Illés. "Improved Security of E-Healthcare Images Using Hybridized Robust Zero-Watermarking and Hyper-Chaotic System along with RSA." Mathematics 10, no. 7 (March 26, 2022): 1071. http://dx.doi.org/10.3390/math10071071.
Full textLiang, Yingchang, Yue Gao, Liang Xiao, Yulong Zou, and Guoru Ding. "Guest editorial: Wireless security challenges and counter measures for dynamic spectrum sharing." China Communications 18, no. 12 (December 2021): iii—vi. http://dx.doi.org/10.23919/jcc.2021.9665362.
Full textBadzeliuk, P. "On the issue of cybersecurity of advocacy activity." Analytical and Comparative Jurisprudence, no. 2 (July 24, 2022): 302–5. http://dx.doi.org/10.24144/2788-6018.2022.02.56.
Full textSheikh, Muhammad Sameer, and Jun Liang. "A Comprehensive Survey on VANET Security Services in Traffic Management System." Wireless Communications and Mobile Computing 2019 (September 15, 2019): 1–23. http://dx.doi.org/10.1155/2019/2423915.
Full text