Academic literature on the topic 'Computer security – Technological innovations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer security – Technological innovations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer security – Technological innovations"
Helander, Martin G., and Kow Yong Ming. "Identifying the Needs of Elderly for Technological Innovations in the Smart Home." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 49, no. 2 (September 2005): 158–62. http://dx.doi.org/10.1177/154193120504900202.
Full textNiu, Jun Tao, and Dong Hong Liu. "Security Mechanism Design on the Embedded Computer System." Applied Mechanics and Materials 651-653 (September 2014): 1937–40. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1937.
Full textAbasova, Samira. "Analysis and assessment of ICT innovations impact on competitiveness of foreign economic relations: Azerbaijan's experience." Technology audit and production reserves 5, no. 4(67) (November 30, 2022): 29–36. http://dx.doi.org/10.15587/2706-5448.2022.268042.
Full textRatten, Vanessa. "The effect of cybercrime on open innovation policies in technology firms." Information Technology & People 32, no. 5 (October 7, 2019): 1301–17. http://dx.doi.org/10.1108/itp-03-2018-0119.
Full textZhang, Zhenyu, and Zhuanzhuan Ge. "Protection and Restriction of Grain-Related Intellectual Property Rights in the Context of Food Security Based on Industrial Internet of Things." Mobile Information Systems 2022 (June 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/4554447.
Full textZhu, Wen, and Jianjun Wang. "Computer information security and privacy protection technology in the background of big data." Advances in Engineering Technology Research 1, no. 2 (September 24, 2022): 393. http://dx.doi.org/10.56028/aetr.1.2.393.
Full textZhu, Wen, and Jianjun Wang. "Computer information security and privacy protection technology in the background of big data." Advances in Engineering Technology Research 2, no. 1 (September 24, 2022): 393. http://dx.doi.org/10.56028/aetr.2.1.393.
Full textChen, Minfeng. "Optimal Management of Computer Network Security in the Era of Big Data." Journal of Computer Networks and Communications 2022 (October 5, 2022): 1–10. http://dx.doi.org/10.1155/2022/9049420.
Full textVINOKUROV, ILYA. "DIGITAL ECONOMY IN THE RUSSIAN FEDERATION. PROBLEMS AND PROSPECTS FOR DEVELOPMENT." Public Administration 23, no. 5 (2021): 60–66. http://dx.doi.org/10.22394/2070-8378-2021-23-5-60-66.
Full textIlyash, Olha, Liubov Smoliar, Ruslan Lupak, Nataliia Duliaba, Iryna Dzhadan, Maryana Kohut, and Denys Radov. "Multidimensional analysis and forecasting the relationship between indicators of industrial-technological development and the level of economic security." Eastern-European Journal of Enterprise Technologies 5, no. 13 (113) (October 31, 2021): 14–25. http://dx.doi.org/10.15587/1729-4061.2021.243262.
Full textDissertations / Theses on the topic "Computer security – Technological innovations"
Ransbotham, Samuel B. III. "Acquisition and diffusion of technology innovation." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.
Full textCollins, Michael. "Randomised shuffle and applied misinformation: An enhanced model for contact-based smart-card serial data transfer." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1997. https://ro.ecu.edu.au/theses/877.
Full textWillett, Melanie. "A framework for assuring conformance of cloud-based email at higher education institutions." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1018664.
Full textOpie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.
Full textStocking, Galen Asher Thomas. "The threat of cyberterrorism: Contemporary consequences and prescriptions." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2590.
Full textHsiao, Chih-Wen, David Turner, and Keith Ross. "A secure lightweight currency service provider." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2594.
Full textFuller, Marvin G. "Technological enhancements for personal computers." Thesis, Monterey, Calif. : Naval Postgraduate School, 1992. http://handle.dtic.mil/100.2/ADA247962.
Full textThesis Advisor: Poock, Gary K. "March 1992." Includes bibliographical references (p. 54-55). Also available in print.
Ratliff, John M. "The persistence of national regimes of innovation in a globalizing economy : Japanese developmentalism in the information and telecommunications industries, 1985-1997 /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC IP addresses, 1998. http://wwwlib.umi.com/cr/ucsd/fullcit?p9837848.
Full textLi, Chuen-Yueh. "Global sourcing in innovation." Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1619148901&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Full textChristy, Sheila Ann Colley. "Future developments of computer network technologies in K-12 educational environments /." free to MU campus, to others for purchase, 1997. http://wwwlib.umi.com/cr/mo/fullcit?p9842520.
Full textBooks on the topic "Computer security – Technological innovations"
The future X network: A Bell Labs perspective. Boca Raton, FL: CRC Press, 2015.
Find full textUnited States. Congress. Senate. Committee on Commerce, Science, and Transportation. Subcommittee on Science, Technology, and Space. S. 2037, S. 2182, homeland security and the technology sector: Hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Seventh Congress, second session, April 24, 2002. Washington: U.S. G.P.O., 2004.
Find full text(Belarus), Rėspublikanskai︠a︡ navukova-tėkhnichnai︠a︡ biblii︠a︡tėka. Informat︠s︡ionnoe obespechenie strategii innovat︠s︡ionnogo razvitii︠a︡ nauki i proizvodstva: Materialy nauchno-prakticheskoĭ konferent︠s︡ii, 12-13 okti︠a︡bri︠a︡ 2010 g. Minsk: Respublikanskai︠a︡ nauchno-tekhnicheskai︠a︡ biblioteka, 2010.
Find full textSchneier on security. Indianapolis, IN: Wiley Pub., 2008.
Find full textUnited States. Congress. House. Committee on Science, Space, and Technology (2011). Subcommittee on Research and Technology, ed. Can technology protect Americans from international cybercriminals?: Joint hearing before the Subcommittee on Oversight & Subcommittee Research and Technology, Committee on Science, Space, and Technology, House of Representatives, One Hundred Thirteenth Congress, second session, March 6, 2014. Washington: U.S. Government Printing Office, 2014.
Find full textWars of disruption and resilience: Cybered conflict, power, and national security. Athens: University of Georgia Press, 2011.
Find full textCheng shi xin xi hua feng xian guan li yan jiu. Beijing Shi: Jing ji ke xue chu ban she, 2011.
Find full textUnited States. Congress. House. Committee on Science. Subcommittee on Technology. Do you know who you are doing business with?: Signatures in a digital age : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, October 28, 1997. Washington: U.S. G.P.O., 1998.
Find full text1947-, Luker Mark A., Petersen Rodney J, and EDUCAUSE (Association), eds. Computer and network security in higher education. San Francisco: Jossey-Bass, 2003.
Find full textThreat 2.0: Security and compliance for Web 2.0 sites. Ely, UK: IT Governance Pub., 2009.
Find full textBook chapters on the topic "Computer security – Technological innovations"
Gupta, Rakesh Kumar. "Technological Innovations and Emerging Issues in Beekeeping." In Beekeeping for Poverty Alleviation and Livelihood Security, 507–54. Dordrecht: Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-9199-1_19.
Full textSinchana, M. K., and R. M. Savithramma. "Survey on Cloud Computing Security." In Innovations in Computer Science and Engineering, 1–6. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2043-3_1.
Full textGhelani, Dharmesh, Vikas Maral, and D. C. Mehetre. "Efficient Network Security Virtualization Scheme." In Innovations in Computer Science and Engineering, 51–58. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8201-6_6.
Full textVaseashta, Ashok. "Technological Innovations to Counter CBRNE Threat Vectors and Ecotage." In NATO Science for Peace and Security Series A: Chemistry and Biology, 3–23. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-2488-4_1.
Full textPangaribowo, Evita, and Nicolas Gerber. "Innovations for Food and Nutrition Security: Impacts and Trends." In Technological and Institutional Innovations for Marginalized Smallholders in Agricultural Development, 41–64. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-25718-1_3.
Full textSingh, Paramveer, and Monika Sharma. "Smart Device Challenges and Security Channels." In Innovations in Computer Science and Engineering, 33–40. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2043-3_5.
Full textHavisha, V., P. V. Padmavathi, and S. V. Ramanamurthy. "Cloud Security-Random Attribute Based Encryption." In Innovations in Computer Science and Engineering, 113–20. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3818-1_13.
Full textBegum, Gousiya, S. Zahoor Ul Huq, and A. P. Siva Kumar. "Security Features in Hadoop—A Survey." In Innovations in Computer Science and Engineering, 269–76. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4543-0_29.
Full textLikhar, Praveen, and Ravi Shankar Yadav. "Stealth Firewall: Invisible Wall for Network Security." In Innovations in Computer Science and Engineering, 413–21. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2043-3_46.
Full textGarg, Kanika, and Jaiteg Singh. "A Proposed Technique for Cloud Computing Security." In Innovations in Computer Science and Engineering, 89–95. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3818-1_10.
Full textConference papers on the topic "Computer security – Technological innovations"
Manzar, Osama, and Saurabh Srivastava. "Presenting START, GOAL, Digital Sarthak, SkillBot and Maker’s Space: Inspiring Innovations for an Empowering, Democratic and Inclusive Technological Society." In Tenth Pan-Commonwealth Forum on Open Learning. Commonwealth of Learning, 2022. http://dx.doi.org/10.56059/pcf10.9404.
Full textGulshan and Sansar Singh Chauhan. "A Survey on Cyber Security Threats." In 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. http://dx.doi.org/10.1109/ictai53825.2021.9673184.
Full textSingh, Gurinder, Ruchika Gupta, and Vidushi Vatsa. "A Framework for Enhancing Cyber Security in Fintech Applications in India." In 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. http://dx.doi.org/10.1109/ictai53825.2021.9673277.
Full textManocha, Prabhjot Singh, and Rajiv Kumar. "A Review Paper: Improving Spider Monkey Optimization Algorithm SDN Routing for IOT Security." In 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. http://dx.doi.org/10.1109/ictai53825.2021.9673195.
Full textTewari, Naveen, and Gopal Datt. "A Study On The Systematic Review Of Security Vulnerabilities Of Popular Web Browsers." In 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. http://dx.doi.org/10.1109/ictai53825.2021.9673463.
Full textKukharenko, Elena G., and Vladimir A. Mankov. "Digitalization of the Company's Business Processes Based on Technological Innovations." In 2022 International Conference on Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS). IEEE, 2022. http://dx.doi.org/10.1109/itqmis56172.2022.9976792.
Full textAnvekar, Raj G., and Rajeshwari M. Banakar. "IoT application development: Home security system." In 2017 IEEE Technological Innovations in ICT for Agriculture and Rural Development (TIAR). IEEE, 2017. http://dx.doi.org/10.1109/tiar.2017.8273688.
Full textTewari, Naveen, and Gopal Datt. "A Systematic Review of Security Issues and challenges with Futuristic Wearable Internet of Things (IoTs)." In 2021 International Conference on Technological Advancements and Innovations (ICTAI). IEEE, 2021. http://dx.doi.org/10.1109/ictai53825.2021.9673353.
Full textFaizel, Fariya, and N. Vishwanath. "Noval Hybrid System Compressor Based Watermarking Scheme for Security of Multimedia Data." In 2018 International Conference on Emerging Trends and Innovations In Engineering And Technological Research (ICETIETR). IEEE, 2018. http://dx.doi.org/10.1109/icetietr.2018.8529094.
Full textKaur, Loveneet, and Ekta Rani. "Cloud computing’s emergence and associated security challenges." In INNOVATIONS IN COMPUTATIONAL AND COMPUTER TECHNIQUES: ICACCT-2021. AIP Publishing, 2022. http://dx.doi.org/10.1063/5.0108906.
Full textReports on the topic "Computer security – Technological innovations"
Bauder, T. A. Proposal to improve math, science and computer science education at Woodrow Wilson Senior High School through the implementation of technological innovations. Office of Scientific and Technical Information (OSTI), December 1994. http://dx.doi.org/10.2172/510608.
Full textData Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.
Full textPayment Systems Report - June of 2021. Banco de la República, February 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.
Full text