Journal articles on the topic 'Internet – security measures. sears'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Internet – security measures. sears.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
McCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (May 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Full textZhou, Zhong Wei, and Lei Shi. "Security Research and Measures for the Internet of Things." Advanced Materials Research 748 (August 2013): 910–14. http://dx.doi.org/10.4028/www.scientific.net/amr.748.910.
Full textChen, Jing. "Analysis on Network Security and Corresponding Preventive Measures." Applied Mechanics and Materials 241-244 (December 2012): 2312–15. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2312.
Full textNiu, Minghao, and Hong Dai. "Internet of Things Information Security and Preventive Measures." Academic Journal of Science and Technology 4, no. 2 (January 4, 2023): 93–96. http://dx.doi.org/10.54097/ajst.v4i2.3977.
Full textGupta, Sanjay Kumar, and Sandeep Vanjale. "Cyber Security Measures for Internet of Things Devices." International Journal of Engineering Research and Technology 13, no. 8 (August 31, 2020): 1830. http://dx.doi.org/10.37624/ijert/13.8.2020.1830-1839.
Full textWang, Hongqiao. "On Computer Communication Network Security Maintenance Measures." Studies in Social Science Research 4, no. 3 (July 24, 2023): p134. http://dx.doi.org/10.22158/sssr.v4n3p134.
Full textSang, Yun Chang, and Xin Gao. "Security Issues and Protective Measures of the Internet of Things Architecture." Advanced Materials Research 765-767 (September 2013): 1007–10. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1007.
Full textМинаев, В. А., Б. А. Швырев, and Т. Р. Ромашкин. "INTERNET OF THINGS SECURITY: KEY SOLUTIONS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 2(-) (June 30, 2023): 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.
Full textHe, Beige. "The Advance of Internet of Things Security Threats and Possible Measures." Highlights in Science, Engineering and Technology 68 (October 9, 2023): 202–11. http://dx.doi.org/10.54097/hset.v68i.12067.
Full textGomes, Leandre, Abhinav Deshmukh, and Nilesh Anute. "Cyber Security and Internet Banking: Issues and Preventive Measures." Journal of Information Technology and Sciences 8, no. 2 (July 14, 2022): 31–42. http://dx.doi.org/10.46610/joits.2022.v08i02.005.
Full textChen, Jing. "Analysis on Internet Attack and Security." Advanced Materials Research 605-607 (December 2012): 2387–90. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.2387.
Full textImdad, Maria, Deden Witarsyah Jacob, Hairulnizam Mahdin, Zirawani Baharum, Shazlyn Milleana Shaharudin, and Mohd Sanusi Azmi. "Internet of things: security requirements, attacks and counter measures." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 3 (June 1, 2020): 1520. http://dx.doi.org/10.11591/ijeecs.v18.i3.pp1520-1530.
Full textDu, Yu Lin. "Research on the Information Security of Internet Bank." Applied Mechanics and Materials 687-691 (November 2014): 1925–29. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1925.
Full textWang, Xiao Feng. "Research on Security Issues of the Internet of Things." Advanced Materials Research 989-994 (July 2014): 4261–64. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4261.
Full textWenceslaus Ritte, James. "Security Concerns in Internet of Things." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 30, 2021): 2898–901. http://dx.doi.org/10.22214/ijraset.2021.36977.
Full textKumar Yogi, Manas, Y. Himatej, and M. Mahesh reddy. "IOT Security Challenges and Measures to Mitigate: Novel Perspectives." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 854. http://dx.doi.org/10.14419/ijet.v7i2.7.11081.
Full textRueda-Rueda, Johan Smith, and Jesus M. T. Portocarrero. "Framework-based security measures for Internet of Thing: A literature review." Open Computer Science 11, no. 1 (January 1, 2021): 346–54. http://dx.doi.org/10.1515/comp-2020-0220.
Full textSharma, Shruti, Rajkumar Saini, Sumit Saini, and Tushar Sharma. "Network Security Essentials: Understanding Its Key Attacks and Potential Security Mechanism." Industrial Engineering Journal 52 (2023): 175–84. http://dx.doi.org/10.36893/iej.2023.v52.174-184.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textBashir et. al., Adil. "Internet of Things Security Issues, Threats, Attacks and Counter Measures." International Journal of Computing and Digital Systemss 7, no. 2 (March 1, 2018): 111–20. http://dx.doi.org/10.12785/ijcds/070206.
Full textBACÎŞ, Irina-Bristena. "Types of Threats and Appropriate Countermeasures for Internet Communications." International Journal of Information Security and Cybercrime 10, no. 1 (June 29, 2021): 27–37. http://dx.doi.org/10.19107/ijisc.2021.01.03.
Full textCao, Xiyu. "The application of artificial intelligence in internet security." Applied and Computational Engineering 18, no. 1 (October 23, 2023): 230–35. http://dx.doi.org/10.54254/2755-2721/18/20230995.
Full textVASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Full textFakiha, Bandr. "Business Organization Security Strategies to Cyber Security Threats." International Journal of Safety and Security Engineering 11, no. 1 (February 28, 2021): 101–4. http://dx.doi.org/10.18280/ijsse.110111.
Full textWitczyńska, Katarzyna. "Network security - security methods in transnational corporations (TNC)." Logistics and Transport 45, no. 1 (2020): 55–58. http://dx.doi.org/10.26411/83-1734-2015-1-45-4-20.
Full textFaiz, Mohammad, and A.K. Daniel. "Threats and Challenges for Security Measures on the Internet of Things." Law, State and Telecommunications Review 14, no. 1 (May 20, 2022): 71–97. http://dx.doi.org/10.26512/lstr.v14i1.38843.
Full textRode, Mrs K. N. "Network Security and Cyber Security: A Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 3404–7. http://dx.doi.org/10.22214/ijraset.2022.44501.
Full textAgarwal, Sanyam, Veer Daksh Agarwal, Vipin Mittal, and Ishaan Agarwal. "Review of Effect of Internet of Things(IoT) in Cybercrime." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (June 30, 2023): 4672–78. http://dx.doi.org/10.22214/ijraset.2023.54519.
Full textMargaret Dumebi Okpor, Kizito Eluemunor Anazia, and Daniel Ukpenusiowho. "A novel hybrid database security management technique." International Journal of Science and Research Archive 11, no. 2 (April 30, 2024): 1555–65. http://dx.doi.org/10.30574/ijsra.2024.11.2.0652.
Full textGalatenko, V. A., and K. A. Kostyukhin. "IoT Information Security: Fundamental Statements Review." Programmnaya Ingeneria 11, no. 5 (October 22, 2020): 259–69. http://dx.doi.org/10.17587/prin.11.259-269.
Full textQi, Kun. "Security Application of 5G Technology in Industrial Internet." Journal of Electronic Research and Application 6, no. 1 (January 18, 2022): 11–14. http://dx.doi.org/10.26689/jera.v6i1.3545.
Full textSong, Xinde. "Research on Security Protection Architecture of Energy Internet Information Communication." MATEC Web of Conferences 228 (2018): 02010. http://dx.doi.org/10.1051/matecconf/201822802010.
Full textBu, Bing, Lei Wang, Zhenyang Pi, and Weiguo Fang. "Stackelberg Model of Anti-terrorism Resource Allocation in Express Transportation Security Checks." E3S Web of Conferences 253 (2021): 02020. http://dx.doi.org/10.1051/e3sconf/202125302020.
Full textRapalus, Patrice. "Security measures for protecting confidential information on the internet and intranets." Employment Relations Today 24, no. 3 (September 1997): 49–58. http://dx.doi.org/10.1002/ert.3910240306.
Full textZhurylo, Oleh, and Oleksii Liashenko. "Architecture and iot security systems based on fog computing." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 1 (27) (July 2, 2024): 54–66. http://dx.doi.org/10.30837/itssi.2024.27.054.
Full textNakissa, Aria. "Security, Islam, and Indonesia." Bijdragen tot de taal-, land- en volkenkunde / Journal of the Humanities and Social Sciences of Southeast Asia 176, no. 2-3 (June 11, 2020): 203–39. http://dx.doi.org/10.1163/22134379-bja10004.
Full textPYRKOSZ, Aleksandra, and Sabina SZYMONIAK. "Simplifying security processes in large organizations while maintaining an appropriate level of security." Inżynieria Bezpieczeństwa Obiektów Antropogenicznych, no. 2 (June 10, 2024): 1–8. http://dx.doi.org/10.37105/iboa.186.
Full textNordin, Siti Aminah, Zakiah Mohd Yusoff, Muhammad Hanif Faisal, and Khairul Kamarudin. "Securing high-value electronic equipment: an internet of things driven approach for camera security." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 3 (September 1, 2024): 2763. http://dx.doi.org/10.11591/ijai.v13.i3.pp2763-2772.
Full textClark, M'Kaila J., and Lila Rajabion. "A Strategic Approach to IoT Security by Working Towards a Secure IoT Future." International Journal of Hyperconnectivity and the Internet of Things 7, no. 1 (February 3, 2023): 1–18. http://dx.doi.org/10.4018/ijhiot.317088.
Full textAlisultanova, Iman A., Galina A. Ovseenko, and Bella Kh Visaitova. "ANALYSIS OF NETWORK INFORMATION SECURITY STRATEGIES IN HIGHER EDUCATION INSTITUTIONS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 5/5, no. 146 (2024): 30–35. http://dx.doi.org/10.36871/ek.up.p.r.2024.05.05.005.
Full textNur A'fyfah Zaimy, Mohamad Fadli Zolkipli, and Norliza Katuk. "A review of hacking techniques in IoT systems and future trends of hacking on IoT environment." World Journal of Advanced Research and Reviews 17, no. 2 (February 28, 2023): 723–31. http://dx.doi.org/10.30574/wjarr.2023.17.2.0310.
Full textZHU, Yayun, Lin JIANG, Anqi YUAN, and Yinghao YUAN. "Security Protection Method of Energy Internet with Android." Wuhan University Journal of Natural Sciences 27, no. 1 (March 2022): 11–16. http://dx.doi.org/10.1051/wujns/2022271011.
Full textM. Radhi, Batool, and Mohammed A. Hussain. "Smart Building Security using ESP32 based AES One Bio-key and Owner's Biometrics Encryption Technology." 49 49.2, no. 2 (December 30, 2023): 30–46. http://dx.doi.org/10.56714/bjrs.49.2.4.
Full textSrhir, Ahmed, Tomader Mazri, and Mohammed Benbrahim. "Towards secure smart campus: security requirements, attacks and counter measures." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 2 (November 1, 2023): 900. http://dx.doi.org/10.11591/ijeecs.v32.i2.pp900-914.
Full textKwon, Hyukjin, Youngjoo Shin, Jaeyeong Jeong, Kookjin Kim, and Dongkyoo Shin. "Measures to Ensure the Sustainability of Information Systems in the COVID-19 Environment." Sustainability 15, no. 1 (December 20, 2022): 35. http://dx.doi.org/10.3390/su15010035.
Full textThomas, Asha. "Analysis on Cyber Crimes and Preventive Measures." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 3738–44. http://dx.doi.org/10.22214/ijraset.2023.52481.
Full textShen, Yang. "Research on Internet Information Security in the Big Data Era." E3S Web of Conferences 218 (2020): 04008. http://dx.doi.org/10.1051/e3sconf/202021804008.
Full textTao, Centong. "Internet Financial Information Security Risk and Prevention in the Age of Artificial Intelligence." Frontiers in Business, Economics and Management 13, no. 3 (March 6, 2024): 341–44. http://dx.doi.org/10.54097/40w79j67.
Full textTaji, Khaoula, Badr Elkhalyly, Yassine Taleb Ahmad, Ilyas Ghanimi, and Fadoua Ghanimi. "Securing Smart Agriculture: Proposed Hybrid Meta-Model and Certificate-based Cyber Security Approaches." Data and Metadata 2 (December 30, 2023): 155. http://dx.doi.org/10.56294/dm2023155.
Full textSun, Yuxuan. "Computer network information security and protection strategies in the era of big data." Applied and Computational Engineering 4, no. 1 (June 14, 2023): 574–80. http://dx.doi.org/10.54254/2755-2721/4/2023326.
Full text