Journal articles on the topic 'Security of information and communication systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security of information and communication systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Masadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (October 2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.
Full textMatrokhina, K. V., A. B. Makhovikov, and E. N. Trofimets. "Ensuring information security in corporate communication systems." E3S Web of Conferences 266 (2021): 09001. http://dx.doi.org/10.1051/e3sconf/202126609001.
Full textWITKOWSKI, Marek. "SECURITY OF ICT SYSTEMS IN CRISIS MANAGEMENT." Scientific Journal of the Military University of Land Forces 162, no. 4 (October 1, 2011): 80–90. http://dx.doi.org/10.5604/01.3001.0002.3179.
Full textGorbenko, I. D., and Yu V. Stasev. "Information security in space communication and control systems." Kosmìčna nauka ì tehnologìâ 2, no. 5-6 (September 30, 1996): 64–68. http://dx.doi.org/10.15407/knit1996.05.064.
Full textRao, Nandan, Shubhra Srivastava, and Sreekanth K.S. "PKI Deployment Challenges and Recommendations for ICS Networks." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 38–48. http://dx.doi.org/10.4018/ijisp.2017040104.
Full textLeines-Vite, Lenin, Juan Carlos Pérez-Arriaga, and Xavier Limón. "Information and Communication Security Mechanisms For Microservices-based Systems." International Journal of Network Security & Its Applications 13, no. 6 (November 30, 2021): 85–103. http://dx.doi.org/10.5121/ijnsa.2021.13607.
Full textKoskosas, Ioannis. "Communicating information systems goals: A case in internet banking security." Computer Science and Information Systems 6, no. 1 (2009): 71–92. http://dx.doi.org/10.2298/csis0901071k.
Full textStanton, Jeffrey M. "Security of Information and Communication Networks." Journal of the American Society for Information Science and Technology 61, no. 5 (November 11, 2009): 1074. http://dx.doi.org/10.1002/asi.21258.
Full textHalaweh, Mohanad. "Users' Perception of Security for Mobile Communication Technology." International Journal of Information Security and Privacy 8, no. 3 (July 2014): 1–12. http://dx.doi.org/10.4018/ijisp.2014070101.
Full textMenkus, Belden. "Information Systems Quality Assurance Enhances Information Systems Security." EDPACS 17, no. 12 (June 1990): 6–10. http://dx.doi.org/10.1080/07366989009450603.
Full textTabakaeva, Valeria A., Valentin V. Selivanov, and Vladimir R. An. "APPLICATION OF INTELLIGENT SYSTEMS IN OPTICAL COMMUNICATION SYSTEMS TO ENSURE INFORMATION SECURITY." Interexpo GEO-Siberia 8 (May 21, 2021): 337–43. http://dx.doi.org/10.33764/2618-981x-2021-8-337-343.
Full textJulian, Alfred. "Information Warfare and Information Systems Security." EDPACS 24, no. 3 (September 1996): 8–12. http://dx.doi.org/10.1080/07366989609452269.
Full textMatveeva, A. A., I. V. Kim, and I. I. Viksnin. "Information security methods for communication channels in multiagent robotic systems." Scientific and Technical Journal of Information Technologies, Mechanics and Optics 19, no. 1 (February 1, 2019): 102–8. http://dx.doi.org/10.17586/2226-1494-2019-19-1-102-108.
Full textJuneja, Mamta. "A Covert Communication Model-Based on Image Steganography." International Journal of Information Security and Privacy 8, no. 1 (January 2014): 19–37. http://dx.doi.org/10.4018/ijisp.2014010102.
Full textLuo, Kun. "Analysis of Information Security Maintenance Countermeasures in Power Automation Communication Technology." Lifelong Education 9, no. 6 (September 28, 2020): 127. http://dx.doi.org/10.18282/le.v9i6.1320.
Full textMaslova, Maria. "Applying intelligent methods of risk analysis in information communication systems." ITM Web of Conferences 30 (2019): 04018. http://dx.doi.org/10.1051/itmconf/20193004018.
Full textChang, Kuo-chung, and Chih-ping Wang. "Information systems resources and information security." Information Systems Frontiers 13, no. 4 (April 27, 2010): 579–93. http://dx.doi.org/10.1007/s10796-010-9232-6.
Full textShen, Aiguo, Guangsong Yang, and Dezhi Wei. "Performance of multi-antenna wireless systems based on time reversal." Journal of Physics: Conference Series 2079, no. 1 (November 1, 2021): 012025. http://dx.doi.org/10.1088/1742-6596/2079/1/012025.
Full textAbdallah, Asmaa, M. Ali, Jelena Mišić, and Vojislav Mišić. "Efficient Security Scheme for Disaster Surveillance UAV Communication Networks." Information 10, no. 2 (January 29, 2019): 43. http://dx.doi.org/10.3390/info10020043.
Full textHart, Penny. "Information Security and Virtual Teams." International Journal of Systems and Society 4, no. 2 (July 2017): 1–7. http://dx.doi.org/10.4018/ijss.2017070101.
Full textCai-Sen Chen, Cai-Sen Chen, Yang-Xia Xiang Cai-Sen Chen, Jia-Xing Du Yang-Xia Xiang, 陳嵩 Jia-Xing Du, and Cong Lin Song Chen. "Based on SM - 9 Cloud Edge System Information Security Transmission." 電腦學刊 33, no. 1 (February 2022): 189–98. http://dx.doi.org/10.53106/199115992022023301017.
Full textDunkerley, Kimberley, and Gurvirender Tejay. "Theorizing Information Security Success." International Journal of Electronic Government Research 6, no. 3 (July 2010): 31–41. http://dx.doi.org/10.4018/jegr.2010070103.
Full textMenkus, Belden. "Firewalls in Information Systems Security." EDPACS 23, no. 3 (September 1995): 9–15. http://dx.doi.org/10.1080/07366989509451685.
Full textBAFTIU, Naim, Ahmet NUREDINI, and Samedin KRRABAJ. "Encrypted Data Service for Security Electronic Communications." PRIZREN SOCIAL SCIENCE JOURNAL 3, no. 3 (December 26, 2019): 84. http://dx.doi.org/10.32936/pssj.v3i3.120.
Full textRiguidel, Michel. "Creating a new security for tomorrow’s communication networks and information systems." Annales Des Télécommunications 55, no. 7-8 (July 2000): 401–18. http://dx.doi.org/10.1007/bf02994847.
Full textGonçalves, Fábio, Joaquim Macedo, and Alexandre Santos. "An Intelligent Hierarchical Security Framework for VANETs." Information 12, no. 11 (November 2, 2021): 455. http://dx.doi.org/10.3390/info12110455.
Full textYacouba, Kouraogo, Orhanou Ghizlane, and Elhajji Said. "Securing Communication 2FA Using Post-Quantic Cryptosystem." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 102–15. http://dx.doi.org/10.4018/ijisp.2020040106.
Full textHo, Pin‐Han, Zonghua Zhang, and Rongxing Lu. "Special Issue on “Security and Privacy Preservation in Vehicular Communications” Wiley's Security and Communication Networks Journal." Security and Communication Networks 1, no. 3 (May 2008): 191–93. http://dx.doi.org/10.1002/sec.34.
Full textClark, Sarah. "Book Review: Library Security: Better Communication, Safer Facilities." Reference & User Services Quarterly 55, no. 3 (March 24, 2016): 245. http://dx.doi.org/10.5860/rusq.55n3.245.
Full textZou, Shihong, Yanhong Xu, Honggang Wang, Zhouzhou Li, Shanzhi Chen, and Bo Hu. "A Survey on Secure Wireless Body Area Networks." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/3721234.
Full textMishra, Sushma, Donald J. Caputo, Gregory J. Leone, Fred G. Kohun, and Peter J. Draus. "The Role Of Awareness And Communications In Information Security Management: A Health Care Information Systems Perspective." International Journal of Management & Information Systems (IJMIS) 18, no. 2 (March 28, 2014): 139. http://dx.doi.org/10.19030/ijmis.v18i2.8495.
Full textEL Azzaoui, Abir, Haotian Chen, So Hyeon Kim, Yi Pan, and Jong Hyuk Park. "Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems." Sensors 22, no. 4 (February 10, 2022): 1371. http://dx.doi.org/10.3390/s22041371.
Full textYılmaz, Mustafa Harun, Ertuğrul Güvenkaya, Haji M. Furqan, Selçuk Köse, and Hüseyin Arslan. "Cognitive Security of Wireless Communication Systems in the Physical Layer." Wireless Communications and Mobile Computing 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/3592792.
Full textFarkas, Tibor. "Communication and Information Services – NATO Requirements, Part I." Land Forces Academy Review 25, no. 4 (December 1, 2020): 281–89. http://dx.doi.org/10.2478/raft-2020-0034.
Full textFarkas, Tibor. "Communication and Information Services – NATO Requirements, Part I." Land Forces Academy Review 25, no. 4 (December 1, 2020): 281–89. http://dx.doi.org/10.2478/raft-2020-0034.
Full textBabu, Erukala Suresh, C. Nagaraju, and M. H. M. Krishna Prasad. "IPHDBCM." International Journal of Information Security and Privacy 10, no. 3 (July 2016): 42–66. http://dx.doi.org/10.4018/ijisp.2016070104.
Full textOlakanmi, Oladayo Olufemi, and Kehinde Oluwasesan Odeyemi. "VerSA." International Journal of Information Security and Privacy 15, no. 3 (July 2021): 65–82. http://dx.doi.org/10.4018/ijisp.2021070105.
Full textSmolarek, Mirosław, and Marek Witkowski. "Ict Security Of A State." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 3 (June 1, 2015): 743–48. http://dx.doi.org/10.1515/kbo-2015-0125.
Full textMoskovchenko, Valeriy, Mikhail Gudkov, and Oleg Lauta. "Robotechnical System for Analyzing Cyber-Security of Information Communication Systems and Networks." NBI Technologies, no. 2 (February 2018): 30–38. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.5.
Full textAnnane, Boubakeur, and Alti Adel. "Proxy-3S." International Journal of Information Security and Privacy 16, no. 1 (January 2022): 1–38. http://dx.doi.org/10.4018/ijisp.2022010116.
Full textPetrescu, Anca Gabriela. "Management Approach of Risk Analysis in Information Security." International Journal of Innovation in the Digital Economy 9, no. 3 (July 2018): 13–26. http://dx.doi.org/10.4018/ijide.2018070102.
Full textBlaga, Nataliya, and Volodymyr Hobela. "IMPROVEMENT OF INFORMATION SECURITY OF THE COMMUNICATION PROCESS AT THE ENTERPRISE." Social & Legal Studios 13, no. 3 (September 29, 2021): 156–62. http://dx.doi.org/10.32518/2617-4162-2021-3-156-162.
Full textNordstrom, L. "Assessment of Information Security Levels in Power Communication Systems Using Evidential Reasoning." IEEE Transactions on Power Delivery 23, no. 3 (July 2008): 1384–91. http://dx.doi.org/10.1109/tpwrd.2008.919231.
Full textAllen, Sandra. "Information Systems Security in an Open Systems Environment." EDPACS 23, no. 5 (November 1995): 1–17. http://dx.doi.org/10.1080/07366989509451379.
Full textGrabusts, Pēteris. "Security Aspects of Information Structures in the Information Warfare Context." Information Technology and Management Science 21 (December 14, 2018): 49–53. http://dx.doi.org/10.7250/itms-2018-0007.
Full textHenderson, Stuart. "The Information Systems Security Policy Statement." EDPACS 23, no. 12 (June 1996): 9–18. http://dx.doi.org/10.1080/07366989609451717.
Full textXia, Zhe, Yining Liu, Ching-Fang Hsu, and Chin-Chen Chang. "Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications." Security and Communication Networks 2020 (July 13, 2020): 1–8. http://dx.doi.org/10.1155/2020/6183861.
Full textGorohov, Roman S., and Sergey N. Novikov. "STATE OF CAD INFORMATION SECURITY." Interexpo GEO-Siberia 6, no. 1 (July 8, 2020): 110–13. http://dx.doi.org/10.33764/2618-981x-2020-6-1-110-113.
Full textA. Alrubaidi, Mohammed, and Nabil Hassan Abdo Al-Hemyari. "Impact of Information Technology Risks on Information Systems Security: A Field Study of Telecommunication Companies in Yemen." مجلة الدراسات الاجتماعية 27, no. 1 (May 6, 2021): 125–57. http://dx.doi.org/10.20428/jss.27.1.5.
Full textShi, Shuyun, Min Luo, Yihong Wen, Lianhai Wang, and Debiao He. "A Blockchain-Based User Authentication Scheme with Access Control for Telehealth Systems." Security and Communication Networks 2022 (March 30, 2022): 1–18. http://dx.doi.org/10.1155/2022/6735003.
Full text