Artículos de revistas sobre el tema "Internet – security measures. sears"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Internet – security measures. sears".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
McCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Texto completoZhou, Zhong Wei, and Lei Shi. "Security Research and Measures for the Internet of Things." Advanced Materials Research 748 (August 2013): 910–14. http://dx.doi.org/10.4028/www.scientific.net/amr.748.910.
Texto completoChen, Jing. "Analysis on Network Security and Corresponding Preventive Measures." Applied Mechanics and Materials 241-244 (December 2012): 2312–15. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2312.
Texto completoNiu, Minghao, and Hong Dai. "Internet of Things Information Security and Preventive Measures." Academic Journal of Science and Technology 4, no. 2 (2023): 93–96. http://dx.doi.org/10.54097/ajst.v4i2.3977.
Texto completoGupta, Sanjay Kumar, and Sandeep Vanjale. "Cyber Security Measures for Internet of Things Devices." International Journal of Engineering Research and Technology 13, no. 8 (2020): 1830. http://dx.doi.org/10.37624/ijert/13.8.2020.1830-1839.
Texto completoWang, Hongqiao. "On Computer Communication Network Security Maintenance Measures." Studies in Social Science Research 4, no. 3 (2023): p134. http://dx.doi.org/10.22158/sssr.v4n3p134.
Texto completoSang, Yun Chang, and Xin Gao. "Security Issues and Protective Measures of the Internet of Things Architecture." Advanced Materials Research 765-767 (September 2013): 1007–10. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1007.
Texto completoМинаев, В. А., Б. А. Швырев, and Т. Р. Ромашкин. "INTERNET OF THINGS SECURITY: KEY SOLUTIONS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 2(-) (2023): 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.
Texto completoHe, Beige. "The Advance of Internet of Things Security Threats and Possible Measures." Highlights in Science, Engineering and Technology 68 (October 9, 2023): 202–11. http://dx.doi.org/10.54097/hset.v68i.12067.
Texto completoGomes, Leandre, Abhinav Deshmukh, and Nilesh Anute. "Cyber Security and Internet Banking: Issues and Preventive Measures." Journal of Information Technology and Sciences 8, no. 2 (2022): 31–42. http://dx.doi.org/10.46610/joits.2022.v08i02.005.
Texto completoChen, Jing. "Analysis on Internet Attack and Security." Advanced Materials Research 605-607 (December 2012): 2387–90. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.2387.
Texto completoImdad, Maria, Deden Witarsyah Jacob, Hairulnizam Mahdin, Zirawani Baharum, Shazlyn Milleana Shaharudin, and Mohd Sanusi Azmi. "Internet of things: security requirements, attacks and counter measures." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 3 (2020): 1520. http://dx.doi.org/10.11591/ijeecs.v18.i3.pp1520-1530.
Texto completoDu, Yu Lin. "Research on the Information Security of Internet Bank." Applied Mechanics and Materials 687-691 (November 2014): 1925–29. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1925.
Texto completoWang, Xiao Feng. "Research on Security Issues of the Internet of Things." Advanced Materials Research 989-994 (July 2014): 4261–64. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4261.
Texto completoWenceslaus Ritte, James. "Security Concerns in Internet of Things." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 2898–901. http://dx.doi.org/10.22214/ijraset.2021.36977.
Texto completoKumar Yogi, Manas, Y. Himatej, and M. Mahesh reddy. "IOT Security Challenges and Measures to Mitigate: Novel Perspectives." International Journal of Engineering & Technology 7, no. 2.7 (2018): 854. http://dx.doi.org/10.14419/ijet.v7i2.7.11081.
Texto completoRueda-Rueda, Johan Smith, and Jesus M. T. Portocarrero. "Framework-based security measures for Internet of Thing: A literature review." Open Computer Science 11, no. 1 (2021): 346–54. http://dx.doi.org/10.1515/comp-2020-0220.
Texto completoSharma, Shruti, Rajkumar Saini, Sumit Saini, and Tushar Sharma. "Network Security Essentials: Understanding Its Key Attacks and Potential Security Mechanism." Industrial Engineering Journal 52 (2023): 175–84. http://dx.doi.org/10.36893/iej.2023.v52.174-184.
Texto completoZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Texto completoBashir et. al., Adil. "Internet of Things Security Issues, Threats, Attacks and Counter Measures." International Journal of Computing and Digital Systemss 7, no. 2 (2018): 111–20. http://dx.doi.org/10.12785/ijcds/070206.
Texto completoBACÎŞ, Irina-Bristena. "Types of Threats and Appropriate Countermeasures for Internet Communications." International Journal of Information Security and Cybercrime 10, no. 1 (2021): 27–37. http://dx.doi.org/10.19107/ijisc.2021.01.03.
Texto completoCao, Xiyu. "The application of artificial intelligence in internet security." Applied and Computational Engineering 18, no. 1 (2023): 230–35. http://dx.doi.org/10.54254/2755-2721/18/20230995.
Texto completoVASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Texto completoFakiha, Bandr. "Business Organization Security Strategies to Cyber Security Threats." International Journal of Safety and Security Engineering 11, no. 1 (2021): 101–4. http://dx.doi.org/10.18280/ijsse.110111.
Texto completoWitczyńska, Katarzyna. "Network security - security methods in transnational corporations (TNC)." Logistics and Transport 45, no. 1 (2020): 55–58. http://dx.doi.org/10.26411/83-1734-2015-1-45-4-20.
Texto completoFaiz, Mohammad, and A.K. Daniel. "Threats and Challenges for Security Measures on the Internet of Things." Law, State and Telecommunications Review 14, no. 1 (2022): 71–97. http://dx.doi.org/10.26512/lstr.v14i1.38843.
Texto completoRode, Mrs K. N. "Network Security and Cyber Security: A Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 3404–7. http://dx.doi.org/10.22214/ijraset.2022.44501.
Texto completoAgarwal, Sanyam, Veer Daksh Agarwal, Vipin Mittal, and Ishaan Agarwal. "Review of Effect of Internet of Things(IoT) in Cybercrime." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 4672–78. http://dx.doi.org/10.22214/ijraset.2023.54519.
Texto completoMargaret Dumebi Okpor, Kizito Eluemunor Anazia, and Daniel Ukpenusiowho. "A novel hybrid database security management technique." International Journal of Science and Research Archive 11, no. 2 (2024): 1555–65. http://dx.doi.org/10.30574/ijsra.2024.11.2.0652.
Texto completoGalatenko, V. A., and K. A. Kostyukhin. "IoT Information Security: Fundamental Statements Review." Programmnaya Ingeneria 11, no. 5 (2020): 259–69. http://dx.doi.org/10.17587/prin.11.259-269.
Texto completoQi, Kun. "Security Application of 5G Technology in Industrial Internet." Journal of Electronic Research and Application 6, no. 1 (2022): 11–14. http://dx.doi.org/10.26689/jera.v6i1.3545.
Texto completoSong, Xinde. "Research on Security Protection Architecture of Energy Internet Information Communication." MATEC Web of Conferences 228 (2018): 02010. http://dx.doi.org/10.1051/matecconf/201822802010.
Texto completoBu, Bing, Lei Wang, Zhenyang Pi, and Weiguo Fang. "Stackelberg Model of Anti-terrorism Resource Allocation in Express Transportation Security Checks." E3S Web of Conferences 253 (2021): 02020. http://dx.doi.org/10.1051/e3sconf/202125302020.
Texto completoRapalus, Patrice. "Security measures for protecting confidential information on the internet and intranets." Employment Relations Today 24, no. 3 (1997): 49–58. http://dx.doi.org/10.1002/ert.3910240306.
Texto completoZhurylo, Oleh, and Oleksii Liashenko. "Architecture and iot security systems based on fog computing." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 1 (27) (July 2, 2024): 54–66. http://dx.doi.org/10.30837/itssi.2024.27.054.
Texto completoNakissa, Aria. "Security, Islam, and Indonesia." Bijdragen tot de taal-, land- en volkenkunde / Journal of the Humanities and Social Sciences of Southeast Asia 176, no. 2-3 (2020): 203–39. http://dx.doi.org/10.1163/22134379-bja10004.
Texto completoPYRKOSZ, Aleksandra, and Sabina SZYMONIAK. "Simplifying security processes in large organizations while maintaining an appropriate level of security." Inżynieria Bezpieczeństwa Obiektów Antropogenicznych, no. 2 (June 10, 2024): 1–8. http://dx.doi.org/10.37105/iboa.186.
Texto completoNordin, Siti Aminah, Zakiah Mohd Yusoff, Muhammad Hanif Faisal, and Khairul Kamarudin. "Securing high-value electronic equipment: an internet of things driven approach for camera security." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 3 (2024): 2763. http://dx.doi.org/10.11591/ijai.v13.i3.pp2763-2772.
Texto completoClark, M'Kaila J., and Lila Rajabion. "A Strategic Approach to IoT Security by Working Towards a Secure IoT Future." International Journal of Hyperconnectivity and the Internet of Things 7, no. 1 (2023): 1–18. http://dx.doi.org/10.4018/ijhiot.317088.
Texto completoAlisultanova, Iman A., Galina A. Ovseenko, and Bella Kh Visaitova. "ANALYSIS OF NETWORK INFORMATION SECURITY STRATEGIES IN HIGHER EDUCATION INSTITUTIONS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 5/5, no. 146 (2024): 30–35. http://dx.doi.org/10.36871/ek.up.p.r.2024.05.05.005.
Texto completoNur A'fyfah Zaimy, Mohamad Fadli Zolkipli, and Norliza Katuk. "A review of hacking techniques in IoT systems and future trends of hacking on IoT environment." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 723–31. http://dx.doi.org/10.30574/wjarr.2023.17.2.0310.
Texto completoZHU, Yayun, Lin JIANG, Anqi YUAN, and Yinghao YUAN. "Security Protection Method of Energy Internet with Android." Wuhan University Journal of Natural Sciences 27, no. 1 (2022): 11–16. http://dx.doi.org/10.1051/wujns/2022271011.
Texto completoM. Radhi, Batool, and Mohammed A. Hussain. "Smart Building Security using ESP32 based AES One Bio-key and Owner's Biometrics Encryption Technology." 49 49.2, no. 2 (2023): 30–46. http://dx.doi.org/10.56714/bjrs.49.2.4.
Texto completoSrhir, Ahmed, Tomader Mazri, and Mohammed Benbrahim. "Towards secure smart campus: security requirements, attacks and counter measures." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 2 (2023): 900. http://dx.doi.org/10.11591/ijeecs.v32.i2.pp900-914.
Texto completoKwon, Hyukjin, Youngjoo Shin, Jaeyeong Jeong, Kookjin Kim, and Dongkyoo Shin. "Measures to Ensure the Sustainability of Information Systems in the COVID-19 Environment." Sustainability 15, no. 1 (2022): 35. http://dx.doi.org/10.3390/su15010035.
Texto completoThomas, Asha. "Analysis on Cyber Crimes and Preventive Measures." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 3738–44. http://dx.doi.org/10.22214/ijraset.2023.52481.
Texto completoShen, Yang. "Research on Internet Information Security in the Big Data Era." E3S Web of Conferences 218 (2020): 04008. http://dx.doi.org/10.1051/e3sconf/202021804008.
Texto completoTao, Centong. "Internet Financial Information Security Risk and Prevention in the Age of Artificial Intelligence." Frontiers in Business, Economics and Management 13, no. 3 (2024): 341–44. http://dx.doi.org/10.54097/40w79j67.
Texto completoTaji, Khaoula, Badr Elkhalyly, Yassine Taleb Ahmad, Ilyas Ghanimi, and Fadoua Ghanimi. "Securing Smart Agriculture: Proposed Hybrid Meta-Model and Certificate-based Cyber Security Approaches." Data and Metadata 2 (December 30, 2023): 155. http://dx.doi.org/10.56294/dm2023155.
Texto completoSun, Yuxuan. "Computer network information security and protection strategies in the era of big data." Applied and Computational Engineering 4, no. 1 (2023): 574–80. http://dx.doi.org/10.54254/2755-2721/4/2023326.
Texto completo