Articles de revues sur le sujet « Internet – security measures. sears »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Internet – security measures. sears ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.
McCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Texte intégralZhou, Zhong Wei, and Lei Shi. "Security Research and Measures for the Internet of Things." Advanced Materials Research 748 (August 2013): 910–14. http://dx.doi.org/10.4028/www.scientific.net/amr.748.910.
Texte intégralChen, Jing. "Analysis on Network Security and Corresponding Preventive Measures." Applied Mechanics and Materials 241-244 (December 2012): 2312–15. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2312.
Texte intégralNiu, Minghao, and Hong Dai. "Internet of Things Information Security and Preventive Measures." Academic Journal of Science and Technology 4, no. 2 (2023): 93–96. http://dx.doi.org/10.54097/ajst.v4i2.3977.
Texte intégralGupta, Sanjay Kumar, and Sandeep Vanjale. "Cyber Security Measures for Internet of Things Devices." International Journal of Engineering Research and Technology 13, no. 8 (2020): 1830. http://dx.doi.org/10.37624/ijert/13.8.2020.1830-1839.
Texte intégralWang, Hongqiao. "On Computer Communication Network Security Maintenance Measures." Studies in Social Science Research 4, no. 3 (2023): p134. http://dx.doi.org/10.22158/sssr.v4n3p134.
Texte intégralSang, Yun Chang, and Xin Gao. "Security Issues and Protective Measures of the Internet of Things Architecture." Advanced Materials Research 765-767 (September 2013): 1007–10. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1007.
Texte intégralМинаев, В. А., Б. А. Швырев, and Т. Р. Ромашкин. "INTERNET OF THINGS SECURITY: KEY SOLUTIONS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 2(-) (2023): 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.
Texte intégralHe, Beige. "The Advance of Internet of Things Security Threats and Possible Measures." Highlights in Science, Engineering and Technology 68 (October 9, 2023): 202–11. http://dx.doi.org/10.54097/hset.v68i.12067.
Texte intégralGomes, Leandre, Abhinav Deshmukh, and Nilesh Anute. "Cyber Security and Internet Banking: Issues and Preventive Measures." Journal of Information Technology and Sciences 8, no. 2 (2022): 31–42. http://dx.doi.org/10.46610/joits.2022.v08i02.005.
Texte intégralChen, Jing. "Analysis on Internet Attack and Security." Advanced Materials Research 605-607 (December 2012): 2387–90. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.2387.
Texte intégralImdad, Maria, Deden Witarsyah Jacob, Hairulnizam Mahdin, Zirawani Baharum, Shazlyn Milleana Shaharudin, and Mohd Sanusi Azmi. "Internet of things: security requirements, attacks and counter measures." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 3 (2020): 1520. http://dx.doi.org/10.11591/ijeecs.v18.i3.pp1520-1530.
Texte intégralDu, Yu Lin. "Research on the Information Security of Internet Bank." Applied Mechanics and Materials 687-691 (November 2014): 1925–29. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1925.
Texte intégralWang, Xiao Feng. "Research on Security Issues of the Internet of Things." Advanced Materials Research 989-994 (July 2014): 4261–64. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4261.
Texte intégralWenceslaus Ritte, James. "Security Concerns in Internet of Things." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 2898–901. http://dx.doi.org/10.22214/ijraset.2021.36977.
Texte intégralKumar Yogi, Manas, Y. Himatej, and M. Mahesh reddy. "IOT Security Challenges and Measures to Mitigate: Novel Perspectives." International Journal of Engineering & Technology 7, no. 2.7 (2018): 854. http://dx.doi.org/10.14419/ijet.v7i2.7.11081.
Texte intégralRueda-Rueda, Johan Smith, and Jesus M. T. Portocarrero. "Framework-based security measures for Internet of Thing: A literature review." Open Computer Science 11, no. 1 (2021): 346–54. http://dx.doi.org/10.1515/comp-2020-0220.
Texte intégralSharma, Shruti, Rajkumar Saini, Sumit Saini, and Tushar Sharma. "Network Security Essentials: Understanding Its Key Attacks and Potential Security Mechanism." Industrial Engineering Journal 52 (2023): 175–84. http://dx.doi.org/10.36893/iej.2023.v52.174-184.
Texte intégralZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Texte intégralBashir et. al., Adil. "Internet of Things Security Issues, Threats, Attacks and Counter Measures." International Journal of Computing and Digital Systemss 7, no. 2 (2018): 111–20. http://dx.doi.org/10.12785/ijcds/070206.
Texte intégralBACÎŞ, Irina-Bristena. "Types of Threats and Appropriate Countermeasures for Internet Communications." International Journal of Information Security and Cybercrime 10, no. 1 (2021): 27–37. http://dx.doi.org/10.19107/ijisc.2021.01.03.
Texte intégralCao, Xiyu. "The application of artificial intelligence in internet security." Applied and Computational Engineering 18, no. 1 (2023): 230–35. http://dx.doi.org/10.54254/2755-2721/18/20230995.
Texte intégralVASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Texte intégralFakiha, Bandr. "Business Organization Security Strategies to Cyber Security Threats." International Journal of Safety and Security Engineering 11, no. 1 (2021): 101–4. http://dx.doi.org/10.18280/ijsse.110111.
Texte intégralWitczyńska, Katarzyna. "Network security - security methods in transnational corporations (TNC)." Logistics and Transport 45, no. 1 (2020): 55–58. http://dx.doi.org/10.26411/83-1734-2015-1-45-4-20.
Texte intégralFaiz, Mohammad, and A.K. Daniel. "Threats and Challenges for Security Measures on the Internet of Things." Law, State and Telecommunications Review 14, no. 1 (2022): 71–97. http://dx.doi.org/10.26512/lstr.v14i1.38843.
Texte intégralRode, Mrs K. N. "Network Security and Cyber Security: A Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 3404–7. http://dx.doi.org/10.22214/ijraset.2022.44501.
Texte intégralAgarwal, Sanyam, Veer Daksh Agarwal, Vipin Mittal, and Ishaan Agarwal. "Review of Effect of Internet of Things(IoT) in Cybercrime." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 4672–78. http://dx.doi.org/10.22214/ijraset.2023.54519.
Texte intégralMargaret Dumebi Okpor, Kizito Eluemunor Anazia, and Daniel Ukpenusiowho. "A novel hybrid database security management technique." International Journal of Science and Research Archive 11, no. 2 (2024): 1555–65. http://dx.doi.org/10.30574/ijsra.2024.11.2.0652.
Texte intégralGalatenko, V. A., and K. A. Kostyukhin. "IoT Information Security: Fundamental Statements Review." Programmnaya Ingeneria 11, no. 5 (2020): 259–69. http://dx.doi.org/10.17587/prin.11.259-269.
Texte intégralQi, Kun. "Security Application of 5G Technology in Industrial Internet." Journal of Electronic Research and Application 6, no. 1 (2022): 11–14. http://dx.doi.org/10.26689/jera.v6i1.3545.
Texte intégralSong, Xinde. "Research on Security Protection Architecture of Energy Internet Information Communication." MATEC Web of Conferences 228 (2018): 02010. http://dx.doi.org/10.1051/matecconf/201822802010.
Texte intégralBu, Bing, Lei Wang, Zhenyang Pi, and Weiguo Fang. "Stackelberg Model of Anti-terrorism Resource Allocation in Express Transportation Security Checks." E3S Web of Conferences 253 (2021): 02020. http://dx.doi.org/10.1051/e3sconf/202125302020.
Texte intégralRapalus, Patrice. "Security measures for protecting confidential information on the internet and intranets." Employment Relations Today 24, no. 3 (1997): 49–58. http://dx.doi.org/10.1002/ert.3910240306.
Texte intégralZhurylo, Oleh, and Oleksii Liashenko. "Architecture and iot security systems based on fog computing." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 1 (27) (July 2, 2024): 54–66. http://dx.doi.org/10.30837/itssi.2024.27.054.
Texte intégralNakissa, Aria. "Security, Islam, and Indonesia." Bijdragen tot de taal-, land- en volkenkunde / Journal of the Humanities and Social Sciences of Southeast Asia 176, no. 2-3 (2020): 203–39. http://dx.doi.org/10.1163/22134379-bja10004.
Texte intégralPYRKOSZ, Aleksandra, and Sabina SZYMONIAK. "Simplifying security processes in large organizations while maintaining an appropriate level of security." Inżynieria Bezpieczeństwa Obiektów Antropogenicznych, no. 2 (June 10, 2024): 1–8. http://dx.doi.org/10.37105/iboa.186.
Texte intégralNordin, Siti Aminah, Zakiah Mohd Yusoff, Muhammad Hanif Faisal, and Khairul Kamarudin. "Securing high-value electronic equipment: an internet of things driven approach for camera security." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 3 (2024): 2763. http://dx.doi.org/10.11591/ijai.v13.i3.pp2763-2772.
Texte intégralClark, M'Kaila J., and Lila Rajabion. "A Strategic Approach to IoT Security by Working Towards a Secure IoT Future." International Journal of Hyperconnectivity and the Internet of Things 7, no. 1 (2023): 1–18. http://dx.doi.org/10.4018/ijhiot.317088.
Texte intégralAlisultanova, Iman A., Galina A. Ovseenko, and Bella Kh Visaitova. "ANALYSIS OF NETWORK INFORMATION SECURITY STRATEGIES IN HIGHER EDUCATION INSTITUTIONS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 5/5, no. 146 (2024): 30–35. http://dx.doi.org/10.36871/ek.up.p.r.2024.05.05.005.
Texte intégralNur A'fyfah Zaimy, Mohamad Fadli Zolkipli, and Norliza Katuk. "A review of hacking techniques in IoT systems and future trends of hacking on IoT environment." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 723–31. http://dx.doi.org/10.30574/wjarr.2023.17.2.0310.
Texte intégralZHU, Yayun, Lin JIANG, Anqi YUAN, and Yinghao YUAN. "Security Protection Method of Energy Internet with Android." Wuhan University Journal of Natural Sciences 27, no. 1 (2022): 11–16. http://dx.doi.org/10.1051/wujns/2022271011.
Texte intégralM. Radhi, Batool, and Mohammed A. Hussain. "Smart Building Security using ESP32 based AES One Bio-key and Owner's Biometrics Encryption Technology." 49 49.2, no. 2 (2023): 30–46. http://dx.doi.org/10.56714/bjrs.49.2.4.
Texte intégralSrhir, Ahmed, Tomader Mazri, and Mohammed Benbrahim. "Towards secure smart campus: security requirements, attacks and counter measures." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 2 (2023): 900. http://dx.doi.org/10.11591/ijeecs.v32.i2.pp900-914.
Texte intégralKwon, Hyukjin, Youngjoo Shin, Jaeyeong Jeong, Kookjin Kim, and Dongkyoo Shin. "Measures to Ensure the Sustainability of Information Systems in the COVID-19 Environment." Sustainability 15, no. 1 (2022): 35. http://dx.doi.org/10.3390/su15010035.
Texte intégralThomas, Asha. "Analysis on Cyber Crimes and Preventive Measures." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 3738–44. http://dx.doi.org/10.22214/ijraset.2023.52481.
Texte intégralShen, Yang. "Research on Internet Information Security in the Big Data Era." E3S Web of Conferences 218 (2020): 04008. http://dx.doi.org/10.1051/e3sconf/202021804008.
Texte intégralTao, Centong. "Internet Financial Information Security Risk and Prevention in the Age of Artificial Intelligence." Frontiers in Business, Economics and Management 13, no. 3 (2024): 341–44. http://dx.doi.org/10.54097/40w79j67.
Texte intégralTaji, Khaoula, Badr Elkhalyly, Yassine Taleb Ahmad, Ilyas Ghanimi, and Fadoua Ghanimi. "Securing Smart Agriculture: Proposed Hybrid Meta-Model and Certificate-based Cyber Security Approaches." Data and Metadata 2 (December 30, 2023): 155. http://dx.doi.org/10.56294/dm2023155.
Texte intégralSun, Yuxuan. "Computer network information security and protection strategies in the era of big data." Applied and Computational Engineering 4, no. 1 (2023): 574–80. http://dx.doi.org/10.54254/2755-2721/4/2023326.
Texte intégral