Articoli di riviste sul tema "Internet – security measures. sears"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Internet – security measures. sears".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
McCathie, Andy. "Internet security fears prompt IT security measures". Network Security 2000, n. 5 (maggio 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Testo completoZhou, Zhong Wei, e Lei Shi. "Security Research and Measures for the Internet of Things". Advanced Materials Research 748 (agosto 2013): 910–14. http://dx.doi.org/10.4028/www.scientific.net/amr.748.910.
Testo completoChen, Jing. "Analysis on Network Security and Corresponding Preventive Measures". Applied Mechanics and Materials 241-244 (dicembre 2012): 2312–15. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2312.
Testo completoNiu, Minghao, e Hong Dai. "Internet of Things Information Security and Preventive Measures". Academic Journal of Science and Technology 4, n. 2 (4 gennaio 2023): 93–96. http://dx.doi.org/10.54097/ajst.v4i2.3977.
Testo completoGupta, Sanjay Kumar, e Sandeep Vanjale. "Cyber Security Measures for Internet of Things Devices". International Journal of Engineering Research and Technology 13, n. 8 (31 agosto 2020): 1830. http://dx.doi.org/10.37624/ijert/13.8.2020.1830-1839.
Testo completoWang, Hongqiao. "On Computer Communication Network Security Maintenance Measures". Studies in Social Science Research 4, n. 3 (24 luglio 2023): p134. http://dx.doi.org/10.22158/sssr.v4n3p134.
Testo completoSang, Yun Chang, e Xin Gao. "Security Issues and Protective Measures of the Internet of Things Architecture". Advanced Materials Research 765-767 (settembre 2013): 1007–10. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1007.
Testo completoМинаев, В. А., Б. А. Швырев e Т. Р. Ромашкин. "INTERNET OF THINGS SECURITY: KEY SOLUTIONS". ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, n. 2(-) (30 giugno 2023): 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.
Testo completoHe, Beige. "The Advance of Internet of Things Security Threats and Possible Measures". Highlights in Science, Engineering and Technology 68 (9 ottobre 2023): 202–11. http://dx.doi.org/10.54097/hset.v68i.12067.
Testo completoGomes, Leandre, Abhinav Deshmukh e Nilesh Anute. "Cyber Security and Internet Banking: Issues and Preventive Measures". Journal of Information Technology and Sciences 8, n. 2 (14 luglio 2022): 31–42. http://dx.doi.org/10.46610/joits.2022.v08i02.005.
Testo completoChen, Jing. "Analysis on Internet Attack and Security". Advanced Materials Research 605-607 (dicembre 2012): 2387–90. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.2387.
Testo completoImdad, Maria, Deden Witarsyah Jacob, Hairulnizam Mahdin, Zirawani Baharum, Shazlyn Milleana Shaharudin e Mohd Sanusi Azmi. "Internet of things: security requirements, attacks and counter measures". Indonesian Journal of Electrical Engineering and Computer Science 18, n. 3 (1 giugno 2020): 1520. http://dx.doi.org/10.11591/ijeecs.v18.i3.pp1520-1530.
Testo completoDu, Yu Lin. "Research on the Information Security of Internet Bank". Applied Mechanics and Materials 687-691 (novembre 2014): 1925–29. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1925.
Testo completoWang, Xiao Feng. "Research on Security Issues of the Internet of Things". Advanced Materials Research 989-994 (luglio 2014): 4261–64. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4261.
Testo completoWenceslaus Ritte, James. "Security Concerns in Internet of Things". International Journal for Research in Applied Science and Engineering Technology 9, n. VII (30 luglio 2021): 2898–901. http://dx.doi.org/10.22214/ijraset.2021.36977.
Testo completoKumar Yogi, Manas, Y. Himatej e M. Mahesh reddy. "IOT Security Challenges and Measures to Mitigate: Novel Perspectives". International Journal of Engineering & Technology 7, n. 2.7 (18 marzo 2018): 854. http://dx.doi.org/10.14419/ijet.v7i2.7.11081.
Testo completoRueda-Rueda, Johan Smith, e Jesus M. T. Portocarrero. "Framework-based security measures for Internet of Thing: A literature review". Open Computer Science 11, n. 1 (1 gennaio 2021): 346–54. http://dx.doi.org/10.1515/comp-2020-0220.
Testo completoSharma, Shruti, Rajkumar Saini, Sumit Saini e Tushar Sharma. "Network Security Essentials: Understanding Its Key Attacks and Potential Security Mechanism". Industrial Engineering Journal 52 (2023): 175–84. http://dx.doi.org/10.36893/iej.2023.v52.174-184.
Testo completoZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures". Applied Mechanics and Materials 433-435 (ottobre 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Testo completoBashir et. al., Adil. "Internet of Things Security Issues, Threats, Attacks and Counter Measures". International Journal of Computing and Digital Systemss 7, n. 2 (1 marzo 2018): 111–20. http://dx.doi.org/10.12785/ijcds/070206.
Testo completoBACÎŞ, Irina-Bristena. "Types of Threats and Appropriate Countermeasures for Internet Communications". International Journal of Information Security and Cybercrime 10, n. 1 (29 giugno 2021): 27–37. http://dx.doi.org/10.19107/ijisc.2021.01.03.
Testo completoCao, Xiyu. "The application of artificial intelligence in internet security". Applied and Computational Engineering 18, n. 1 (23 ottobre 2023): 230–35. http://dx.doi.org/10.54254/2755-2721/18/20230995.
Testo completoVASILE, Cristinel Marius. "Firewall Technologies". International Journal of Information Security and Cybercrime 7, n. 1 (29 giugno 2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Testo completoFakiha, Bandr. "Business Organization Security Strategies to Cyber Security Threats". International Journal of Safety and Security Engineering 11, n. 1 (28 febbraio 2021): 101–4. http://dx.doi.org/10.18280/ijsse.110111.
Testo completoWitczyńska, Katarzyna. "Network security - security methods in transnational corporations (TNC)". Logistics and Transport 45, n. 1 (2020): 55–58. http://dx.doi.org/10.26411/83-1734-2015-1-45-4-20.
Testo completoFaiz, Mohammad, e A.K. Daniel. "Threats and Challenges for Security Measures on the Internet of Things". Law, State and Telecommunications Review 14, n. 1 (20 maggio 2022): 71–97. http://dx.doi.org/10.26512/lstr.v14i1.38843.
Testo completoRode, Mrs K. N. "Network Security and Cyber Security: A Review". International Journal for Research in Applied Science and Engineering Technology 10, n. 6 (30 giugno 2022): 3404–7. http://dx.doi.org/10.22214/ijraset.2022.44501.
Testo completoAgarwal, Sanyam, Veer Daksh Agarwal, Vipin Mittal e Ishaan Agarwal. "Review of Effect of Internet of Things(IoT) in Cybercrime". International Journal for Research in Applied Science and Engineering Technology 11, n. 6 (30 giugno 2023): 4672–78. http://dx.doi.org/10.22214/ijraset.2023.54519.
Testo completoMargaret Dumebi Okpor, Kizito Eluemunor Anazia e Daniel Ukpenusiowho. "A novel hybrid database security management technique". International Journal of Science and Research Archive 11, n. 2 (30 aprile 2024): 1555–65. http://dx.doi.org/10.30574/ijsra.2024.11.2.0652.
Testo completoGalatenko, V. A., e K. A. Kostyukhin. "IoT Information Security: Fundamental Statements Review". Programmnaya Ingeneria 11, n. 5 (22 ottobre 2020): 259–69. http://dx.doi.org/10.17587/prin.11.259-269.
Testo completoQi, Kun. "Security Application of 5G Technology in Industrial Internet". Journal of Electronic Research and Application 6, n. 1 (18 gennaio 2022): 11–14. http://dx.doi.org/10.26689/jera.v6i1.3545.
Testo completoSong, Xinde. "Research on Security Protection Architecture of Energy Internet Information Communication". MATEC Web of Conferences 228 (2018): 02010. http://dx.doi.org/10.1051/matecconf/201822802010.
Testo completoBu, Bing, Lei Wang, Zhenyang Pi e Weiguo Fang. "Stackelberg Model of Anti-terrorism Resource Allocation in Express Transportation Security Checks". E3S Web of Conferences 253 (2021): 02020. http://dx.doi.org/10.1051/e3sconf/202125302020.
Testo completoRapalus, Patrice. "Security measures for protecting confidential information on the internet and intranets". Employment Relations Today 24, n. 3 (settembre 1997): 49–58. http://dx.doi.org/10.1002/ert.3910240306.
Testo completoZhurylo, Oleh, e Oleksii Liashenko. "Architecture and iot security systems based on fog computing". INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, n. 1 (27) (2 luglio 2024): 54–66. http://dx.doi.org/10.30837/itssi.2024.27.054.
Testo completoNakissa, Aria. "Security, Islam, and Indonesia". Bijdragen tot de taal-, land- en volkenkunde / Journal of the Humanities and Social Sciences of Southeast Asia 176, n. 2-3 (11 giugno 2020): 203–39. http://dx.doi.org/10.1163/22134379-bja10004.
Testo completoPYRKOSZ, Aleksandra, e Sabina SZYMONIAK. "Simplifying security processes in large organizations while maintaining an appropriate level of security". Inżynieria Bezpieczeństwa Obiektów Antropogenicznych, n. 2 (10 giugno 2024): 1–8. http://dx.doi.org/10.37105/iboa.186.
Testo completoNordin, Siti Aminah, Zakiah Mohd Yusoff, Muhammad Hanif Faisal e Khairul Kamarudin. "Securing high-value electronic equipment: an internet of things driven approach for camera security". IAES International Journal of Artificial Intelligence (IJ-AI) 13, n. 3 (1 settembre 2024): 2763. http://dx.doi.org/10.11591/ijai.v13.i3.pp2763-2772.
Testo completoClark, M'Kaila J., e Lila Rajabion. "A Strategic Approach to IoT Security by Working Towards a Secure IoT Future". International Journal of Hyperconnectivity and the Internet of Things 7, n. 1 (3 febbraio 2023): 1–18. http://dx.doi.org/10.4018/ijhiot.317088.
Testo completoAlisultanova, Iman A., Galina A. Ovseenko e Bella Kh Visaitova. "ANALYSIS OF NETWORK INFORMATION SECURITY STRATEGIES IN HIGHER EDUCATION INSTITUTIONS". EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 5/5, n. 146 (2024): 30–35. http://dx.doi.org/10.36871/ek.up.p.r.2024.05.05.005.
Testo completoNur A'fyfah Zaimy, Mohamad Fadli Zolkipli e Norliza Katuk. "A review of hacking techniques in IoT systems and future trends of hacking on IoT environment". World Journal of Advanced Research and Reviews 17, n. 2 (28 febbraio 2023): 723–31. http://dx.doi.org/10.30574/wjarr.2023.17.2.0310.
Testo completoZHU, Yayun, Lin JIANG, Anqi YUAN e Yinghao YUAN. "Security Protection Method of Energy Internet with Android". Wuhan University Journal of Natural Sciences 27, n. 1 (marzo 2022): 11–16. http://dx.doi.org/10.1051/wujns/2022271011.
Testo completoM. Radhi, Batool, e Mohammed A. Hussain. "Smart Building Security using ESP32 based AES One Bio-key and Owner's Biometrics Encryption Technology". 49 49.2, n. 2 (30 dicembre 2023): 30–46. http://dx.doi.org/10.56714/bjrs.49.2.4.
Testo completoSrhir, Ahmed, Tomader Mazri e Mohammed Benbrahim. "Towards secure smart campus: security requirements, attacks and counter measures". Indonesian Journal of Electrical Engineering and Computer Science 32, n. 2 (1 novembre 2023): 900. http://dx.doi.org/10.11591/ijeecs.v32.i2.pp900-914.
Testo completoKwon, Hyukjin, Youngjoo Shin, Jaeyeong Jeong, Kookjin Kim e Dongkyoo Shin. "Measures to Ensure the Sustainability of Information Systems in the COVID-19 Environment". Sustainability 15, n. 1 (20 dicembre 2022): 35. http://dx.doi.org/10.3390/su15010035.
Testo completoThomas, Asha. "Analysis on Cyber Crimes and Preventive Measures". International Journal for Research in Applied Science and Engineering Technology 11, n. 5 (31 maggio 2023): 3738–44. http://dx.doi.org/10.22214/ijraset.2023.52481.
Testo completoShen, Yang. "Research on Internet Information Security in the Big Data Era". E3S Web of Conferences 218 (2020): 04008. http://dx.doi.org/10.1051/e3sconf/202021804008.
Testo completoTao, Centong. "Internet Financial Information Security Risk and Prevention in the Age of Artificial Intelligence". Frontiers in Business, Economics and Management 13, n. 3 (6 marzo 2024): 341–44. http://dx.doi.org/10.54097/40w79j67.
Testo completoTaji, Khaoula, Badr Elkhalyly, Yassine Taleb Ahmad, Ilyas Ghanimi e Fadoua Ghanimi. "Securing Smart Agriculture: Proposed Hybrid Meta-Model and Certificate-based Cyber Security Approaches". Data and Metadata 2 (30 dicembre 2023): 155. http://dx.doi.org/10.56294/dm2023155.
Testo completoSun, Yuxuan. "Computer network information security and protection strategies in the era of big data". Applied and Computational Engineering 4, n. 1 (14 giugno 2023): 574–80. http://dx.doi.org/10.54254/2755-2721/4/2023326.
Testo completo