Artykuły w czasopismach na temat „Information security practice tests”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Information security practice tests”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Li, Chengcheng. "Penetration Testing Curriculum Development in Practice". Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.
Pełny tekst źródłaSamios, Michael, Christos P. Evangelidis i Emmanouil Serrelis. "Assessment of Information Security Vulnerabilities in Common Seismological Equipment". Seismological Research Letters 92, nr 2A (10.02.2021): 933–40. http://dx.doi.org/10.1785/0220200151.
Pełny tekst źródłaRohn, Eli, Gilad Sabari i Guy Leshem. "Explaining small business InfoSec posture using social theories". Information & Computer Security 24, nr 5 (14.11.2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.
Pełny tekst źródłaIkhalia, Ehinome, Alan Serrano, David Bell i Panos Louvieris. "Online social network security awareness: mass interpersonal persuasion using a Facebook app". Information Technology & People 32, nr 5 (7.10.2019): 1276–300. http://dx.doi.org/10.1108/itp-06-2018-0278.
Pełny tekst źródłaYang, Wei, i Anni Jia. "Side-Channel Leakage Detection with One-Way Analysis of Variance". Security and Communication Networks 2021 (5.03.2021): 1–13. http://dx.doi.org/10.1155/2021/6614702.
Pełny tekst źródłaKubiak, Ireneusz, i Artur Przybysz. "Fourier and Chirp-Z Transforms in the Estimation Values Process of Horizontal and Vertical Synchronization Frequencies of Graphic Displays". Applied Sciences 12, nr 10 (23.05.2022): 5281. http://dx.doi.org/10.3390/app12105281.
Pełny tekst źródłaRicciardi, Carlo, Adelmo Gubitosi, Donatella Vecchione, Giuseppe Cesarelli, Francesco De Nola, Roberto Ruggiero, Ludovico Docimo i Giovanni Improta. "Comparing Two Approaches for Thyroidectomy: A Health Technology Assessment through DMAIC Cycle". Healthcare 10, nr 1 (8.01.2022): 124. http://dx.doi.org/10.3390/healthcare10010124.
Pełny tekst źródłaMundt, Christopher C. "Pyramiding for Resistance Durability: Theory and Practice". Phytopathology® 108, nr 7 (lipiec 2018): 792–802. http://dx.doi.org/10.1094/phyto-12-17-0426-rvw.
Pełny tekst źródłaAkashi, Nozomi, Kohei Nakajima, Mitsuru Shibayama i Yasuo Kuniyoshi. "A mechanical true random number generator". New Journal of Physics 24, nr 1 (1.01.2022): 013019. http://dx.doi.org/10.1088/1367-2630/ac45ca.
Pełny tekst źródłaMeira, Jessica Vieira de Souza, Murat Hancer, Sara Joana Gadotti dos Anjos i Anita Eves. "Human resources practices and employee motivation in the hospitality industry: A cross-cultural research". Tourism and hospitality management 29, nr 2 (2023): 157–67. http://dx.doi.org/10.20867/thm.29.2.1.
Pełny tekst źródłaNagaraj, Kalyan, Biplab Bhattacharjee, Amulyashree Sridhar i Sharvani GS. "Detection of phishing websites using a novel twofold ensemble model". Journal of Systems and Information Technology 20, nr 3 (13.08.2018): 321–57. http://dx.doi.org/10.1108/jsit-09-2017-0074.
Pełny tekst źródłaFiačan, Jakub, Jozef Jenis, Damián Čechmánek, Slavomír Hrček i Pavol Michal. "Structural Design and Safety Verification of a Service Hatch Used at Airports by FEM Analysis". Infrastructures 8, nr 4 (6.04.2023): 73. http://dx.doi.org/10.3390/infrastructures8040073.
Pełny tekst źródłaLIN, ANNIE W., FRANK A. GRANATA, ABIGAIL K. TRIPPEL, LESLIE TELLO, TAMMY K. STUMP, MANDY WONG, MERCEDES R. CARNETHON, KIARRI N. KERSHAW, JENNIFER MAKELARSKI i DANIEL WELLER. "Food Handling Concerns and Practices at Home during the COVID-19 Pandemic by Food Security Status". Journal of Food Protection 85, nr 3 (9.12.2021): 518–26. http://dx.doi.org/10.4315/jfp-21-216.
Pełny tekst źródłaAbeer Salim Jamil, Raghad Abdulaali Azeez i Nidaa Flaih Hassan. "An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments". International Journal of Online and Biomedical Engineering (iJOE) 19, nr 01 (17.01.2023): 93–106. http://dx.doi.org/10.3991/ijoe.v19i01.36901.
Pełny tekst źródłaBaizat, Faisal, Zainab Rahma i Sumaia Abusaid. "The Dark Side of IT: The Negative Aspects of Information Technology". International Journal of Technology and Systems 7, nr 2 (22.11.2022): 95–115. http://dx.doi.org/10.47604/ijts.1709.
Pełny tekst źródłaSosa-Martínez, María de Jesús, Isaac Jair León-Lozano, Yuliana García-Jiménez, Brenda Garduño-Orbe, Alfredo Josimar Lagarza-Moreno i Guillermina Juanico-Morales. "Frequency of Dyslipidemias and Cardiovascular Risk Determination in Patients with Systemic Arterial Hypertension". Atención Familiar 24, nr 4 (29.09.2023): 239–44. http://dx.doi.org/10.22201/fm.14058871p.2023.486535.
Pełny tekst źródłaG, Anahita, Krishnapriya KPM, Shiva Prasad R i Mohan Kumar N. "HD-Sign: Hardware Based Digital Signature Generation Using True Random Number Generator". International Journal of Engineering & Technology 7, nr 3.8 (7.07.2018): 147. http://dx.doi.org/10.14419/ijet.v7i3.8.16850.
Pełny tekst źródłaMaksymenko, M. I. "CURRENT ISSUES OF VIOLENT CRIMES IN PENAL INSTITUTIONS PREVENTION". Scientific Herald of Sivershchyna. Series: Law 2022, nr 1 (31.03.2022): 94–102. http://dx.doi.org/10.32755/sjlaw.2022.01.094.
Pełny tekst źródłaGokul G L, Lakshmi T i Don K R. "Biocompatibility of Dental Materials - A Review". International Journal of Research in Pharmaceutical Sciences 11, SPL3 (21.10.2020): 1634–37. http://dx.doi.org/10.26452/ijrps.v11ispl3.3487.
Pełny tekst źródłaCho, Dong-Hyun, Si-Hyun Kim i Je-Ho Hwang. "Container Terminal-Inland Transportation Linkage Platform Model Factor Analysis". Korea International Trade Research Institute 19, nr 3 (30.06.2023): 131–44. http://dx.doi.org/10.16980/jitc.19.3.202306.131.
Pełny tekst źródłaAgudina, V. A. "SPECIFIC USE OF SCREENING IMMUNOCHROMATOGRAPHIC TESTS FOR THE PRIMARY DETECTION OF FACTS OF PSYCHOACTIVE SUBSTANCE USE IN URINE AND SALIVA". Marine Medicine 5, nr 2 (1.07.2019): 83–94. http://dx.doi.org/10.22328/2413-5747-2019-5-2-83-94.
Pełny tekst źródłaKosari, Sam, Kwang Choon Yee, Stephanie Mulhall, Jackson Thomas, Shane L. Jackson, Gregory M. Peterson, Ayla Rudgley, Iain Walker i Mark Naunton. "Pharmacists’ Perspectives on the Use of My Health Record". Pharmacy 8, nr 4 (14.10.2020): 190. http://dx.doi.org/10.3390/pharmacy8040190.
Pełny tekst źródłaYurev, Artemiy Sergeevich. "Fuzzing of Polymorphic Systems within Microsevice Structures". Proceedings of the Institute for System Programming of the RAS 36, nr 1 (2024): 45–60. http://dx.doi.org/10.15514/ispras-2024-36(1)-4.
Pełny tekst źródłaHulea, Mihai, Radu Miron i Vlad Muresan. "Digital Product Passport Implementation Based on Multi-Blockchain Approach with Decentralized Identifier Provider". Applied Sciences 14, nr 11 (4.06.2024): 4874. http://dx.doi.org/10.3390/app14114874.
Pełny tekst źródłaKot, Edyta. "Development of a technologically advanced IT system enabling automated processing of information collected in forensic biometric databases in order to combat crime or identify people". Issues of Forensic Science 308 (2020): 69–74. http://dx.doi.org/10.34836/pk.2020.308.5.
Pełny tekst źródłaAleksandrowicz, Tomasz. "Forecasting Threats to State Security in Theory and in Practice. Toolbox for the Analyst". Internal Security 15, nr 1 (26.10.2023): 7–21. http://dx.doi.org/10.5604/01.3001.0053.9579.
Pełny tekst źródłaRosas, Lisa G., Catherine Nasrallah, Van Ta Park, Jan J. Vasquez, Ysabel Duron, Owen Garrick, Riccesha Hattin i in. "Perspectives on Precision Health Among Racial/Ethnic Minority Communities and the Physicians That Serve Them". Ethnicity & Disease 30, Suppl 1 (2.04.2020): 137–48. http://dx.doi.org/10.18865/ed.30.s1.137.
Pełny tekst źródłaGrachev, Ya L., i V. G. Sidorenko. "Steganalysis of the methods of concealing information in graphic containers". Dependability 21, nr 3 (21.09.2021): 39–46. http://dx.doi.org/10.21683/1729-2646-2021-21-3-39-46.
Pełny tekst źródłaPodoynitsyn, V. M., A. O. Yafonkin, O. V. Manzhai i O. M. Verlamov. "Legal basis of defense standardization of the European Union". Analytical and Comparative Jurisprudence, nr 2 (11.05.2024): 766–72. http://dx.doi.org/10.24144/2788-6018.2024.02.126.
Pełny tekst źródłaZhao, Wenbo, i Caochuan Ma. "Modification of Intertwining Logistic Map and a Novel Pseudo Random Number Generator". Symmetry 16, nr 2 (31.01.2024): 169. http://dx.doi.org/10.3390/sym16020169.
Pełny tekst źródłaSawka, Maciej, i Marcin Niemiec. "A Sponge-Based Key Expansion Scheme for Modern Block Ciphers". Energies 15, nr 19 (20.09.2022): 6864. http://dx.doi.org/10.3390/en15196864.
Pełny tekst źródłaLiu, Chaojie, Timothy Bartram i Sandra G. Leggat. "Link of Patient Care Outcome to Occupational Differences in Response to Human Resource Management: A Cross-Sectional Comparative Study on Hospital Doctors and Nurses in China". International Journal of Environmental Research and Public Health 17, nr 12 (18.06.2020): 4379. http://dx.doi.org/10.3390/ijerph17124379.
Pełny tekst źródłaHaggenmüller, Sarah, Eva Krieghoff-Henning, Tanja Jutzi, Nicole Trapp, Lennard Kiehl, Jochen Sven Utikal, Sascha Fabian i Titus Josef Brinker. "Digital Natives’ Preferences on Mobile Artificial Intelligence Apps for Skin Cancer Diagnostics: Survey Study". JMIR mHealth and uHealth 9, nr 8 (27.08.2021): e22909. http://dx.doi.org/10.2196/22909.
Pełny tekst źródłaGizaw, Abraham Tamirat, Pradeep Sopory i Morankar Sudhakar. "Determinants of knowledge, attitude and self-efficacy towards complementary feeding among rural mothers: Baseline data of a cluster-randomized control trial in South West Ethiopia". PLOS ONE 18, nr 11 (28.11.2023): e0293267. http://dx.doi.org/10.1371/journal.pone.0293267.
Pełny tekst źródłaObura, M., G. Oballim, J. O. Ochuodho, F. N. W. Maina i V. E. Anjichi. "Seed Management and Quality of Farmer Saved Seeds of Bambara groundnut from North Western, Northern and Eastern Uganda". Ghana Journal of Agricultural Science 56, nr 1 (30.06.2021): 1–15. http://dx.doi.org/10.4314/gjas.v56i1.1.
Pełny tekst źródłaKhare, Ms Prachi. "CARRER PATH". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 05 (31.05.2024): 1–5. http://dx.doi.org/10.55041/ijsrem35160.
Pełny tekst źródłaRavenda, Diego, Maika Melina Valencia-Silva, Josep Maria Argiles-Bosch i Josep García-Blandón. "Measuring labour tax avoidance and undeclared work: evidence from tax-avoidant offending firms". Journal of Applied Accounting Research 21, nr 3 (6.06.2020): 477–96. http://dx.doi.org/10.1108/jaar-01-2019-0016.
Pełny tekst źródłaLi, Jianzhong, Qiang Wan, Wenjuan Ma, Xiaoting Fang, Chuyi Yin i Jun Cui. "Analysis DevOps efficiency and digital transformation of digital economy, cross-border e-commerce, and brand building:". Transactions on Computer Science and Intelligent Systems Research 4 (20.06.2024): 38–47. http://dx.doi.org/10.62051/gc7xf329.
Pełny tekst źródłaZhang, Li-li, Qi Zhao, Li Wang i Ling-yu Zhang. "Research on Urban Traffic Signal Control Systems Based on Cyber Physical Systems". Journal of Advanced Transportation 2020 (20.10.2020): 1–16. http://dx.doi.org/10.1155/2020/8894812.
Pełny tekst źródłaOlawuyi, Seyi, i Abbyssinia Mushunje. "Social Capital and Adoption of Alternative Conservation Agricultural Practices in South-Western Nigeria". Sustainability 11, nr 3 (30.01.2019): 716. http://dx.doi.org/10.3390/su11030716.
Pełny tekst źródłaLegeais, Dominique. "Integrated purchasing and banking data protection in the context of Directive (EU) 2015/2366: new payment service providers". Law, State and Telecommunications Review 11, nr 1 (20.05.2019): 173–98. http://dx.doi.org/10.26512/lstr.v11i1.24856.
Pełny tekst źródłaPatel, Ashish, Richa .. i Aditi Sharma. "Maize Plant Leaf Disease Classification Using Supervised Machine Learning Algorithms". Fusion: Practice and Applications 13, nr 2 (2023): 08–21. http://dx.doi.org/10.54216/fpa.130201.
Pełny tekst źródłaLim, Joo S., Sean B. Maynard, Atif Ahmad i Shanton Chang. "Information Security Culture". International Journal of Cyber Warfare and Terrorism 5, nr 2 (kwiecień 2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.
Pełny tekst źródłaBarrett, Lisa Feldman, Ralph Adolphs, Stacy Marsella, Aleix M. Martinez i Seth D. Pollak. "Emotional Expressions Reconsidered: Challenges to Inferring Emotion From Human Facial Movements". Psychological Science in the Public Interest 20, nr 1 (lipiec 2019): 1–68. http://dx.doi.org/10.1177/1529100619832930.
Pełny tekst źródłaPleshakov, Vitaly Vladimirovich, i Denis Yurievich Grigoriev. "Approaches to document quality assessment on standardization". Technology of technosphere safety, nr 101 (2023): 138–48. http://dx.doi.org/10.25257/tts.2023.3.101.138-148.
Pełny tekst źródłaBoychenko, O. V., i D. V. Ivanyuta. "INFORMATION SECURITY MODELS". Construction economic and environmental management 80, nr 3 (2022): 33–39. http://dx.doi.org/10.37279/2519-4453-2021-3-33-39.
Pełny tekst źródłaBonci, Eduard-Alexandru, Orit Kaidar-Person, Marilia Antunes, Oriana Ciani, Helena Cruz, Rosa Di Micco, Oreste Davide Gentilini i in. "CINDERELLA clinical trial: Using artificial intelligence–driven healthcare to enhance breast cancer locoregional treatment decisions." Journal of Clinical Oncology 42, nr 16_suppl (1.06.2024): TPS621. http://dx.doi.org/10.1200/jco.2024.42.16_suppl.tps621.
Pełny tekst źródłaAlbarrak, Abdullah M. "Determining a Trustworthy Application for Medical Data Visualizations through a Knowledge-Based Fuzzy Expert System". Diagnostics 13, nr 11 (30.05.2023): 1916. http://dx.doi.org/10.3390/diagnostics13111916.
Pełny tekst źródłaZwiefka, Antoni, Andrzej Wyrzykowski i Krzysztof Waszkiewicz. "Integration of processes related to the implementation of the mediGOAT platform in diabetic patient care." International Journal of Integrated Care 23, S1 (28.12.2023): 319. http://dx.doi.org/10.5334/ijic.icic23453.
Pełny tekst źródłaAgyei-Mensah, Ben Kwame. "Does the corruption perception level of a country affect listed firms’ IFRS 7 risk disclosure compliance?" Corporate Governance: The International Journal of Business in Society 17, nr 4 (7.08.2017): 727–47. http://dx.doi.org/10.1108/cg-10-2016-0195.
Pełny tekst źródła