Добірка наукової літератури з теми "Computer networks Security measures Australia"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Computer networks Security measures Australia".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Computer networks Security measures Australia"
Asre, Shashank, and Adnan Anwar. "Synthetic Energy Data Generation Using Time Variant Generative Adversarial Network." Electronics 11, no. 3 (January 24, 2022): 355. http://dx.doi.org/10.3390/electronics11030355.
Повний текст джерелаSlay, J., and B. Turnbull. "Computer Security Education and Research in Australia." IEEE Security & Privacy Magazine 4, no. 5 (September 2006): 60–63. http://dx.doi.org/10.1109/msp.2006.115.
Повний текст джерелаLittlewood, Bev, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid, and Dieter Gollmann. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (April 1, 1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Повний текст джерелаKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Повний текст джерелаZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Повний текст джерелаCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (March 1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Повний текст джерелаGuo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.
Повний текст джерелаKuprashvili, Henri. "Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)." Works of Georgian Technical University, no. 2(524) (June 6, 2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.
Повний текст джерелаSmith, Martin. "Part 2 Personnel security measures within a computer installation." Computer Law & Security Review 6, no. 2 (July 1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.
Повний текст джерелаMo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.
Повний текст джерелаДисертації з теми "Computer networks Security measures Australia"
Hicks, Michael. "Organisational barriers and their relationship to the effective use of information system audit trails." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2006. https://ro.ecu.edu.au/theses/335.
Повний текст джерелаSato, Keiko. "Privacy on the internet : Investigation into corporate privacy policy of Australian large private sector organisations on the internet." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1032.
Повний текст джерелаValli, Craig. "Non-business use of the World Wide Web : A study of selected Western Australian organisations." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1311.
Повний текст джерелаBailey, Carmen F. "Analysis of security solutions in large enterprises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.
Повний текст джерелаLU, WEN-PAI. "SECURITY OF COMMUNICATION IN COMPUTER NETWORKS (KEY MANAGEMENT, VERIFICATION)." Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/183922.
Повний текст джерелаDong, Ying, and 董穎. "Providing security services for mobile ad hoc networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B3955711X.
Повний текст джерелаDavis, Carlton R. "Security protocols for mobile ad hoc networks." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=102970.
Повний текст джерелаOne of the challenging security problems is the issue of certificate revocation in MANETs where there are no on-line access to trusted authorities. In wired network environments, when certificates are to be revoked, certificate authorities (CAs) add the information regarding the certificates in question to certificate revocation lists (CRLs) and post the CRLs on accessible repositories or distribute them to relevant entities. In purely ad hoc networks, there are typically no access to centralized repositories or trusted authorities; therefore the conventional method of certificate revocation is not applicable.
Another challenging MANET security problem is the issue of secure routing in the presence of selfish or adversarial entities which selectively drop packets they agreed to forward; and in so doing these selfish or adversarial entities can disrupt the network traffic and cause various communication problems.
In this thesis, we present two security protocols we developed for addressing the above-mentioned MANET security needs. The first protocol is a decentralized certificate revocation scheme which allows the nodes within a MANET to have full control over the process of certificate revocation. The scheme is fully contained and it does not rely on any input from centralized or external entities such as trusted CAs. The second protocol is a secure MANET routing scheme we named Robust Source Routing (RSR). In addition to providing data origin authentication services and integrity checks, RSR is able to mitigate against intelligent, colluding malicious agents which selectively drop or modify packets they are required to forward.
Kalutarage, H. K. "Effective monitoring of slow suspicious activites on computer networks." Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1.
Повний текст джерелаTyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Повний текст джерелаRen, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.
Повний текст джерелаКниги з теми "Computer networks Security measures Australia"
Cobb, Adam. Australia's vulnerability to information attack: Towards a national information policy. Canberra, Australia: Strategic and Defence Studies Centre, Australian National University, 1997.
Знайти повний текст джерелаLiqun, Chen, Mu Yi 1955-, and Susilo Willy, eds. Information security practice and experience: 4th international conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008 : proceedings. Berlin: Springer, 2008.
Знайти повний текст джерелаOfficers, Western Australia Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police. Western Australia Police Service: Information management and security. Perth]: Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers, 2003.
Знайти повний текст джерелаWestern Australia. Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers. Western Australia Police Service: Corruption prevention strategies. Perth]: Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers, 2003.
Знайти повний текст джерелаWestern Australia. Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers. Western Australia Police Service: Internal investigations and disciplinary processes. Perth]: Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Any Western Australian Police Officer, 2003.
Знайти повний текст джерелаM, González Nieto Juan, ed. Autonomic and trusted computing: 6th international conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 proceedings. New York: Springer, 2009.
Знайти повний текст джерелаComputer security fundamentals. 2nd ed. Indianapolis, Ind: Pearson IT Certification, 2012.
Знайти повний текст джерелаOram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.
Знайти повний текст джерелаPer, Christoffersson, ed. Security mechanisms for computer networks. Chichester, West Sussex, England: Ellis Horwood, 1989.
Знайти повний текст джерелаJohn, Mallery, ed. Hardening network security. New York: McGraw-Hill/Osborne, 2005.
Знайти повний текст джерелаЧастини книг з теми "Computer networks Security measures Australia"
Michael, Mark. "Physical Security Threats and Measures." In Handbook of Computer Networks, 596–631. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch38.
Повний текст джерелаWilbur, Steve R., Jon Crowcroft, and Yuko Murayama. "MAC layer security measures in local area networks." In Lecture Notes in Computer Science, 53–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/3-540-51754-5_30.
Повний текст джерелаStepień, Krzysztof, and Aneta Poniszewska-Marańda. "Towards the Security Measures of the Vehicular Ad-Hoc Networks." In Lecture Notes in Computer Science, 233–48. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05081-8_17.
Повний текст джерелаParwekar, Pritee, and Sparsh Arora. "Security Issues and Its Counter Measures in Mobile Ad Hoc Networks." In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I, 301–9. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03107-1_33.
Повний текст джерелаRohilla, Shourya, and Rejo Mathew. "Comparison of Cloud Computing Security Threats and Their Counter Measures." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019), 224–31. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_25.
Повний текст джерелаWallis, Tania, Greig Paul, and James Irvine. "Organisational Contexts of Energy Cybersecurity." In Computer Security. ESORICS 2021 International Workshops, 384–402. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95484-0_22.
Повний текст джерелаHanif, Muhammad Abdullah, Faiq Khalid, Rachmad Vidya Wicaksana Putra, Mohammad Taghi Teimoori, Florian Kriebel, Jeff (Jun) Zhang, Kang Liu, et al. "Robust Computing for Machine Learning-Based Systems." In Dependable Embedded Systems, 479–503. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_20.
Повний текст джерелаAdogbeji, Oghenevwogaga Benson. "Computer Security in Cybercafés." In Security and Software for Cybercafes, 18–29. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch002.
Повний текст джерелаAikins, Stephen K. "Practical Measures for Securing Government Networks." In Handbook of Research on Public Information Technology, 386–94. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-857-4.ch037.
Повний текст джерелаLokbani, Ahmed Chaouki, Ahmed Lehireche, Reda Mohamed Hamou, and Abdelmalek Amine. "Synthesis of Supervised Approaches for Intrusion Detection Systems." In Network Security Technologies, 44–57. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4789-3.ch003.
Повний текст джерелаТези доповідей конференцій з теми "Computer networks Security measures Australia"
Ghorbel, Ahmed, Imen Tajouri, Walid Elaydi, and Nouri Masmoudi. "The effect of the similarity measures and the interpolation techniques on fractional eigenfaces algorithm." In 2015 World Symposium on Computer Networks and Information Security (WSCNIS). IEEE, 2015. http://dx.doi.org/10.1109/wscnis.2015.7368300.
Повний текст джерелаFang, Chaojun. "Study on security problems and preventive measures of computer network and foreign trade and business." In 3rd International Conference on Green Communications and Networks. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/gcn130101.
Повний текст джерелаHayes, Jan, Lynne Chester, and Dolruedee Kramnaimuang King. "Is Public Safety Impacted by the Multiple Regulatory Regimes for Gas Pipelines and Networks?" In 2018 12th International Pipeline Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/ipc2018-78160.
Повний текст джерелаMurray, Mark. "Technology Dependence Beyond Control Systems." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0366.
Повний текст джерела