Статті в журналах з теми "Computer networks Security measures Australia"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Computer networks Security measures Australia".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Asre, Shashank, and Adnan Anwar. "Synthetic Energy Data Generation Using Time Variant Generative Adversarial Network." Electronics 11, no. 3 (January 24, 2022): 355. http://dx.doi.org/10.3390/electronics11030355.
Повний текст джерелаSlay, J., and B. Turnbull. "Computer Security Education and Research in Australia." IEEE Security & Privacy Magazine 4, no. 5 (September 2006): 60–63. http://dx.doi.org/10.1109/msp.2006.115.
Повний текст джерелаLittlewood, Bev, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid, and Dieter Gollmann. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (April 1, 1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Повний текст джерелаKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Повний текст джерелаZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Повний текст джерелаCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (March 1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Повний текст джерелаGuo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.
Повний текст джерелаKuprashvili, Henri. "Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)." Works of Georgian Technical University, no. 2(524) (June 6, 2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.
Повний текст джерелаSmith, Martin. "Part 2 Personnel security measures within a computer installation." Computer Law & Security Review 6, no. 2 (July 1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.
Повний текст джерелаMo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.
Повний текст джерелаAlfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (November 2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.
Повний текст джерелаZhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.
Повний текст джерелаKounavis, Michael, David Durham, Sergej Deutsch, and Ken Grewal. "Security definitions, entropy measures and constructions for implicitly detecting data corruption." Computer Communications 160 (July 2020): 815–46. http://dx.doi.org/10.1016/j.comcom.2020.05.022.
Повний текст джерелаHeinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, Stefan Katzenbeisser, Neeraj Suri, Henk Birkholz, Andreas Fuchs, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.
Повний текст джерелаHewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (July 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Повний текст джерелаFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks." Journal of Information Technology Research 7, no. 3 (July 2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.
Повний текст джерелаPeng, Yu, Xinrong Liu, Ming Li, Zheng Li, Tao Hu, Yangjun Xiao, Sheng Zhang, et al. "Sensing network security prevention measures of BIM smart operation and maintenance system." Computer Communications 161 (September 2020): 360–67. http://dx.doi.org/10.1016/j.comcom.2020.07.039.
Повний текст джерелаFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks." Journal of Information Technology Research 8, no. 1 (January 2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.
Повний текст джерелаSheela, D., and G. Mahadevan. "Mobile Agent Based Enhanced Security for Wireless Sensor Networks." International Journal of Business Data Communications and Networking 10, no. 2 (April 2014): 15–29. http://dx.doi.org/10.4018/ijbdcn.2014040102.
Повний текст джерелаWang, Xi, and Lei Shi. "Design of computer network security storage system based on cloud computing technology." Journal of Physics: Conference Series 2083, no. 4 (November 1, 2021): 042084. http://dx.doi.org/10.1088/1742-6596/2083/4/042084.
Повний текст джерелаZhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.
Повний текст джерелаOuyang, Chun-Juan, Ming Leng, Jie-Wu Xia, and Huan Liu. "Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1790268.
Повний текст джерелаYuan, Bingxia. "Sensor Network Security Risk Prediction and Control Method Based on Big Data Analysis." Security and Communication Networks 2022 (May 19, 2022): 1–7. http://dx.doi.org/10.1155/2022/7116013.
Повний текст джерелаNazir, Sajid, Shushma Patel, and Dilip Patel. "Autonomic Computing Architecture for SCADA Cyber Security." International Journal of Cognitive Informatics and Natural Intelligence 11, no. 4 (October 2017): 66–79. http://dx.doi.org/10.4018/ijcini.2017100104.
Повний текст джерелаFeng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, and Qi Han. "A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment." Complexity 2021 (June 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.
Повний текст джерелаWang, Xiaoli, Bharadwaj Veeravalli, Yulong Tan, and Zhihao Tong. "Security and Makespan Trade-Off Strategy in Fog-Enabled IoT Networks." Security and Communication Networks 2022 (May 23, 2022): 1–13. http://dx.doi.org/10.1155/2022/5184453.
Повний текст джерелаLiu, Rosina. "Is Security, is Audit, and Control Measures in Telecommunication Toll Fraud." EDPACS 25, no. 3 (September 1997): 1–11. http://dx.doi.org/10.1080/07366989709452320.
Повний текст джерелаA. D., Azernikov, Norkina A. N., Myseva E. R., and Chicherov K. A. "Innovative Technologies in Combating Cyber Crime." KnE Social Sciences 3, no. 2 (February 15, 2018): 248. http://dx.doi.org/10.18502/kss.v3i2.1550.
Повний текст джерелаLiang, Jiaqi, Yibei Wu, Jun’e Li, Xiong Chen, Heqin Tong, and Ming Ni. "Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks." Complexity 2021 (February 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/6659879.
Повний текст джерелаSafavi-Naini, Reihaneh, Alireza Poostindouz, and Viliam Lisy. "Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication." Security and Communication Networks 2018 (May 7, 2018): 1–15. http://dx.doi.org/10.1155/2018/8475818.
Повний текст джерелаNawaz, Naeem A., Kashif Ishaq, Uzma Farooq, Amna Khalil, Saim Rasheed, Adnan Abid, and Fadhilah Rosdi. "A comprehensive review of security threats and solutions for the online social networks industry." PeerJ Computer Science 9 (January 16, 2023): e1143. http://dx.doi.org/10.7717/peerj-cs.1143.
Повний текст джерелаSamreen, Shirina. "Packet Dropping Counter Measures in a MANET Through Reliable Routing Protocol Leveraging a Trust Management Framework." International Journal of Mobile Computing and Multimedia Communications 9, no. 3 (July 2018): 60–75. http://dx.doi.org/10.4018/ijmcmc.2018070104.
Повний текст джерелаDas, Amit, and Habib Ullah Khan. "Security behaviors of smartphone users." Information & Computer Security 24, no. 1 (March 14, 2016): 116–34. http://dx.doi.org/10.1108/ics-04-2015-0018.
Повний текст джерелаKhan, Burhan Ul Islam, Farhat Anwar, Farah Diyana Bt Abdul Rahman, Rashidah Funke Olanrewaju, Miss Laiha B. Mat Kiah, Md Arafatur Rahman, and Zuriati Janin. "EXPLORING MANET SECURITY ASPECTS: ANALYSIS OF ATTACKS AND NODE MISBEHAVIOUR ISSUES." Malaysian Journal of Computer Science 35, no. 4 (October 30, 2022): 307–38. http://dx.doi.org/10.22452/mjcs.vol35no4.2.
Повний текст джерелаAhmad, Bilal, Wang Jian, and Zain Anwar Ali. "Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions." Journal of Computer Networks and Communications 2018 (July 2, 2018): 1–10. http://dx.doi.org/10.1155/2018/6383145.
Повний текст джерелаAl-Otaibi, Yasser D. "A Shared Two-way Cybersecurity Model for Enhancing Cloud Service Sharing for Distributed User Applications." ACM Transactions on Internet Technology 22, no. 2 (May 31, 2022): 1–17. http://dx.doi.org/10.1145/3430508.
Повний текст джерелаSafi, Roozmehr, Glenn J. Browne, and Azadeh Jalali Naini. "Mis-spending on information security measures: Theory and experimental evidence." International Journal of Information Management 57 (April 2021): 102291. http://dx.doi.org/10.1016/j.ijinfomgt.2020.102291.
Повний текст джерелаShabbir, Aysha, Maryam Shabbir, Muhammad Rizwan, and Fahad Ahmad. "Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard." Security and Communication Networks 2019 (December 18, 2019): 1–16. http://dx.doi.org/10.1155/2019/2509898.
Повний текст джерелаWang, Keyong, Xiaoyue Guo, and Dequan Yang. "Research on the Effectiveness of Cyber Security Awareness in ICS Risk Assessment Frameworks." Electronics 11, no. 10 (May 23, 2022): 1659. http://dx.doi.org/10.3390/electronics11101659.
Повний текст джерелаSharma, Tanusree, Hunter A. Dyer, and Masooda Bashir. "Enabling User-centered Privacy Controls for Mobile Applications." ACM Transactions on Internet Technology 21, no. 1 (February 2021): 1–24. http://dx.doi.org/10.1145/3434777.
Повний текст джерелаBhatia, Deepshikha. "A Comprehensive Review on the Cyber Security Methods in Indian Organisation." International Journal of Advances in Soft Computing and its Applications 14, no. 1 (March 28, 2022): 103–24. http://dx.doi.org/10.15849/ijasca.220328.08.
Повний текст джерелаZhu, Qingyi, Yuhang Liu, Xuhang Luo, and Kefei Cheng. "A Malware Propagation Model Considering Conformity Psychology in Social Networks." Axioms 11, no. 11 (November 10, 2022): 632. http://dx.doi.org/10.3390/axioms11110632.
Повний текст джерелаAziz, Israa T., and Ihsan H. Abdulqadder. "An Overview on SDN and NFV Security Orchestration in Cloud Network Environment." Cihan University-Erbil Scientific Journal 5, no. 1 (June 20, 2021): 20–27. http://dx.doi.org/10.24086/cuesj.v5n1y2021.pp20-27.
Повний текст джерелаRietz, René, Radoslaw Cwalinski, Hartmut König, and Andreas Brinner. "An SDN-Based Approach to Ward Off LAN Attacks." Journal of Computer Networks and Communications 2018 (November 21, 2018): 1–12. http://dx.doi.org/10.1155/2018/4127487.
Повний текст джерелаNiveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath, and Magesh S. "Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform." International Journal of e-Collaboration 17, no. 4 (October 2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.
Повний текст джерелаTian, Zhenghao. "Embedded Real-Time Detection of Vehicles and Pedestrians Based on Minimal Networks." Mobile Information Systems 2022 (August 5, 2022): 1–9. http://dx.doi.org/10.1155/2022/3055282.
Повний текст джерелаJain, Jaishree, Arpit Jain, Saurabh Kumar Srivastava, Chaman Verma, Maria Simona Raboaca, and Zoltán Illés. "Improved Security of E-Healthcare Images Using Hybridized Robust Zero-Watermarking and Hyper-Chaotic System along with RSA." Mathematics 10, no. 7 (March 26, 2022): 1071. http://dx.doi.org/10.3390/math10071071.
Повний текст джерелаLiang, Yingchang, Yue Gao, Liang Xiao, Yulong Zou, and Guoru Ding. "Guest editorial: Wireless security challenges and counter measures for dynamic spectrum sharing." China Communications 18, no. 12 (December 2021): iii—vi. http://dx.doi.org/10.23919/jcc.2021.9665362.
Повний текст джерелаBadzeliuk, P. "On the issue of cybersecurity of advocacy activity." Analytical and Comparative Jurisprudence, no. 2 (July 24, 2022): 302–5. http://dx.doi.org/10.24144/2788-6018.2022.02.56.
Повний текст джерелаSheikh, Muhammad Sameer, and Jun Liang. "A Comprehensive Survey on VANET Security Services in Traffic Management System." Wireless Communications and Mobile Computing 2019 (September 15, 2019): 1–23. http://dx.doi.org/10.1155/2019/2423915.
Повний текст джерела