Статті в журналах з теми "Information security fields"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Information security fields".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Al Reshan, Mana Saleh. "IoT-based Application of Information Security Triad." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.
Повний текст джерелаCalkavur, Selda. "Some Public-key Cryptosystems Over Finite Fields." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (April 26, 2022): 99–104. http://dx.doi.org/10.37394/23209.2022.19.10.
Повний текст джерелаCalkavur, Selda. "Some Public-key Cryptosystems Over Finite Fields." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (April 26, 2022): 99–104. http://dx.doi.org/10.37394/23209.2022.19.10.
Повний текст джерелаWen, Xiaojun, Genping Wang, Yongzhi Chen, Zhengzhong Yi, Zoe L. Jiang, and Junbin Fang. "Quantum solution for secure information transmission of wearable devices." International Journal of Distributed Sensor Networks 14, no. 5 (May 2018): 155014771877967. http://dx.doi.org/10.1177/1550147718779678.
Повний текст джерелаSzentgáli, Gergely. "Seven Pieces of Advice to Improve Your Information Security." Academic and Applied Research in Military and Public Management Science 17, no. 3 (December 31, 2018): 171–78. http://dx.doi.org/10.32565/aarms.2018.3.12.
Повний текст джерелаAl-Harbi, Ibrahim Sulaiman. "The Information Security in Kingdom Of Saudi Arabia." Ulum Islamiyyah 22 (December 29, 2017): 89–102. http://dx.doi.org/10.33102/uij.vol22no0.12.
Повний текст джерелаTershukov, Dmitry. "Analysis of Modern Information Security Threats." NBI Technologies, no. 3 (January 2019): 6–12. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.1.
Повний текст джерелаZou, Shihong, Yanhong Xu, Honggang Wang, Zhouzhou Li, Shanzhi Chen, and Bo Hu. "A Survey on Secure Wireless Body Area Networks." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/3721234.
Повний текст джерелаXu, Ning, and Dong Mei Zhao. "The Research of Information Security Risk Assessment Method Based on AHP." Advanced Materials Research 187 (February 2011): 575–80. http://dx.doi.org/10.4028/www.scientific.net/amr.187.575.
Повний текст джерелаKompantseva, Larysa. "Gender Perspectives of the Information Security." Information Security of the Person, Society and State, no. 26 (2019): 115–25. http://dx.doi.org/10.51369/2707-7276-2019-2-14.
Повний текст джерелаPark, Jong Hyuk. "Symmetry-Adapted Machine Learning for Information Security." Symmetry 12, no. 6 (June 22, 2020): 1044. http://dx.doi.org/10.3390/sym12061044.
Повний текст джерелаSong, Xiao Wei, Shi Zhu, Yuan Wang Wei, Qiao Jie Sun, and Li Qiang Zhao. "Research on Information Engineering with Information Technology for E-Learning Based on Face Recognition." Advanced Materials Research 977 (June 2014): 460–63. http://dx.doi.org/10.4028/www.scientific.net/amr.977.460.
Повний текст джерелаChi, Yuehan, Yushi Cheng, and Xiaoyu Ji. "Terminal Security Monitoring Based on Power Consumption Information." Journal of Physics: Conference Series 2242, no. 1 (April 1, 2022): 012038. http://dx.doi.org/10.1088/1742-6596/2242/1/012038.
Повний текст джерелаHuang, Jingbo. "Application of Information Processing System Based on DSP in Electronic Information Engineering." Journal of Physics: Conference Series 2209, no. 1 (February 1, 2022): 012010. http://dx.doi.org/10.1088/1742-6596/2209/1/012010.
Повний текст джерелаTylets, V. G., and T. M. Krasnianskaya. "The Russian Psychology of Corporate Security in the Early 21th Century: A Bibliographical Review." Bulletin of Irkutsk State University. Series Psychology 42 (2022): 94–108. http://dx.doi.org/10.26516/2304-1226.2022.42.94.
Повний текст джерелаChai, Yan Mei, Su Wen Zhu, and Wen Ying Han. "The Survey on Applications of Information Hiding Technology in E-Commerce Security." Applied Mechanics and Materials 433-435 (October 2013): 1866–70. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1866.
Повний текст джерелаSnishchenko, R., and V. Grynchutskyi. "INFORMATION SECURITY AS A COMPONENT OF ECONOMIC SECURITY OF BUSINESS ENTITIES." Economic Analysis, no. 30(1, Part 1) (2020): 241–48. http://dx.doi.org/10.35774/econa2020.01.01.241.
Повний текст джерелаMarett, Kent. "Checking the manipulation checks in information security research." Information & Computer Security 23, no. 1 (March 9, 2015): 20–30. http://dx.doi.org/10.1108/ics-12-2013-0087.
Повний текст джерелаFathurohman, Adrian, and R. Wahjoe Witjaksono. "Analysis and Design of Information Security Management System Based on ISO 27001: 2013 Using ANNEX Control (Case Study: District of Government of Bandung City)." Bulletin of Computer Science and Electrical Engineering 1, no. 1 (June 26, 2020): 1–11. http://dx.doi.org/10.25008/bcsee.v1i1.2.
Повний текст джерелаHwang, Seung-Yeon, Dong-Jin Shin, and Jeong-Joon Kim. "Systematic Review on Identification and Prediction of Deep Learning-Based Cyber Security Technology and Convergence Fields." Symmetry 14, no. 4 (March 25, 2022): 683. http://dx.doi.org/10.3390/sym14040683.
Повний текст джерелаWurster, Simone. "Development of a Specification for Data Interchange Between Information Systems in Public Hazard Prevention." International Journal of IT Standards and Standardization Research 11, no. 1 (January 2013): 46–66. http://dx.doi.org/10.4018/jitsr.2013010103.
Повний текст джерелаFenz, Stefan, Johannes Heurix, Thomas Neubauer, and Fabian Pechstein. "Current challenges in information security risk management." Information Management & Computer Security 22, no. 5 (November 10, 2014): 410–30. http://dx.doi.org/10.1108/imcs-07-2013-0053.
Повний текст джерелаNiksaz, Pejman, and Mohammad Javad Kargar. "A Full Review of Attacks and Countermeasures in Wireless Sensor Networks." International Journal of Information Security and Privacy 6, no. 4 (October 2012): 1–39. http://dx.doi.org/10.4018/jisp.2012100101.
Повний текст джерелаWu, Yung Chang, Rui Sun, and Yenchun Jim Wu. "Smart City Development in Taiwan: From the Perspective of the Information Security Policy." Sustainability 12, no. 7 (April 6, 2020): 2916. http://dx.doi.org/10.3390/su12072916.
Повний текст джерелаTsyganov, A. V., Y. E. Kuznetsov, A. B. Aidiev, S. V. Gerasimov, G. S. Prosvirnin, and S. N. Anisiforov. "Information security when working with geoinformation systems (GIS)." Legal regulation in veterinary medicine, no. 3 (October 18, 2022): 22–26. http://dx.doi.org/10.52419/issn2782-6252.2022.3.22.
Повний текст джерелаPaul, P. K., and P. S. Aithal. "Information Assurance into Research Level in India: The Case of Possible Research-based Degrees." IRA-International Journal of Management & Social Sciences (ISSN 2455-2267) 15, no. 4 (October 10, 2019): 142. http://dx.doi.org/10.21013/jmss.v15.n4.p8.
Повний текст джерелаNaser Taha, Nasharawan, Hussam Mohammed Almasalha, and Amnah Abumqibl. "The Status Quo of Information Security from the Perspective of Information Technology Staff in Jordanian University Libraries." Journal of Information Security and Cybercrimes Research 4, no. 1 (June 1, 2021): 55–80. http://dx.doi.org/10.26735/mwvl7997.
Повний текст джерелаKennedy, Sarah Elizabeth. "The pathway to security – mitigating user negligence." Information & Computer Security 24, no. 3 (July 11, 2016): 255–64. http://dx.doi.org/10.1108/ics-10-2014-0065.
Повний текст джерелаDai, Xiaoqing. "Experimental Teaching of Information Security Based on Virtual Simulation." Mobile Information Systems 2021 (November 28, 2021): 1–9. http://dx.doi.org/10.1155/2021/8062065.
Повний текст джерелаSun, Hai Tao, De Qing Xue, and Jie Liu. "Security Analysis of Cryptographical Module for FPGA." Applied Mechanics and Materials 347-350 (August 2013): 3842–44. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3842.
Повний текст джерелаH.J., Felcia Bel, and Sabeen S. "A Survey on IoT Security: Attacks, Challenges and Countermeasures." Webology 19, no. 1 (January 20, 2022): 3741–63. http://dx.doi.org/10.14704/web/v19i1/web19246.
Повний текст джерелаJimoh, R. G., M. AbdulRaheem, I. R. Salimonu, and O. V. Mejabi. "Elliptic Curve Cryptosystem in securing Communication across Unsecure Channel." Circulation in Computer Science 2, no. 5 (June 20, 2017): 7–12. http://dx.doi.org/10.22632/ccs-2017-251-97.
Повний текст джерелаFadhil, Heba M., Noor Q. Makhool, Muna M. Hummady, and Zinah O. Dawood. "Machine Learning-based Information Security Model for Botnet Detection." Journal of Cybersecurity and Information Management 9, no. 1 (2022): 68–79. http://dx.doi.org/10.54216/jcim.090106.
Повний текст джерелаLi, Hao, Shuai Ye, Jia-qing Guo, Jing-tao Kong, Jun Song, Zhen-hui Kang, and Jun-le Qu. "The design of room-temperature-phosphorescent carbon dots and their application as a security ink." Journal of Materials Chemistry C 7, no. 34 (2019): 10605–12. http://dx.doi.org/10.1039/c9tc03481a.
Повний текст джерелаLei, Ting, and Yan Wang. "The Study of Influencing Factors of the Online Banking Information Security Products Service Quality." Applied Mechanics and Materials 644-650 (September 2014): 5703–9. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.5703.
Повний текст джерелаAlaidi, Abdul Hadi M. "Enhanced a TCP security protocol by using optional fields in TCP header." Journal of Education College Wasit University 1, no. 24 (January 17, 2016): 485–502. http://dx.doi.org/10.31185/eduj.vol1.iss24.189.
Повний текст джерелаMohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security." Webology 19, no. 1 (January 20, 2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.
Повний текст джерелаCai, Zhongmin, and Chenglong Li. "Computer Network Information System Security Prevention Methods under the Background of Big Data." Mathematical Problems in Engineering 2022 (May 17, 2022): 1–10. http://dx.doi.org/10.1155/2022/9023904.
Повний текст джерелаCera, Christopher D., Ilya Braude, Taeseong Kim, JungHyun Han, and William C. Regli. "Hierarchical Role-Based Viewing for Multilevel Information Security in Collaborative CAD." Journal of Computing and Information Science in Engineering 6, no. 1 (March 24, 2005): 2–10. http://dx.doi.org/10.1115/1.2161226.
Повний текст джерелаFan, Lin Na, and Jun Liu. "A New Mechanism of Database Encryption." Applied Mechanics and Materials 135-136 (October 2011): 87–91. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.87.
Повний текст джерелаFeltus, Christophe. "Reinforcement Learning's Contribution to the Cyber Security of Distributed Systems." International Journal of Distributed Artificial Intelligence 12, no. 2 (July 2020): 35–55. http://dx.doi.org/10.4018/ijdai.2020070103.
Повний текст джерелаMa, Yongchun, Deyun Yang, Depeng Zhang, Hailin Wu, ChaoRan Li, and Qianqian Du. "Security Threat Analysis and Corresponding Countermeasures for HTS Communication System." Journal of Physics: Conference Series 2246, no. 1 (April 1, 2022): 012010. http://dx.doi.org/10.1088/1742-6596/2246/1/012010.
Повний текст джерелаM, Vinoth Kumar, K. Venkatachalam, Prabu P, Abdulwahab Almutairi, and Mohamed Abouhawwash. "Secure biometric authentication with de-duplication on distributed cloud storage." PeerJ Computer Science 7 (July 30, 2021): e569. http://dx.doi.org/10.7717/peerj-cs.569.
Повний текст джерелаBatueva, E. V. "VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION." MGIMO Review of International Relations, no. 3(36) (June 28, 2014): 128–36. http://dx.doi.org/10.24833/2071-8160-2014-3-36-128-136.
Повний текст джерелаRamjanati, Prihatini, Freddy Kurnia Wijaya, and Muhamad Son Muarie. "Penilaian Risiko Keamanan Informasi Menggunakan Octave Allegro: Studi Kasus pada Perguruan Tinggi." JUSIFO (Jurnal Sistem Informasi) 7, no. 1 (June 30, 2021): 10–20. http://dx.doi.org/10.19109/jusifo.v7i1.5870.
Повний текст джерелаOnopriienko, S. H. "Methodological bases for studying information security in the law of national security and military law." Analytical and Comparative Jurisprudence, no. 4 (April 28, 2022): 185–88. http://dx.doi.org/10.24144/2788-6018.2021.04.32.
Повний текст джерелаJanečka, Karel. "The Integrated Management of Information about the Geodetic Point Fields—A Case of the Czech Republic." Geosciences 9, no. 7 (July 12, 2019): 307. http://dx.doi.org/10.3390/geosciences9070307.
Повний текст джерелаJuarez-Sandoval, Oswaldo Ulises, Francisco Javier Garcia-Ugalde, Manuel Cedillo-Hernandez, Jazmin Ramirez-Hernandez, and Leobardo Hernandez-Gonzalez. "Imperceptible–Visible Watermarking to Information Security Tasks in Color Imaging." Mathematics 9, no. 19 (September 24, 2021): 2374. http://dx.doi.org/10.3390/math9192374.
Повний текст джерелаSWAMINATHAN, M. S. "Climate and Sustainable Food Security." MAUSAM 52, no. 1 (December 29, 2021): 1–8. http://dx.doi.org/10.54302/mausam.v52i1.1671.
Повний текст джерелаFomicheva, Svetlana, and Sergey Bezzateev. "Modification of the Berlekamp-Massey algorithm for explicable knowledge extraction by SIEM-agents." Journal of Physics: Conference Series 2373, no. 5 (December 1, 2022): 052033. http://dx.doi.org/10.1088/1742-6596/2373/5/052033.
Повний текст джерела