Статті в журналах з теми "Security of information and communication systems"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security of information and communication systems".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Masadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (October 2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.
Повний текст джерелаMatrokhina, K. V., A. B. Makhovikov, and E. N. Trofimets. "Ensuring information security in corporate communication systems." E3S Web of Conferences 266 (2021): 09001. http://dx.doi.org/10.1051/e3sconf/202126609001.
Повний текст джерелаWITKOWSKI, Marek. "SECURITY OF ICT SYSTEMS IN CRISIS MANAGEMENT." Scientific Journal of the Military University of Land Forces 162, no. 4 (October 1, 2011): 80–90. http://dx.doi.org/10.5604/01.3001.0002.3179.
Повний текст джерелаGorbenko, I. D., and Yu V. Stasev. "Information security in space communication and control systems." Kosmìčna nauka ì tehnologìâ 2, no. 5-6 (September 30, 1996): 64–68. http://dx.doi.org/10.15407/knit1996.05.064.
Повний текст джерелаRao, Nandan, Shubhra Srivastava, and Sreekanth K.S. "PKI Deployment Challenges and Recommendations for ICS Networks." International Journal of Information Security and Privacy 11, no. 2 (April 2017): 38–48. http://dx.doi.org/10.4018/ijisp.2017040104.
Повний текст джерелаLeines-Vite, Lenin, Juan Carlos Pérez-Arriaga, and Xavier Limón. "Information and Communication Security Mechanisms For Microservices-based Systems." International Journal of Network Security & Its Applications 13, no. 6 (November 30, 2021): 85–103. http://dx.doi.org/10.5121/ijnsa.2021.13607.
Повний текст джерелаKoskosas, Ioannis. "Communicating information systems goals: A case in internet banking security." Computer Science and Information Systems 6, no. 1 (2009): 71–92. http://dx.doi.org/10.2298/csis0901071k.
Повний текст джерелаStanton, Jeffrey M. "Security of Information and Communication Networks." Journal of the American Society for Information Science and Technology 61, no. 5 (November 11, 2009): 1074. http://dx.doi.org/10.1002/asi.21258.
Повний текст джерелаHalaweh, Mohanad. "Users' Perception of Security for Mobile Communication Technology." International Journal of Information Security and Privacy 8, no. 3 (July 2014): 1–12. http://dx.doi.org/10.4018/ijisp.2014070101.
Повний текст джерелаMenkus, Belden. "Information Systems Quality Assurance Enhances Information Systems Security." EDPACS 17, no. 12 (June 1990): 6–10. http://dx.doi.org/10.1080/07366989009450603.
Повний текст джерелаTabakaeva, Valeria A., Valentin V. Selivanov, and Vladimir R. An. "APPLICATION OF INTELLIGENT SYSTEMS IN OPTICAL COMMUNICATION SYSTEMS TO ENSURE INFORMATION SECURITY." Interexpo GEO-Siberia 8 (May 21, 2021): 337–43. http://dx.doi.org/10.33764/2618-981x-2021-8-337-343.
Повний текст джерелаJulian, Alfred. "Information Warfare and Information Systems Security." EDPACS 24, no. 3 (September 1996): 8–12. http://dx.doi.org/10.1080/07366989609452269.
Повний текст джерелаMatveeva, A. A., I. V. Kim, and I. I. Viksnin. "Information security methods for communication channels in multiagent robotic systems." Scientific and Technical Journal of Information Technologies, Mechanics and Optics 19, no. 1 (February 1, 2019): 102–8. http://dx.doi.org/10.17586/2226-1494-2019-19-1-102-108.
Повний текст джерелаJuneja, Mamta. "A Covert Communication Model-Based on Image Steganography." International Journal of Information Security and Privacy 8, no. 1 (January 2014): 19–37. http://dx.doi.org/10.4018/ijisp.2014010102.
Повний текст джерелаLuo, Kun. "Analysis of Information Security Maintenance Countermeasures in Power Automation Communication Technology." Lifelong Education 9, no. 6 (September 28, 2020): 127. http://dx.doi.org/10.18282/le.v9i6.1320.
Повний текст джерелаMaslova, Maria. "Applying intelligent methods of risk analysis in information communication systems." ITM Web of Conferences 30 (2019): 04018. http://dx.doi.org/10.1051/itmconf/20193004018.
Повний текст джерелаChang, Kuo-chung, and Chih-ping Wang. "Information systems resources and information security." Information Systems Frontiers 13, no. 4 (April 27, 2010): 579–93. http://dx.doi.org/10.1007/s10796-010-9232-6.
Повний текст джерелаShen, Aiguo, Guangsong Yang, and Dezhi Wei. "Performance of multi-antenna wireless systems based on time reversal." Journal of Physics: Conference Series 2079, no. 1 (November 1, 2021): 012025. http://dx.doi.org/10.1088/1742-6596/2079/1/012025.
Повний текст джерелаAbdallah, Asmaa, M. Ali, Jelena Mišić, and Vojislav Mišić. "Efficient Security Scheme for Disaster Surveillance UAV Communication Networks." Information 10, no. 2 (January 29, 2019): 43. http://dx.doi.org/10.3390/info10020043.
Повний текст джерелаHart, Penny. "Information Security and Virtual Teams." International Journal of Systems and Society 4, no. 2 (July 2017): 1–7. http://dx.doi.org/10.4018/ijss.2017070101.
Повний текст джерелаCai-Sen Chen, Cai-Sen Chen, Yang-Xia Xiang Cai-Sen Chen, Jia-Xing Du Yang-Xia Xiang, 陳嵩 Jia-Xing Du, and Cong Lin Song Chen. "Based on SM - 9 Cloud Edge System Information Security Transmission." 電腦學刊 33, no. 1 (February 2022): 189–98. http://dx.doi.org/10.53106/199115992022023301017.
Повний текст джерелаDunkerley, Kimberley, and Gurvirender Tejay. "Theorizing Information Security Success." International Journal of Electronic Government Research 6, no. 3 (July 2010): 31–41. http://dx.doi.org/10.4018/jegr.2010070103.
Повний текст джерелаMenkus, Belden. "Firewalls in Information Systems Security." EDPACS 23, no. 3 (September 1995): 9–15. http://dx.doi.org/10.1080/07366989509451685.
Повний текст джерелаBAFTIU, Naim, Ahmet NUREDINI, and Samedin KRRABAJ. "Encrypted Data Service for Security Electronic Communications." PRIZREN SOCIAL SCIENCE JOURNAL 3, no. 3 (December 26, 2019): 84. http://dx.doi.org/10.32936/pssj.v3i3.120.
Повний текст джерелаRiguidel, Michel. "Creating a new security for tomorrow’s communication networks and information systems." Annales Des Télécommunications 55, no. 7-8 (July 2000): 401–18. http://dx.doi.org/10.1007/bf02994847.
Повний текст джерелаGonçalves, Fábio, Joaquim Macedo, and Alexandre Santos. "An Intelligent Hierarchical Security Framework for VANETs." Information 12, no. 11 (November 2, 2021): 455. http://dx.doi.org/10.3390/info12110455.
Повний текст джерелаYacouba, Kouraogo, Orhanou Ghizlane, and Elhajji Said. "Securing Communication 2FA Using Post-Quantic Cryptosystem." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 102–15. http://dx.doi.org/10.4018/ijisp.2020040106.
Повний текст джерелаHo, Pin‐Han, Zonghua Zhang, and Rongxing Lu. "Special Issue on “Security and Privacy Preservation in Vehicular Communications” Wiley's Security and Communication Networks Journal." Security and Communication Networks 1, no. 3 (May 2008): 191–93. http://dx.doi.org/10.1002/sec.34.
Повний текст джерелаClark, Sarah. "Book Review: Library Security: Better Communication, Safer Facilities." Reference & User Services Quarterly 55, no. 3 (March 24, 2016): 245. http://dx.doi.org/10.5860/rusq.55n3.245.
Повний текст джерелаZou, Shihong, Yanhong Xu, Honggang Wang, Zhouzhou Li, Shanzhi Chen, and Bo Hu. "A Survey on Secure Wireless Body Area Networks." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/3721234.
Повний текст джерелаMishra, Sushma, Donald J. Caputo, Gregory J. Leone, Fred G. Kohun, and Peter J. Draus. "The Role Of Awareness And Communications In Information Security Management: A Health Care Information Systems Perspective." International Journal of Management & Information Systems (IJMIS) 18, no. 2 (March 28, 2014): 139. http://dx.doi.org/10.19030/ijmis.v18i2.8495.
Повний текст джерелаEL Azzaoui, Abir, Haotian Chen, So Hyeon Kim, Yi Pan, and Jong Hyuk Park. "Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems." Sensors 22, no. 4 (February 10, 2022): 1371. http://dx.doi.org/10.3390/s22041371.
Повний текст джерелаYılmaz, Mustafa Harun, Ertuğrul Güvenkaya, Haji M. Furqan, Selçuk Köse, and Hüseyin Arslan. "Cognitive Security of Wireless Communication Systems in the Physical Layer." Wireless Communications and Mobile Computing 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/3592792.
Повний текст джерелаFarkas, Tibor. "Communication and Information Services – NATO Requirements, Part I." Land Forces Academy Review 25, no. 4 (December 1, 2020): 281–89. http://dx.doi.org/10.2478/raft-2020-0034.
Повний текст джерелаFarkas, Tibor. "Communication and Information Services – NATO Requirements, Part I." Land Forces Academy Review 25, no. 4 (December 1, 2020): 281–89. http://dx.doi.org/10.2478/raft-2020-0034.
Повний текст джерелаBabu, Erukala Suresh, C. Nagaraju, and M. H. M. Krishna Prasad. "IPHDBCM." International Journal of Information Security and Privacy 10, no. 3 (July 2016): 42–66. http://dx.doi.org/10.4018/ijisp.2016070104.
Повний текст джерелаOlakanmi, Oladayo Olufemi, and Kehinde Oluwasesan Odeyemi. "VerSA." International Journal of Information Security and Privacy 15, no. 3 (July 2021): 65–82. http://dx.doi.org/10.4018/ijisp.2021070105.
Повний текст джерелаSmolarek, Mirosław, and Marek Witkowski. "Ict Security Of A State." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 3 (June 1, 2015): 743–48. http://dx.doi.org/10.1515/kbo-2015-0125.
Повний текст джерелаMoskovchenko, Valeriy, Mikhail Gudkov, and Oleg Lauta. "Robotechnical System for Analyzing Cyber-Security of Information Communication Systems and Networks." NBI Technologies, no. 2 (February 2018): 30–38. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.5.
Повний текст джерелаAnnane, Boubakeur, and Alti Adel. "Proxy-3S." International Journal of Information Security and Privacy 16, no. 1 (January 2022): 1–38. http://dx.doi.org/10.4018/ijisp.2022010116.
Повний текст джерелаPetrescu, Anca Gabriela. "Management Approach of Risk Analysis in Information Security." International Journal of Innovation in the Digital Economy 9, no. 3 (July 2018): 13–26. http://dx.doi.org/10.4018/ijide.2018070102.
Повний текст джерелаBlaga, Nataliya, and Volodymyr Hobela. "IMPROVEMENT OF INFORMATION SECURITY OF THE COMMUNICATION PROCESS AT THE ENTERPRISE." Social & Legal Studios 13, no. 3 (September 29, 2021): 156–62. http://dx.doi.org/10.32518/2617-4162-2021-3-156-162.
Повний текст джерелаNordstrom, L. "Assessment of Information Security Levels in Power Communication Systems Using Evidential Reasoning." IEEE Transactions on Power Delivery 23, no. 3 (July 2008): 1384–91. http://dx.doi.org/10.1109/tpwrd.2008.919231.
Повний текст джерелаAllen, Sandra. "Information Systems Security in an Open Systems Environment." EDPACS 23, no. 5 (November 1995): 1–17. http://dx.doi.org/10.1080/07366989509451379.
Повний текст джерелаGrabusts, Pēteris. "Security Aspects of Information Structures in the Information Warfare Context." Information Technology and Management Science 21 (December 14, 2018): 49–53. http://dx.doi.org/10.7250/itms-2018-0007.
Повний текст джерелаHenderson, Stuart. "The Information Systems Security Policy Statement." EDPACS 23, no. 12 (June 1996): 9–18. http://dx.doi.org/10.1080/07366989609451717.
Повний текст джерелаXia, Zhe, Yining Liu, Ching-Fang Hsu, and Chin-Chen Chang. "Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications." Security and Communication Networks 2020 (July 13, 2020): 1–8. http://dx.doi.org/10.1155/2020/6183861.
Повний текст джерелаGorohov, Roman S., and Sergey N. Novikov. "STATE OF CAD INFORMATION SECURITY." Interexpo GEO-Siberia 6, no. 1 (July 8, 2020): 110–13. http://dx.doi.org/10.33764/2618-981x-2020-6-1-110-113.
Повний текст джерелаA. Alrubaidi, Mohammed, and Nabil Hassan Abdo Al-Hemyari. "Impact of Information Technology Risks on Information Systems Security: A Field Study of Telecommunication Companies in Yemen." مجلة الدراسات الاجتماعية 27, no. 1 (May 6, 2021): 125–57. http://dx.doi.org/10.20428/jss.27.1.5.
Повний текст джерелаShi, Shuyun, Min Luo, Yihong Wen, Lianhai Wang, and Debiao He. "A Blockchain-Based User Authentication Scheme with Access Control for Telehealth Systems." Security and Communication Networks 2022 (March 30, 2022): 1–18. http://dx.doi.org/10.1155/2022/6735003.
Повний текст джерела