[1]
|
Ai-based mobile edge computing for iot: Applications, challenges, and future scope
|
|
Arabian Journal for Science and …,
2022 |
|
|
[2]
|
Analysis of information availability for seismic and volcanic monitoring systems: a review
|
|
Aguiar, C Tripp-Barba - Sensors,
2022 |
|
|
[3]
|
Biometric system for protecting information and improving service delivery: The case of a developing country's social security and pension organisation
|
|
Oware, J Effah - Information Development,
2022 |
|
|
[4]
|
Bat-Inspired Optimization for Intrusion Detection Using an Ensemble Forecasting Method.
|
|
Intelligent Automation & Soft …,
2022 |
|
|
[5]
|
On Cybersecurity Risk Assessment in Nuclear Power Systems
|
|
IFAC-PapersOnLine,
2022 |
|
|
[6]
|
The cybersecurity-related ethical issues of cloud technology and how to avoid them
|
|
Proceedings of the 17th …,
2022 |
|
|
[7]
|
Measuring the Impact of DoS Attack on Availability: Empirical Study Based on Accessibility
|
|
Journal of Information Security,
2022 |
|
|
[8]
|
Image Encryption Using Modulated Chaotic Maps
|
|
2022 International Symposium on …,
2022 |
|
|
[9]
|
The IoT Threat Landscape vs. Machine Learning, aka Who Attacks IoT, Why Do They Do It, and How to Prevent It?
|
|
2022 |
|
|
[10]
|
On the Availability Property and Its Metric for NPP IACS
|
|
2022 15th International …,
2022 |
|
|
[11]
|
Security Management System (SMS)
|
|
Information Security Handbook,
2022 |
|
|
[12]
|
Data-driven framework and experimental validation for security monitoring of networked systems
|
|
2022 |
|
|
[13]
|
Information security for Industry 4.0
|
|
2022 |
|
|
[14]
|
Systematic Literature Review: Information security behaviour on smartphone users
|
|
Environment-Behaviour …,
2022 |
|
|
[15]
|
Graph Databases and E-commerce Cybersecurity-a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation
|
|
2022 |
|
|
[16]
|
CHAOS ENGINEERING WITHIN A DEVOPS ENVIRONMENT i
|
|
2022 |
|
|
[17]
|
10 Security Management System (SMS)
|
|
Information Security Handbook,
2022 |
|
|
[18]
|
PENGARUH KETERSEDIAAN INFORMASI, KETEPATAN MEDIA DAN AKSESIBILITAS INFORMASI TERHADAP PARTISIPASI ORANG TUA PESERTA DIDIK DI SDN …
|
|
Jurnal Evaluasi Pendidikan,
2022 |
|
|
[19]
|
ДІЯЛЬНІСТЬ ОРГАНІВ ПУБЛІЧНОЇ ВЛАДИ УКРАЇНИ У ПРОТИДІЇ ЕПІДЕМІЇ COVID-19: ІНФОРМАЦІЙНО-БЕЗПЕКОВИЙ КОНТЕКСТ
|
|
Сучасне …,
2022 |
|
|
[20]
|
GRYPE СКЕНЕР ЗА ТЕСТИРАЊЕ РАЊИВОСТИ У КОНТЕЈНЕРИМА
|
|
Zbornik radova Fakulteta tehničkih nauka u Novom …,
2022 |
|
|
[21]
|
Development of Audit Information System Index KAMI Based on ISO/IEC 27001: 2013
|
|
Development,
2022 |
|
|
[22]
|
Cybersecurity Issues in Crowdsourcing Engineering Initiatives
|
|
2021 Fall ASEE Middle Atlantic Section …,
2021 |
|
|
[23]
|
Système intelligent basé sur des techniques de l'apprentissage automatique pour l'évaluation de la sécurité et la détection des cyber-intrusions
|
|
2021 |
|
|
[24]
|
The Hierarchical Decision Model of cybersecurity risk assessment
|
|
2021 12th National Conference with International …,
2021 |
|
|
[25]
|
ФОРМУЛИРОВАНИЕ ЦЕЛИ ЗАЩИТЫ ИНФОРМАЦИИ ДЛЯ РАЗЛИЧНЫХ ТИПОВ ИНФОРМАЦИОННЫХ СИСТЕМ
|
|
ПЕРСПЕКТИВЫ РАЗВИТИЯ …,
2021 |
|
|
[26]
|
Comparison of intrusion detection for the internet of things with machine and deep learning methods
|
|
2021 |
|
|
[27]
|
Security and Privacy Features Supported by Different Overlay-based ICN/IP Coexistence Architectures
|
|
2021 |
|
|
[28]
|
Examining the Relationship between Converged-Network Architecture and Remote Grassfire Alert Transmission Delay in Southeast Colorado
|
|
2021 |
|
|
[29]
|
Web security intelligent robot avoiding hacking activities using data mining as parameters of intelligent algorithms
|
|
2021 |
|
|
[30]
|
Industrial Control System Availability Assessment with a Metric Based on Delay and Dependency
|
|
IFAC-PapersOnLine,
2021 |
|
|
[31]
|
Industrial Control System Cybersecurity Assessment Handling Delay Estimation
|
|
International Russian Automation …,
2021 |
|
|
[32]
|
Big data in the metal processing value chain: a systematic digitalization approach under special consideration of standardization and SMEs
|
|
Applied Sciences,
2021 |
|
|
[33]
|
Existence-network dimension of information security in modern society
|
|
Skhid,
2021 |
|
|
[34]
|
Cloud risk analysis using OCTAVE Allegro: Identifying and analysing risks of a cloud service
|
|
2021 |
|
|
[35]
|
Molnbaserade affärssystem och SME-företag: Betydelsefulla trygghetsaspekter för extern datalagring: En kvalitativ studie om vilka aspekter som är betydelsefulla för …
|
|
2021 |
|
|
[36]
|
Activities of Ukrainian Public Authorities to Response the COVID-19 Epidemic: Information and Security Context
|
|
2021 |
|
|
[37]
|
Factors Affecting Adoption of Wearable Biometric-Tracking Devices: A Predictive Study
|
|
2021 |
|
|
[38]
|
Disentangling the Concept of Information Security Properties: Enabling Effective Information Security Governance
|
|
2021 |
|
|
[39]
|
EXISTENCE-NETWORK DIMENSION OF INFORMATION SECURITY IN MODERN SOCIETY.
|
|
2021 |
|
|
[40]
|
Source-based Defense Mechanism In Sdn With Support Vector Machine
|
|
2021 |
|
|
[41]
|
Private Data Sharing in a Secure Cloud-based Application for Acute Stroke Care
|
|
2021 |
|
|
[42]
|
Predicting DOS-DDOS Attacks: Review and Evaluation Study of Feature Selection Methods based on Wrapper Process
|
|
International Journal of Advanced Computer Science and Applications,
2021 |
|
|
[43]
|
Factors Affecting the Security of Information Systems: A
|
|
The International Journal of Engineering and Science,
2021 |
|
|
[44]
|
Examining the Relationship Between Cybersecurity-Employee Vulnerabilities and Reduction of Security Breaches in Information Technology Organization
|
|
2020 |
|
|
[45]
|
Applying Security Assurance Cases for Cloud-based Systems in the Medical Domain
|
|
2020 |
|
|
[46]
|
Web Services Security and Threats: A Systematic Literature Review
|
|
2020 |
|
|
[47]
|
Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters
|
|
2020 |
|
|
[48]
|
Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter
|
|
2020 |
|
|
[49]
|
Information security in modern society: Sociocultural aspects
|
|
2020 |
|
|
[50]
|
A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications
|
|
2020 |
|
|
[51]
|
Determining Factors of Cloud Computing Adoption: A Study of Indonesian Local Government Employees
|
|
2020 |
|
|
[52]
|
Secure Software Development Techniques and Challenges in their Practical Application
|
|
2020 |
|
|
[53]
|
Secure software design and development: towards practical models for implementing information security into the requirements engineering process
|
|
2020 |
|
|
[54]
|
A Fuzzy-AHP based prioritization of trust criteria in fog computing services
|
|
2020 |
|
|
[55]
|
Information Security in the Design of Web-Based Software Systems
|
|
2020 |
|
|
[56]
|
Enhancing Security of Information Systems in Tanzania: the Case of Education Sector
|
|
2020 |
|
|
[57]
|
An Effective Data Privacy Model for Cloud Environment
|
|
2020 |
|
|
[58]
|
JamaicaEye: What Does Cybersecurity Look Like In One Of The Most Recently Developed CCTV Networks?
|
|
2019 |
|
|
[59]
|
Analysis of Password and Salt Combination Scheme To Improve Hash Algorithm Security
|
|
2019 |
|
|
[60]
|
INFORMATION SECURITY
|
|
Knowledge Librarian,
2019 |
|
|
[61]
|
Blockchain-Based Open Data: An Approach for Resolving Data Integrity and Transparency
|
|
2019 |
|
|
[62]
|
JamaicaEye: What does cyber security look like in one of the most recently developed CCTV networks?
|
|
2019 |
|
|
[63]
|
Framework para Gestão de Dispositivos Móveis: módulo inventário
|
|
2019 |
|
|
[64]
|
Research on the Impact of Attacks on Security Characteristics
|
|
2019 |
|
|
[65]
|
Website Security Analysis of Department and Integrated Services One Door of XYZ Regency using Kali Linux
|
|
2019 |
|
|
[66]
|
Siber riskler karşısında KOBİ'lerin bilgi güvenliği farkındalıklarını ölçen bir ölçek geliştirme: Gaziantep örneklemi
|
|
2018 |
|
|
[67]
|
PERANCANGAN DAN PENGIMPLEMENTASIAN SISTEM INFORMASI PELAYANAN JASA KESEHATAN PADA PT. PATHLAB INDONESIA
|
|
2018 |
|
|
[68]
|
Curating Research Data-Cyber security perspective from a nascent Brain Machine Interface Laboratory
|
|
2018 |
|
|
[69]
|
Data Security Implementations in Cloud Computing: A Critical Review
|
|
2018 |
|
|
[70]
|
Oliveira
|
|
2018 |
|
|
[71]
|
Investigating the denial of service attack: A major threat to internet and the security of information
|
|
JK Research Journal in Mathematics and Computer Sciences,
2018 |
|
|
[72]
|
Waw (we are watching) smart app: accommodating social perception towards public officers' performance
|
|
Journal of Physics: Conference Series,
2018 |
|
|
[73]
|
A Survey Paper of Distributed Denial-of-Service Attack in Software Defined Networking (SDN)
|
|
International Journal of Applied Engineering Research [IJAER],
2018 |
|
|
[74]
|
Defining Network Exposure Metrics in Security Risk Scoring Models
|
|
2018 |
|
|
[75]
|
Management Functions of Information System Components as an Integration Model
|
|
Management of Information Systems,
2018 |
|
|
[76]
|
Classification of Data to Enhance Data Security in Cloud Computing
|
|
2018 |
|
|
[77]
|
Component based metric for evaluating availability of an information system: an empirical evaluation
|
|
International Journal of Information Technology,
2018 |
|
|
[78]
|
Analisis Kesuksesan Aplikasi Mobile Pemesanan Tiket Bioskop M-Tix Cinema 21 Berdasarkan Perspektif Pengguna di Kota Malang Menggunakan …
|
|
2018 |
|
|
[79]
|
Metric for evaluating availability of an information system: a quantitative approach based on component dependency
|
|
International Journal of Network Security & …,
2017 |
|
|
[80]
|
Quality of experience in eVoting systems: a case study of the Namibian System
|
|
2017 |
|
|
[81]
|
METRIC FOR EVALUATING AVAILABILITY OF AN INFORMATION SYSTEM: AQuantitative APPROACH BASED ON COMPONENT DEPENDENCY
|
|
International Journal of Network Security & Its Applications,
2017 |
|
|
[82]
|
Proposed model for e-exam availability in WLAN environment
|
|
2016 |
|
|
[83]
|
ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ
|
|
2014 |
|
|
[84]
|
О МЕТРИКЕ ДОСТУПНОСТИ ДЛЯ ПРОМЫШЛЕННЫХ СИСТЕМ УПРАВЛЕНИЯ
|
|
|
|
|