[1]
|
Biometric system for protecting information and improving service delivery: The case of a developing country's social security and pension organisation
Information Development,
2024
DOI:10.1177/02666669221085709
|
|
|
[2]
|
Product Security: An Overview of Concepts and Challenges
2023 IEEE 21st Jubilee International Symposium on Intelligent Systems and Informatics (SISY),
2023
DOI:10.1109/SISY60376.2023.10417906
|
|
|
[3]
|
The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT
Neurocomputing,
2023
DOI:10.1016/j.neucom.2023.126533
|
|
|
[4]
|
Fraud Prevention, Confidentiality, and Data Security for Modern Businesses
Advances in Information Security, Privacy, and Ethics,
2023
DOI:10.4018/978-1-6684-6581-3.ch001
|
|
|
[5]
|
Research and Innovation Forum 2022
Springer Proceedings in Complexity,
2023
DOI:10.1007/978-3-031-19560-0_3
|
|
|
[6]
|
Business Education Teaching Resources Availability for Academic Staff Job Performance in Universities in South-West and South-South, Nigeria
British Journal of Education, Learning and Development Psychology,
2023
DOI:10.52589/BJELDP-N86GJFWV
|
|
|
[7]
|
The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT
Neurocomputing,
2023
DOI:10.1016/j.neucom.2023.126533
|
|
|
[8]
|
The cybersecurity-related ethical issues of cloud technology and how to avoid them
Proceedings of the 17th International Conference on Availability, Reliability and Security,
2022
DOI:10.1145/3538969.3544456
|
|
|
[9]
|
Bat-Inspired Optimization for Intrusion Detection Using an Ensemble Forecasting Method
Intelligent Automation & Soft Computing,
2022
DOI:10.32604/iasc.2022.024098
|
|
|
[10]
|
The cybersecurity-related ethical issues of cloud technology and how to avoid them
Proceedings of the 17th International Conference on Availability, Reliability and Security,
2022
DOI:10.1145/3538969.3544456
|
|
|
[11]
|
Image Encryption Using Modulated Chaotic Maps
2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT),
2022
DOI:10.1109/ISMSIT56059.2022.9932692
|
|
|
[12]
|
The cybersecurity-related ethical issues of cloud technology and how to avoid them
Proceedings of the 17th International Conference on Availability, Reliability and Security,
2022
DOI:10.1145/3538969.3544456
|
|
|
[13]
|
Biometric system for protecting information and improving service delivery: The case of a developing country's social security and pension organisation
Information Development,
2022
DOI:10.1177/02666669221085709
|
|
|
[14]
|
Advances in Automation III
Lecture Notes in Electrical Engineering,
2022
DOI:10.1007/978-3-030-94202-1_43
|
|
|
[15]
|
Analysis of Information Availability for Seismic and Volcanic Monitoring Systems: A Review
Sensors,
2022
DOI:10.3390/s22145186
|
|
|
[16]
|
On Cybersecurity Risk Assessment in Nuclear Power Systems
IFAC-PapersOnLine,
2022
DOI:10.1016/j.ifacol.2022.07.041
|
|
|
[17]
|
On the Availability Property and Its Metric for NPP IACS
2022 15th International Conference Management of large-scale system development (MLSD),
2022
DOI:10.1109/MLSD55143.2022.9934157
|
|
|
[18]
|
ДІЯЛЬНІСТЬ ОРГАНІВ ПУБЛІЧНОЇ ВЛАДИ УКРАЇНИ У ПРОТИДІЇ ЕПІДЕМІЇ COVID-19: ІНФОРМАЦІЙНО-БЕЗПЕКОВИЙ КОНТЕКСТ
Сучасне суспільство: політичні науки, соціологічні науки, культурологічні науки,
2021
DOI:10.34142/24130060.2021.22.1.05
|
|
|
[19]
|
Industrial Control System Availability Assessment with a Metric Based on Delay and Dependency
IFAC-PapersOnLine,
2021
DOI:10.1016/j.ifacol.2021.10.493
|
|
|
[20]
|
The Hierarchical Decision Model of cybersecurity risk assessment
2021 12th National Conference with International Participation (ELECTRONICA),
2021
DOI:10.1109/ELECTRONICA52725.2021.9513722
|
|
|
[21]
|
Big Data in the Metal Processing Value Chain: A Systematic Digitalization Approach under Special Consideration of Standardization and SMEs
Applied Sciences,
2021
DOI:10.3390/app11199021
|
|
|
[22]
|
Private Data Sharing in a Secure Cloud-based Application for Acute Stroke Care
2021 IEEE 34th International Symposium on Computer-Based Medical Systems (CBMS),
2021
DOI:10.1109/CBMS52027.2021.00039
|
|
|
[23]
|
A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications
Symmetry,
2020
DOI:10.3390/sym12030448
|
|
|
[24]
|
Web Services Security and Threats: A Systematic Literature Review
2020 International Conference on ICT for Smart Society (ICISS),
2020
DOI:10.1109/ICISS50791.2020.9307569
|
|
|
[25]
|
Information Security in the Design of Web-Based Software Systems
2020 International Conference Automatics and Informatics (ICAI),
2020
DOI:10.1109/ICAI50593.2020.9311305
|
|
|
[26]
|
Research on the Impact of Attacks on Security Characteristics
2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI),
2019
DOI:10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00262
|
|
|
[27]
|
Component based metric for evaluating availability of an information system: an empirical evaluation
International Journal of Information Technology,
2018
DOI:10.1007/s41870-018-0220-2
|
|
|
[28]
|
Curating Research Data - Cyber security perspective from a nascent Brain Machine Interface Laboratory
2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON),
2018
DOI:10.1109/UEMCON.2018.8796827
|
|
|
[29]
|
Classification of Data to Enhance Data Security in Cloud Computing
2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU),
2018
DOI:10.1109/IoT-SIU.2018.8519934
|
|
|
[30]
|
Data Security Implementations in Cloud Computing: A Critical Review
2018 3rd International Conference on Information Technology Research (ICITR),
2018
DOI:10.1109/ICITR.2018.8736153
|
|
|
[31]
|
Proposed model for e-exam availability in WLAN environment
2016 International Conference on Smart Green Technology in Electrical and Information Systems (ICSGTEIS),
2016
DOI:10.1109/ICSGTEIS.2016.7885772
|
|
|