information security

Explore academic connections and research related to this keyword

267
Views
21
Total Connections

Related Articles & Bibliographies

1
Accurate Approach Towards Efficiency of Searching Agents in Digital Libraries Using Keywords.
Vijayalakshmi Yellepeddi, ;Manimegalai P, ;Sasidhar Babu Suvanam, ;
2019 Journal of medical systems DOI: 10.1007/s10916-019-1... 184 views
2
Violent paroxysmal activity drives self-feeding magma replenishment at Mt. Etna.
Viccaro, Marco;Giuffrida, Marisa;Zuccarello, Francesco;Scandura, Mariabenedetta;Palano, Mimmo;Gresta...
2019 Scientific reports DOI: 10.1038/s41598-019-4... 154 views
3
Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain
Anum Nawaz;Jorge Peña Queralta;Jixin Guan;Muhammad Awais;Tuan Nguyen Gia;Ali Kashif Bashir;Haibin...
2020 sensors DOI: 10.3390/s20143965 297 views
4
Continuous Quantitative Risk Management in Smart Grids Using Attack Defense Trees.
Rios, Erkuden;Rego, Angel;Iturbe, Eider;Higuero, Marivi;Larrucea, Xabier;
2020 sensors DOI: E4404 213 views
5
information security incident management practical aspects
;A. B. Kostina
2010 European journal of pharmacology 84 views
6
reputation risks through information security incidents
;Vitaly Eduardovich Dorokhov
2014 European journal of pharmacology 123 views
7
using saml for attribution, delegation and least privilege
;Coimbatore S. Chandersekaran;William R. Simpson
2011 gastric cancer : official journal of the internati... 254 views
8
inefficiency of ids static anomaly detectors in real-world networks
;Edward Guillen;Jeisson Sánchez;Rafael Paez
2015 journal of polymer materials DOI: 10.3390/fi7020094 233 views
9
pengembangan metode pengamanan data menggunakan teknik interpolasi antar piksel dan reduced difference expansion
;Lidya Amalia Rahmania;Tohari Ahmad
2017 proceedings - 2017 13th international conference o... DOI: 10.17529/jre.v13i2.7... 183 views
10
mobile devices and effective information security
;Igor Bernik;Blaž Markelj
2013 wordsworth circle 211 views
11
influence of socially-psychological aspects on maintenance of information security of subjects of information relations
;N. V. Grishina;M. V. Metsatunyan;I. A. Rusetskaya
2012 European journal of pharmacology 112 views
12
information security current problems
;A. A. Malyuk
2010 European journal of pharmacology 151 views
13
using financial instruments to transfer the information security risks
;Pankaj Pandey;Einar Snekkenes
2016 journal of polymer materials DOI: 10.3390/fi8020020 215 views
14
the strategy for the development of information society in serbia by 2020: information security and critical infrastructure
;Danijela D. Protić
2012 materials chemistry and physics DOI: doi:10.5937/vojtehg1... 154 views
15
security information in production and operations: a study on audit trails in database systems
;Rodrigo Roratto;Evandro Dotto Dias
2015 the journal of pain : official journal of the amer... 129 views
16
efficient factual search and requirements of the information security
;Sergey Dmitrievich Kulik
2015 European journal of pharmacology 196 views
17
specific methods of information security for nuclear materials control and accounting automate systems
;Konstantin Vyacheslavovich Ivanov
2013 European journal of pharmacology 107 views
18
dlp-systems: protection from insiders
;Ivan Sergeevich Boridko;Alexander Anatolevich Zabelinskii;Yuriy Ivanovich Kovalenko
2013 European journal of pharmacology 110 views

Related Journals

Scientific reports
ISSN: 2045-2322 4,662 views
sensors
ISSN: 1424-8220 4,422 views
Journal of medical systems
ISSN: 1573-689X 1,260 views

Related Research Groups

No Research Groups Found

No research groups are currently associated with this keyword.