112 results on '"CISO"'
Search Results
2. A 55-nm, 0.86-Volt operation, 125MHz high speed, 75uA/MHz low power, wide voltage supply range 2M-bit split-gate embedded Flash.
3. Secure System Development for Integrated Cloud Applications.
4. Case Study on "Prita Mulyasari" and "Twin Hackers" in Indonesia.
5. 4-Port isolated MOS modeling and extraction for mmW applications.
6. An Analysis of the Impact of Bus Contention on the WCET in Multicores.
7. Visualizing information on a sphere.
8. Substrate-integrated waveguide transitions to planar transmission-line technologies.
9. Notch-band UWB bandpass filter using slot-embedded short-circuited stub.
10. Intelligent CMOS control of RF MEMS capacitive switches.
11. A Framework for Designing a Security Operations Centre (SOC).
12. 1D thermal modelling of PMSM intended for an electric vehicle's powertrain.
13. Real-time emotions recognition system.
14. Software defined network as solution to overcome security challenges in IoT.
15. Staffing policy for information security maintenance tasks solution.
16. Building an effective and efficient continuous web application security program.
17. Protection of Secrets by File Access Control with Common Key Cipher and Message Digests of Program Files.
18. A consolidated approach for estimation of data security breach costs.
19. Two PMSMs and the influence of their geometry on common-mode bearing currents.
20. An initial insight into information security risk assessment practices.
21. Predictive current control of back-to-back converter.
22. Coercive, Normative, and Mimetic Influences on the Assimilation of BCM in Outsourcing Relationships.
23. Extensive analysis on wireless power transformer for various core configurations.
24. Palestinian Arabic regional accent recognition.
25. Evaluation maturity index and risk management for it governance using Fuzzy AHP and Fuzzy TOPSIS (case Study Bank XYZ).
26. High insulation voltage gate-driver applied to a solid state transformer.
27. Load-based cell association for load balancing in heterogeneous cellular networks.
28. On the architectures of RF based underwater wireless sensor networks for intruder detection.
29. Cyber security password policy for industrial control networks.
30. A high speed algorithm for identifying hand gestures for an ATM input system for the blind.
31. A novel automatic low cost cutting machine-cum-3D printer using an image processing based control.
32. An IoT Protocol and Framework for OEMs to Make IoT-Enabled Devices forward Compatible.
33. Hybrid intelligent access control framework to protect data privacy and theft.
34. Protecting data in personal cloud storage with security classifications.
35. Data security and threat modeling for smart city infrastructure.
36. Independent Security Testing on Agile Software Development: A Case Study in a Software Company.
37. Comparison of different inverter-fed AC motor types regarding common-mode bearing currents.
38. Organisations Capability and Aptitude towards IT Security Governance.
39. A Policy-Based Security Framework for Storage and Computation on Enterprise Data in the Cloud.
40. Genre-Based Assessment of Information and Knowledge Security Risks.
41. Analytical Hierarchy Process Approach for the Metrics of Information Security Management Framework.
42. A comparative study between two structures of hybrid photovoltaic/thermal (PV/T) collectors for water pumping systems.
43. An optimized secured service selection under mobile adhoc networks.
44. Quality Matters: Systematizing Quality Deficiencies in the Documentation of Business Security Requirements.
45. Program.
46. MAVEN information security governance, risk management, and compliance (GRC): Lessons learned.
47. Exploiting Social Networks for the Prediction of Social and Civil Unrest: A Cloud Based Framework.
48. Yikes! Are plant control and power assets safe from cyber-attacks?
49. A Ziv-Zakaï type bound for hybrid parameter estimation.
50. Combatting phishing: A holistic human approach.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.