1,518 results on '"Information security"'
Search Results
2. Information Security in Small Public Sector Organizations: Design and Evaluation of Procedural Approach
3. Application of Network Security Technology in the Operation Information System of Digital Economy
4. The Right to Science
5. Human Rights-Compatible Information Security Cycle Governance
6. Summary and Conclusion
7. Introduction
8. The Technological and Societal Landscape
9. Trust and Security in a Cloud Environment
10. Information Security and Cloud Computing
11. Analysis of Network Traffic Parameters to Detect DDOS-Attacks Based on Machine Learning Methods
12. General Model for Assessing the Quality of Socially Significant Activities as a Part of Information Security Management
13. A Verbal Model of the Process of Assessing the Level of Trust in the Subject of Information Exchange
14. Law Firm Cybersecurity
15. Overcoming the Fear of Missing Out on Data
16. Differential Quality Game for Assessing the Financial Resources of Parties During an APT Attack
17. Stochastic Orthogonal Code Generator for a Perspective Cognitive Radio System
18. Analysing Information Security Risks When Remotely Connecting to the Web Interface
19. Incident Management System Modeling Issues
20. Forecasting the Development of Information Security Events in the Context of Information Warfare
21. Technology for Assessing the Readiness of Information Security Specialists in the System of Continuing Education Using Game Approaches
22. Biometric Two-Factor Authentication Method Using Liveliness Detection with Human Presence Indicators
23. Research of Dynamic Fuzzing Methods to Identify Vulnerabilities in Program Code
24. Safety of Unmanned Systems
25. Using User Profiles for Dynamic Correction of Phishing Attack Response Scenarios
26. Comparative Analysis of Methods for Assessing Confidence in the Information Security Audit Process
27. Dependability of Embedded Systems in the Industrial Internet of Things: Information Security and Reliability of the Communication Cluster
28. Navigating Cloud Security: Developing Privacy-Aware Architectures for Service Industry Data Protection
29. Importance of Cybersecurity Education to Reduce Risks in Academic Institutions
30. Contemporary Strategies for Advancing Cybersecurity in Maritime Cargo Transportation
31. Cybersecurity Challenges and Opportunities in Education 4.0
32. Systematic Review of Cybersecurity Disclosure Research
33. Advancements and Perspectives in Digital Image Watermarking
34. The Access Control Technology of Domestic Gateway in Nuclear Safety-Level DCS System
35. Research and Design of Embedded Trusted Computing in Domestic IE-DCS
36. Analysis of an Existing Method for Detecting Adversarial Attacks on Deep Neural Networks
37. Colorimetric Selection, User Authentication, Identification and Access Control at Agricultural Enterprises
38. Information Security in the Zimbabwean Hotel Sector
39. Identity Authentication Methods Based on User Profiling
40. Intrusion Detection System Based on ViTCycleGAN and Rules
41. Construction of information security literacy evaluation model for College students based on Analytic Hierarchy Process
42. Application of the Negative Selection Algorithm to Detect Distributed Denial of Service Attacks
43. Intelligent Computing Making Access Control More Secure: From Cipher to Trust
44. Color Image Steganography Based on Two-Channel Preprocessing and U-Net Network
45. A Fuzz Testing Method for Information Security of Intelligent Connected Vehicles
46. Deep Learning-Based Attribute Graph Clustering: An Overview
47. Information Security in the Context of Education
48. Protection of Trade Secrets to Ensure the Economic Security of the Enterprise
49. Secured Encryption Technique in S-Box Using Fermat Encoding
50. Coverless Steganography: A Comprehensive Study on Concealing Data Without a Cover Medium
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.