Search

Your search keyword '"Information security"' showing total 1,518 results

Search Constraints

Start Over You searched for: Descriptor "Information security" Remove constraint Descriptor: "Information security" Publication Type eBooks Remove constraint Publication Type: eBooks
1,518 results on '"Information security"'

Search Results

2. Information Security in Small Public Sector Organizations: Design and Evaluation of Procedural Approach

3. Application of Network Security Technology in the Operation Information System of Digital Economy

4. The Right to Science

5. Human Rights-Compatible Information Security Cycle Governance

6. Summary and Conclusion

7. Introduction

8. The Technological and Societal Landscape

11. Analysis of Network Traffic Parameters to Detect DDOS-Attacks Based on Machine Learning Methods

12. General Model for Assessing the Quality of Socially Significant Activities as a Part of Information Security Management

13. A Verbal Model of the Process of Assessing the Level of Trust in the Subject of Information Exchange

15. Overcoming the Fear of Missing Out on Data

16. Differential Quality Game for Assessing the Financial Resources of Parties During an APT Attack

17. Stochastic Orthogonal Code Generator for a Perspective Cognitive Radio System

18. Analysing Information Security Risks When Remotely Connecting to the Web Interface

19. Incident Management System Modeling Issues

20. Forecasting the Development of Information Security Events in the Context of Information Warfare

21. Technology for Assessing the Readiness of Information Security Specialists in the System of Continuing Education Using Game Approaches

22. Biometric Two-Factor Authentication Method Using Liveliness Detection with Human Presence Indicators

23. Research of Dynamic Fuzzing Methods to Identify Vulnerabilities in Program Code

24. Safety of Unmanned Systems

25. Using User Profiles for Dynamic Correction of Phishing Attack Response Scenarios

26. Comparative Analysis of Methods for Assessing Confidence in the Information Security Audit Process

28. Navigating Cloud Security: Developing Privacy-Aware Architectures for Service Industry Data Protection

30. Contemporary Strategies for Advancing Cybersecurity in Maritime Cargo Transportation

31. Cybersecurity Challenges and Opportunities in Education 4.0

32. Systematic Review of Cybersecurity Disclosure Research

33. Advancements and Perspectives in Digital Image Watermarking

34. The Access Control Technology of Domestic Gateway in Nuclear Safety-Level DCS System

35. Research and Design of Embedded Trusted Computing in Domestic IE-DCS

36. Analysis of an Existing Method for Detecting Adversarial Attacks on Deep Neural Networks

37. Colorimetric Selection, User Authentication, Identification and Access Control at Agricultural Enterprises

39. Identity Authentication Methods Based on User Profiling

40. Intrusion Detection System Based on ViTCycleGAN and Rules

41. Construction of information security literacy evaluation model for College students based on Analytic Hierarchy Process

42. Application of the Negative Selection Algorithm to Detect Distributed Denial of Service Attacks

43. Intelligent Computing Making Access Control More Secure: From Cipher to Trust

47. Information Security in the Context of Education

48. Protection of Trade Secrets to Ensure the Economic Security of the Enterprise

49. Secured Encryption Technique in S-Box Using Fermat Encoding

50. Coverless Steganography: A Comprehensive Study on Concealing Data Without a Cover Medium

Catalog

Books, media, physical & digital resources