Search

Your search keyword '"COMPUTER security research"' showing total 25 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER security research" Remove constraint Descriptor: "COMPUTER security research" Topic internet security Remove constraint Topic: internet security
25 results on '"COMPUTER security research"'

Search Results

1. Engineering Trustworthy Systems: A Principled Approach to Cybersecurity.

2. Prediction Using Propagation: From Flu Trends to Cybersecurity.

3. Security and Vulnerability Assessment of Social Media Sites: An Exploratory Study.

4. Service security and privacy as a socio-technical problem.

5. Measuring Risk: Computer Security Metrics, Automation, and Learning.

6. Social Life of PKI: Sociotechnical Development of Korean Public-Key Infrastructure.

7. Security and performance challenges for user-centric wireless networking.

8. Cybersecurity Standards: Managing Risk and Creating Resilience.

9. A cyclical evaluation model of information security maturity.

10. TIM Lecture Series Web Infections and Protections: Theory and Practice.

11. Japan's Changing Cybersecurity Landscape.

12. Survey on Cloud Computing Security Policies and Privacy Concerns for Information Security.

13. Method for a Two Dimensional Honeypot to Deter Web Bots in Commerce Systems.

14. Analysis of «incident» definitions and its interpretation in cyberspace.

15. Cyber insecurity as a national threat: overreaction from Germany, France and the UK?

16. Solving identity delegation problem in the e-government environment.

17. An analysis of accuracy experiments carried out over of a multi-faceted model of trust.

18. The Future of Cybersecurity Education.

19. Computer attack trends challenge Internet security.

20. The drivers and inhibitors of cyber security evolution.

21. Events.

22. Rock Stars of Cybersecurity House Advertisement.

23. Wide Disparity Between Consumer, IT Pro Views of IoT Security.

24. Google: Software Updates Are The 'Seatbelts Of Online Security' And Many Don't Buckle Up.

25. Strengthening CAPTCHA-based Web security.

Catalog

Books, media, physical & digital resources