We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. The rise of “security and privacy”: bibliometric analysis of computer privacy research

    The study of security and computer privacy has become a significant focus in security and privacy research. To reflect a website's, service's, or...

    Auwal Shehu Ali, Zarul Fitri Zaaba, Manmeet Mahinderjit Singh in International Journal of Information Security
    Article 31 October 2023
  2. Computer Network Security Fundamentals

    In this chapter, we give a general definition of the state of security in any environment and then localize this security concept in a computer...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  3. Computer security incident response teams: are they legally regulated? The Swiss example

    Computer Security Incident Response Teams (CSIRTs) or Computer Emergency Response Teams (CERTs) are an integral part of incident handling...

    Pauline Meyer, Sylvain Métille in International Cybersecurity Law Review
    Article Open access 08 November 2022
  4. Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture

    Abstract

    The article analyzes information security strategies, such as a strategic cooperative game of chicken, balancing business incentives and...

    V. N. Ruchkin, B. V. Kostrov, V. A. Fulin in Automatic Control and Computer Sciences
    Article 01 December 2022
  5. Computer Network Security Protocols

    The rapid growth of the Internet and corresponding Internet community has fueled the rapid growth of both individual and business communications...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  6. Standardization and Security Criteria: Security Evaluation of Computer Products

    Our growing dependence on technology and the corresponding skyrocketing security problems arising from it have all created a high demand for...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  7. Artificial Intelligence Technology in Computer Network Security

    Currently, computer networks are evolving in an extensive and highly distributed direction, Data centers based on traditional networks are gradually...
    Conference paper 2023
  8. Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I

    The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...

    Gene Tsudik, Mauro Conti, ... Georgios Smaragdakis in Lecture Notes in Computer Science
    Conference proceedings 2024
  9. Scripting and Security in Computer Networks and Web Browsers

    The automation and dynamic growth of an interactive web have created a huge demand for a new type of web programming to meet the growing demand of...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  10. Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part IV

    The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...

    Gene Tsudik, Mauro Conti, ... Georgios Smaragdakis in Lecture Notes in Computer Science
    Conference proceedings 2024
  11. Guide to Computer Network Security

    This timely textbook presents a comprehensive guide to the core topics in computing and information security and assurance realms, going beyond the...

    Joseph Migga Kizza in Texts in Computer Science
    Textbook 2024
  12. Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II

    The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...

    Gene Tsudik, Mauro Conti, ... Georgios Smaragdakis in Lecture Notes in Computer Science
    Conference proceedings 2024
  13. Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part III

    The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...

    Gene Tsudik, Mauro Conti, ... Georgios Smaragdakis in Lecture Notes in Computer Science
    Conference proceedings 2024
  14. Analyze quantum security in software design using fuzzy-AHP

    Quantum Security is a conceptual phenomenon of security that uses the quantum mechanical concept in computing. Superposition and entanglement are the...

    Article 15 June 2024
  15. International journal of information security: a bibliometric study, 2007–2023

    This study employs various bibliometric analysis techniques to examine the intellectual structure of the International Journal of Information...

    Article 25 March 2024
  16. Security to text (S2T): multi-layered based security approaches for secret text content

    In the digital world, text data is produced in an unstructured manner across various communication channels. Extracting valuable information from...

    Shamal Kashid, Lalit K. Awasthi, Krishan Berwal in Multimedia Tools and Applications
    Article 19 June 2024
  17. Unboxing fog security: a review of fog security and authentication mechanisms

    Due to the massive advancement of the Internet of Things in our day-to-day lives, there is a strong need to bring connectivity to a very accessible...

    Neha Kaliya, Digambar Pawar in Computing
    Article 15 August 2023
  18. Research on Computer Network Information Security Protection Strategy and Evaluation Algorithm Education

    Computer network information security management is an important problem to be solved in China. The effective protection of computer network...
    Conference paper 2023
  19. A blockchain-based security system with light cryptography for user authentication security

    Nowadays, the Internet of Things (IoT) enables the creation of a wide range of new services, including smart cities, agriculture, energy, technology,...

    Imen Hagui, Amina Msolli, ... Fredj Hassen in Multimedia Tools and Applications
    Article 13 November 2023
  20. Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities

    In today’s intricate information technology landscape, the escalating complexity of computer networks is accompanied by a myriad of malicious threats...

    Ahmed Mohamed Ahmed, Thanh Thi Nguyen, ... Sunil Aryal in Neural Computing and Applications
    Article 07 May 2024
Did you find what you were looking for? Share feedback.