Search
Search Results
-
The rise of “security and privacy”: bibliometric analysis of computer privacy research
The study of security and computer privacy has become a significant focus in security and privacy research. To reflect a website's, service's, or...
-
Computer Network Security Fundamentals
In this chapter, we give a general definition of the state of security in any environment and then localize this security concept in a computer... -
Computer security incident response teams: are they legally regulated? The Swiss example
Computer Security Incident Response Teams (CSIRTs) or Computer Emergency Response Teams (CERTs) are an integral part of incident handling...
-
Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture
AbstractThe article analyzes information security strategies, such as a strategic cooperative game of chicken, balancing business incentives and...
-
Computer Network Security Protocols
The rapid growth of the Internet and corresponding Internet community has fueled the rapid growth of both individual and business communications... -
Standardization and Security Criteria: Security Evaluation of Computer Products
Our growing dependence on technology and the corresponding skyrocketing security problems arising from it have all created a high demand for... -
Artificial Intelligence Technology in Computer Network Security
Currently, computer networks are evolving in an extensive and highly distributed direction, Data centers based on traditional networks are gradually... -
Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...
-
Scripting and Security in Computer Networks and Web Browsers
The automation and dynamic growth of an interactive web have created a huge demand for a new type of web programming to meet the growing demand of... -
Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part IV
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...
-
Guide to Computer Network Security
This timely textbook presents a comprehensive guide to the core topics in computing and information security and assurance realms, going beyond the...
-
Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...
-
Computer Security – ESORICS 2023 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part III
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS...
-
Analyze quantum security in software design using fuzzy-AHP
Quantum Security is a conceptual phenomenon of security that uses the quantum mechanical concept in computing. Superposition and entanglement are the...
-
International journal of information security: a bibliometric study, 2007–2023
This study employs various bibliometric analysis techniques to examine the intellectual structure of the International Journal of Information...
-
Security to text (S2T): multi-layered based security approaches for secret text content
In the digital world, text data is produced in an unstructured manner across various communication channels. Extracting valuable information from...
-
Unboxing fog security: a review of fog security and authentication mechanisms
Due to the massive advancement of the Internet of Things in our day-to-day lives, there is a strong need to bring connectivity to a very accessible...
-
Research on Computer Network Information Security Protection Strategy and Evaluation Algorithm Education
Computer network information security management is an important problem to be solved in China. The effective protection of computer network... -
A blockchain-based security system with light cryptography for user authentication security
Nowadays, the Internet of Things (IoT) enables the creation of a wide range of new services, including smart cities, agriculture, energy, technology,...
-
Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities
In today’s intricate information technology landscape, the escalating complexity of computer networks is accompanied by a myriad of malicious threats...