Results 141 to 150 of about 373,921 (174)
Some of the next articles are maybe not open access.

Information security risk management planning: A case study at application module of state asset directorate general of state asset ministry of finance

International Conference on Advanced Computer Science and Information System, 2014
S. Prasetyo, Y. G. Sucahyo
semanticscholar   +1 more source

A Survey on Metaverse: Fundamentals, Security, and Privacy

IEEE Communications Surveys and Tutorials, 2023
Yuntao Wang, Zhou, Ning Zhang
exaly  

Security: The Dark Side of Approximate Computing?

2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2018
F. Regazzoni, C. Alippi, I. Polian
semanticscholar   +1 more source

Wachet auf! Computer security and the millennium

Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), 1998
F. C. Smith, D. Bailey
semanticscholar   +1 more source

Information security management and the human aspect in organizations

Information and Computer Security, 2017
H. Stewart, J. Jürjens
semanticscholar   +1 more source

Security system against asset theft by using Radio Frequency Identification Technology

International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, 2008
Nakrop Jinaporn   +3 more
semanticscholar   +1 more source

Data Security and Privacy: Concepts, Approaches, and Research Directions

Annual International Computer Software and Applications Conference, 2016
E. Bertino
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy