Results 21 to 30 of about 4,301,094 (348)

Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda

open access: yesJournal of Innovation Information Technology and Application, 2022
The study aimed at exploring the critical enablers to the development and usage of information security governance frameworks for cloud computing in Uganda.
Fredrick Kanobe   +2 more
doaj   +1 more source

Human Factors in Security – Cybersecurity Education and Awareness of Business Students

open access: yesAnnales Universitatis Mariae Curie-Skłodowska Sectio H, Oeconomia, 2022
Theoretical background: The rapid development of Internet interactions and a growing number of information technology users caused by digital society development and accelerated by the COVID-19 pandemic yield the significant growth of cyber-attacks and ...
Łukasz Wiechetek, Marek Mędrek
doaj   +1 more source

A Review of Computer Vision Methods in Network Security [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2020
Network security has become an area of significant importance more than ever as highlighted by the eye-opening numbers of data breaches, attacks on critical infrastructure, and malware/ransomware/cryptojacker attacks that are reported almost every day ...
Jiawei Zhao   +2 more
semanticscholar   +1 more source

A Study on the Design and Application of Fictional Storytelling in Online Learning of Computer Security

open access: yesApplied Sciences, 2021
Computer security is an important part of the computer science (CS) curriculum in all kinds of universities. Although the educational approach tends to be highly technical and practical, it cannot be avoided that some understanding and memorizing of the ...
Joan Arnedo-Moreno, Victor Garcia-Font
doaj   +1 more source

Measurements and Correctness Criteria for Determining the Line Length of the Data Image Obtained in the Process of Electromagnetic Infiltration

open access: yesApplied Sciences, 2022
The protection of information against electromagnetic penetration is one of the most important aspects related to the protection of information against its non-invasive acquisition. Compared to the activities of cybercriminals, the use of electromagnetic
Ireneusz Kubiak, Artur Przybysz
doaj   +1 more source

Delta system transfer function model for IEMI time domain test [PDF]

open access: yesITM Web of Conferences, 2022
Intentional electromagnetic interference (IEMI) is a serious threat to the stable operation of computer and other intelligent terminal equipment. For testing research on IEMI, it is very important to build a stable and reliable test system model for ...
Ma Rupo   +3 more
doaj   +1 more source

"Is my phone hacked?" Analyzing Clinical Computer Security Interventions with Survivors of Intimate Partner Violence

open access: yesProc. ACM Hum. Comput. Interact., 2019
Intimate partner abusers use technology to track, monitor, harass, and otherwise harm their victims, and prior work reports that victims have few resources for obtaining help with such attacks.
D. Freed   +6 more
semanticscholar   +1 more source

Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities [PDF]

open access: yesProceedings of the IEEE, 2020
Approximate computing is an advanced computational technique that trades the accuracy of computation results for better utilization of system resources. It has emerged as a new preferable paradigm over traditional computing architectures for many applications where inaccurate results are acceptable.
Weiqiang Liu   +5 more
openaire   +4 more sources

Constructing a Macro Virus to Upgrading Antivirus Programs [PDF]

open access: yesEngineering and Technology Journal, 2011
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. a macro virus is a virus that is written in a macro language, a language built into a software application such as a Word processor,
Wesam S. Bhaya, Alaa Abd Alhesain
doaj   +1 more source

Computer and Network Security [PDF]

open access: yes, 2020
175 pages, 87 figures and 44 ...
Sen, Jaydip   +16 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy