Results 321 to 330 of about 4,301,094 (348)
Some of the next articles are maybe not open access.
Planning and Integrating Deception into Computer Security Defenses
New Security Paradigms Workshop, 2014Mohammed H. Almeshekah, E. Spafford
semanticscholar +1 more source
Computer Security Incident Response Team Development and Evolution
IEEE Security and Privacy, 2014Robin Ruefle+5 more
semanticscholar +1 more source
An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams
IEEE Security and Privacy, 2014T. Chen+5 more
semanticscholar +1 more source
Automated Extraction of Vulnerability Information for Home Computer Security
Foundations and Practice of Security, 2014Sachini S. Weerawardhana+3 more
semanticscholar +1 more source
Advances in optical security systems
Advances in Optics and Photonics, 2014Wen Chen, Bahram Javidi, Xudong Chen
exaly
Computer languages and security
Computer Languages, Systems & Structures, 2002CORTESI, Agostino, FOCARDI, Riccardo
openaire +2 more sources
A Survey on Security and Privacy Issues of Bitcoin
IEEE Communications Surveys and Tutorials, 2018E Sandeep Kumar+2 more
exaly
Conference on Computer and Communications Security, 2013
Tamara Denning+3 more
semanticscholar +1 more source
Tamara Denning+3 more
semanticscholar +1 more source