Results 321 to 330 of about 4,301,094 (348)
Some of the next articles are maybe not open access.

Planning and Integrating Deception into Computer Security Defenses

New Security Paradigms Workshop, 2014
Mohammed H. Almeshekah, E. Spafford
semanticscholar   +1 more source

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

IEEE Communications Surveys and Tutorials, 2020
Rabia Khan   +2 more
exaly  

Computer Security Incident Response Team Development and Evolution

IEEE Security and Privacy, 2014
Robin Ruefle   +5 more
semanticscholar   +1 more source

An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams

IEEE Security and Privacy, 2014
T. Chen   +5 more
semanticscholar   +1 more source

A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities

IEEE Communications Surveys and Tutorials, 2020
Michele De Donno   +2 more
exaly  

Automated Extraction of Vulnerability Information for Home Computer Security

Foundations and Practice of Security, 2014
Sachini S. Weerawardhana   +3 more
semanticscholar   +1 more source

Advances in optical security systems

Advances in Optics and Photonics, 2014
Wen Chen, Bahram Javidi, Xudong Chen
exaly  

Computer languages and security

Computer Languages, Systems & Structures, 2002
CORTESI, Agostino, FOCARDI, Riccardo
openaire   +2 more sources

A Survey on Security and Privacy Issues of Bitcoin

IEEE Communications Surveys and Tutorials, 2018
E Sandeep Kumar   +2 more
exaly  

Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education

Conference on Computer and Communications Security, 2013
Tamara Denning   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy