Results 251 to 260 of about 77,587 (303)
A Cybersecurity NER Method Based on Hard and Easy Labeled Training Data Discrimination. [PDF]
Ye L, Wu Y, Zhang H, Ge M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cyberspace security management
Industrial Management & Data Systems, 1999Through the tremendous growth of Internet users during the last few years, organizations now realize the potential market of the information highway. However, these organizations now face the problem of Internet security. The open environment of the Internet contributes greatly to its success, but also plants inherent security problems.
David C. Chou +3 more
openaire +1 more source
Secure government in cyberspace?
Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times, 2011This panel will focus on the critical current issues facing governments with respect to the management of digital identities in cyberspace.Billions of dollars of government funds continue to be spent on implementing identity management solutions, developing associated policy and legislation and on encouraging the use of online services.
Philip Seltsikas +3 more
openaire +1 more source
Science China Information Sciences, 2015
Along with the rapid development and wide application of information technology, human society is entering the information era. In this era, people live and work in cyberspace, which is a collection of all infor-mation systems, and the information environment for human survival. Therefore, ensuring cyberspace security is necessary.
HuanGuo Zhang +5 more
openaire +1 more source
Along with the rapid development and wide application of information technology, human society is entering the information era. In this era, people live and work in cyberspace, which is a collection of all infor-mation systems, and the information environment for human survival. Therefore, ensuring cyberspace security is necessary.
HuanGuo Zhang +5 more
openaire +1 more source
Introduction: Security in Cyberspace
2014This chapter is the introduction to the volume of the same title.
openaire +3 more sources
Contours of Security in Cyberspace
Maritime Affairs:Journal of the National Maritime Foundation of India, 2012The cyberspace is an intangible medium operating and controlling many aspects of the tangible world. It is a world without barriers therefore artificial barriers have to be erected to prevent free ingress or egress. This is a world still in the nascent stages of its evolution; therefore to stay ahead of the pack we need to be imaginative and innovative.
openaire +1 more source
Cyberspace Security and Cryptography
2018In this chapter, we shall briefly introduce the basic concepts and ideas of cyberspace, cyberspace security, and cryptography, particularly the relationships among them.
openaire +1 more source

