Results 351 to 360 of about 14,130,174 (398)
Some of the next articles are maybe not open access.

Designing Information Security

2015
Previous chapters have emphasized that criminals and spies concentrate on financial account information, trade secrets, and internal organization data. This chapter is all about protecting information assets via the three goals of security, CIA: confidentiality, integrity, and availability.
openaire   +2 more sources

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

IEEE Communications Surveys and Tutorials, 2021
Bo-chao Cheng   +2 more
exaly  

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

IEEE Communications Surveys and Tutorials, 2020
Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly  

A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G

IEEE Communications Surveys and Tutorials, 2022
Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly  

The Theory of Planned Behavior and Information Security Policy Compliance

Journal of Computational Information Systems, 2019
Teodor Sommestad   +2 more
semanticscholar   +1 more source

Machine Learning in IoT Security: Current Solutions and Future Challenges

IEEE Communications Surveys and Tutorials, 2020
Ekram Hossain   +2 more
exaly  

A Survey on Metaverse: Fundamentals, Security, and Privacy

IEEE Communications Surveys and Tutorials, 2023
Yuntao Wang, Zhou Su, Xiaofeng Tao
exaly  

Home - About - Disclaimer - Privacy