Results 381 to 390 of about 14,130,174 (398)
Some of the next articles are maybe not open access.
Individual differences and Information Security Awareness
Computers in Human Behavior, 2017Agata McCormac+5 more
semanticscholar +1 more source
A Survey on Cyber Security for Smart Grid Communications
IEEE Communications Surveys and Tutorials, 2012David Tipper, Yi Qian
exaly
Information security management needs more holistic approach: A literature review
International Journal of Information Management, 2016Z. Soomro, M. Shah, J. Ahmed
semanticscholar +1 more source
Dispositional and situational factors: influences on information security policy violations
European Journal of Information Systems, 2016Allen C. Johnston+3 more
semanticscholar +1 more source
Global threats to human water security and river biodiversity
Nature, 2010Mark O Gessner+2 more
exaly
Security in Software Defined Networks: A Survey
IEEE Communications Surveys and Tutorials, 2015Andrei Gurtov+2 more
exaly
Network Intrusion Detection for IoT Security Based on Learning Techniques
IEEE Communications Surveys and Tutorials, 2019Nadia Chaabouni+2 more
exaly
Information security policy compliance model in organizations
Computers & security, 2016Nader Sohrabi Safa+2 more
semanticscholar +1 more source