Results 301 to 310 of about 2,067,027 (330)
Some of the next articles are maybe not open access.
Teaching information security management: reflections and experiences
Information Management & Computer Security, 2014Purpose – The purpose of this paper is to describe the development, design, delivery and evaluation of a postgraduate information security subject that focuses on a managerial, rather than the more frequently reported technical perspective.
Atif Ahmad, S. Maynard
semanticscholar +1 more source
Expert systems for information security management and audit. Implementation phase issues
2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS), 2014Auditing of information security constitutes a key part of security operations taken inside organizations. Often information security problems must be addressed as quickly as possible.
Maksat Kanatov+2 more
semanticscholar +1 more source
Information security management needs more holistic approach: A literature review
International Journal of Information Management, 2016Z. A. Soomro, M. Shah, J. Ahmed
semanticscholar +1 more source
Information Security Management Systems - A Maturity Model Based on ISO/IEC 27001
Business Information Systems, 2018D. Proença, J. Borbinha
semanticscholar +1 more source
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Bo-chao Cheng+2 more
exaly
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
IEEE Communications Surveys and Tutorials, 2020Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly
A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G
IEEE Communications Surveys and Tutorials, 2022Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly
Machine Learning in IoT Security: Current Solutions and Future Challenges
IEEE Communications Surveys and Tutorials, 2020Ekram Hossain+2 more
exaly