Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Computational issues in secure interoperationGONG, L ; QIAN, XIEEE transactions on software engineering, 1996-01, Vol.22 (1), p.43-52 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
|
2 |
Material Type: Artigo
|
Employees’ adherence to information security policies: An exploratory field studySiponen, Mikko ; Adam Mahmood, M. ; Pahnila, SeppoInformation & management, 2014-03, Vol.51 (2), p.217-224 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
3 |
Material Type: Artigo
|
Security of the Internet of Things: perspectives and challengesJing, Qi ; Vasilakos, Athanasios V. ; Wan, Jiafu ; Lu, Jingwei ; Qiu, DechaoWireless networks, 2014-11, Vol.20 (8), p.2481-2501 [Periódico revisado por pares]Boston: Springer USTexto completo disponível |
|
4 |
Material Type: Artigo
|
From information security to cyber securityvon Solms, Rossouw ; van Niekerk, JohanComputers & security, 2013-10, Vol.38, p.97-102 [Periódico revisado por pares]Amsterdam: Elsevier LtdTexto completo disponível |
|
5 |
Material Type: Artigo
|
Future directions for behavioral information security researchCrossler, Robert E. ; Johnston, Allen C. ; Lowry, Paul Benjamin ; Hu, Qing ; Warkentin, Merrill ; Baskerville, RichardComputers & security, 2013-02, Vol.32, p.90-101 [Periódico revisado por pares]Amsterdam: Elsevier LtdTexto completo disponível |
|
6 |
Material Type: Artigo
|
Security Challenges for the Public CloudRen, Kui ; Wang, Cong ; Wang, QianIEEE internet computing, 2012-01, Vol.16 (1), p.69-73 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
|
7 |
Material Type: Artigo
|
Game theory meets network security and privacyManshaei, Mohammad ; Zhu, Quanyan ; Alpcan, Tansu ; Bacşar, Tamer ; Hubaux, Jean-PierreACM computing surveys, 2013-06, Vol.45 (3), p.1-39 [Periódico revisado por pares]New York, NY: ACMTexto completo disponível |
|
8 |
Material Type: Artigo
|
Wireless Information-Theoretic SecurityBloch, M. ; Barros, J. ; Rodrigues, M.R.D. ; McLaughlin, S.W.IEEE transactions on information theory, 2008-06, Vol.54 (6), p.2515-2534 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
|
9 |
Material Type: Artigo
|
Closeness: A New Privacy Measure for Data PublishingNinghui Li ; Tiancheng Li ; Venkatasubramanian, SureshIEEE transactions on knowledge and data engineering, 2010-07, Vol.22 (7), p.943-956 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
|
10 |
Material Type: Artigo
|
Security of interdependent and identical networked control systemsAmin, Saurabh ; Schwartz, Galina A. ; Shankar Sastry, S.Automatica (Oxford), 2013-01, Vol.49 (1), p.186-192 [Periódico revisado por pares]Kidlington: Elsevier LtdTexto completo disponível |