Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
From information security to cyber securityvon Solms, Rossouw ; van Niekerk, JohanComputers & security, 2013-10, Vol.38, p.97-102 [Periódico revisado por pares]Amsterdam: Elsevier LtdTexto completo disponível |
|
2 |
Material Type: Artigo
|
Employees’ adherence to information security policies: An exploratory field studySiponen, Mikko ; Adam Mahmood, M. ; Pahnila, SeppoInformation & management, 2014-03, Vol.51 (2), p.217-224 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
3 |
Material Type: Artigo
|
Security of the Internet of Things: perspectives and challengesJing, Qi ; Vasilakos, Athanasios V. ; Wan, Jiafu ; Lu, Jingwei ; Qiu, DechaoWireless networks, 2014-11, Vol.20 (8), p.2481-2501 [Periódico revisado por pares]Boston: Springer USTexto completo disponível |
|
4 |
Material Type: Artigo
|
Game theory meets network security and privacyManshaei, Mohammad ; Zhu, Quanyan ; Alpcan, Tansu ; Bacşar, Tamer ; Hubaux, Jean-PierreACM computing surveys, 2013-06, Vol.45 (3), p.1-39 [Periódico revisado por pares]New York, NY: ACMTexto completo disponível |
|
5 |
Material Type: Artigo
|
Motivating IS security compliance: Insights from Habit and Protection Motivation TheoryVance, Anthony ; Siponen, Mikko ; Pahnila, SeppoInformation & management, 2012-05, Vol.49 (3-4), p.190-198 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
6 |
Material Type: Artigo
|
Cyber security in the Smart Grid: Survey and challengesWang, Wenye ; Lu, ZhuoComputer networks (Amsterdam, Netherlands : 1999), 2013-04, Vol.57 (5), p.1344-1371 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
7 |
Material Type: Artigo
|
Future directions for behavioral information security researchCrossler, Robert E. ; Johnston, Allen C. ; Lowry, Paul Benjamin ; Hu, Qing ; Warkentin, Merrill ; Baskerville, RichardComputers & security, 2013-02, Vol.32, p.90-101 [Periódico revisado por pares]Amsterdam: Elsevier LtdTexto completo disponível |
|
8 |
Material Type: Artigo
|
A novel hybrid intrusion detection method integrating anomaly detection with misuse detectionKim, Gisung ; Lee, Seungmin ; Kim, SehunExpert systems with applications, 2014-03, Vol.41 (4), p.1690-1700 [Periódico revisado por pares]Amsterdam: Elsevier LtdTexto completo disponível |
|
9 |
Material Type: Artigo
|
Cassandra - A Decentralized Structured Storage SystemLAKSHMAN, Avinash ; MALIK, PrashantOperating systems review, 2010-04, Vol.44 (2), p.35-40New York, NY: Association for Computing MachineryTexto completo disponível |
|
10 |
Material Type: Artigo
|
Privacy-preserving data publishing: A survey of recent developmentsFung, Benjamin ; Wang, Ke ; Chen, Rui ; Yu, PhilipACM computing surveys, 2010-06, Vol.42 (4), p.1-53 [Periódico revisado por pares]New York, NY: ACMTexto completo disponível |