Browsing by Subject Computer networks -- Security measures

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 37  next >
Issue DateTitleAuthor(s)
2017Backdoor encryption policies : a legal dilemmaSaliba, Bernice
2022Cloud‑based framework for performing digital forensic investigationsPrakash, Vijay; Williams, Alex; Garg, Lalit; Barik, Pradip; Dhanaraj, Rajesh Kumar
2021Computer security and communication issues in automobiles : identification and analysis of security issues using a threat modelling approachConti, Gianluca (2021)
2023Cyber protection activities for citizens in Poland compared to the EUŁadny, Piotr
2018Cyber-safety in an ever-shifting landscapeReljic, Teodor
2023Cyberspace as a source of new threats to the security of the European UnionCiekanowski, Zbigniew; Gruchelski, Marek; Nowicka, Julia; Żurawski, Sławomir; Pauliuchuk, Yury
2023Digital transformation, strategic resilience, cyber security and risk managementSood, Kiran; Balusamy, Balamurugan; Grima, Simon
2023Digital transformation, strategic resilience, cyber security and risk managementGrima, Simon; Thalassinos, Eleftherios; Noja, Graţiela Georgiana; Stamataopoulos, Theodore V.; Vasiljeva, Tatjana; Volkova, Tatjana
2023Digital transformation, strategic resilience, cyber security and risk managementGrima, Simon; Thalassinos, Eleftherios; Cristea, Mirela; Kadłubek, Marta; Maditinos, Dimitrios; Peiseniece, Līga
2012Distress detection (poster abstract)Vella, Mark Joseph; Terzis, Sotirios; Roper, Marc
2021An efficient sound and data steganography based secure authentication systemDatta, Debajit; Garg, Lalit; Srinivasan, Kathiravan; Inoue, Atsushi; Reddy, G. Thippa; Reddy, M. Praveen Kumar; Ramesh, K.; Nasser, Nidal
2013Enhancing the effectiveness of signature-based detectionGalea, John (2013)
2002FTP security extensionsFarrugia, James P. (2002)
2013Information security in enterprises - ontology perspectiveSchiavone, Stephen; Garg, Lalit; Summers, Kelly
2015Information systems security and audit firmsSpiteri, Cristian
2016A legal analysis of cyberterrorism : threats and emerging legal responsesMulligan, Kristina
2012Legal aspects of distributed denial of service attacksSchembri, Katia (2012)
2001Legal aspects of Internet security and on-line privacyGhio, Antonio
2003A log analysis based intrusion detection system for the creation of a specification based intrusion prevention systemMuscat, Andre
2016A machine learning based approach for intrusion prevention using honeypot interaction patterns as training dataZammit, Daniel