doi:10.1016/0142-0496(90)90122-2NoneelsevierComputer Fraud & Security Bulletin
Computers & security journal Author links open overlay panel Show more Add to Mendeley Share Cite https://doi.org/10.1016/0142-0496(90)90187-PGet rights and content Access through your organization Check access to the full text by signing in through your organization....
Computers and Security . 1993... None 被引量: 0发表: 2003年 An Overview of the Security Concerns in Enterprise Cloud Computing International Journal of Network Security & its Applications 3(1) (January 2011)Anthony Bisong and Syed (Shawon) M. Rahman, "An Overview of the ... A Bisong,...
data mining in security Malware and botnet detection, virus/worm controls Computer crime prevention/detection, digital/cyber forensics and analysis Confidentiality protection, cryptography and data protection Information warfare, denial of service protection, spoofing protection e-Commerce security; image, audi...
–Security threats and model in Internet – Security modeling and analysis – Security metrics and assessment – Key management, authentication and access control – Identity management – Anonymity, secrecy privacy and trust – Public key cryptography and digital signatures – Intrusion/virus/malware det...
Computers & Securityis one of the most respected journals in IT security, being recognized worldwide as THE primary source of reference for IT security research and applications expertise. Computers & … $3100 USD Article publishing charge
Real-time database systems can have security constraints in addition to timing constraints. Such real-time systems are typically contained in environments ... QN Ahmed,SV Vrbsky - 《Journal of Systems & Software》 被引量: 98发表: 2002年 ...
ACM Transactions on Privacy and Security (was ACM Transactions on Information and System Security, TISSEC pre 2018) A Artificial Intelligence in Medicine A Autonomous Agents and Multi-Agent Systems A BMC Bioinformatics A Combinatorica: an international journal on combinatorics and the theory ofcomputing...
SecurityCHN70%similarity14 CybersecurityGBR68%similarity15 ACM Transactions on Cyber-Physical SystemsUSA66%similarity16 Computing and InformaticsSVK65%similarity17 Computer Standards and InterfacesNLD65%similarity18 Computers and SecurityGBR65%similarity19 IEEE Transactions on Services ComputingUSA65%similarity20...
The International Source of Innovation for the Information Security and IT Audit Professional Computers & Securityis one of the most respected journals in IT security, being recognized worldwide as THE primary source of reference for IT security research and applications expertise. ...