Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

48 49 50
hits: 47,888
491.
  • Problems of floating vulner... Problems of floating vulnerabilities in ensuring mobile application security
    Cherevan, Anton S.; Lapsar, Alexey P. Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ, 06/2024, Volume: 31, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    The article is focused on the development of a method for detecting and eliminating floating vulnerabilities in mobile applications, their nature is described, and existing methods of detecting and ...
Full text
Available for: NUK, UL, UM, UPUK
492.
  • Cyberbiosecurity: Advanceme... Cyberbiosecurity: Advancements in DNA-based information security
    Liu, Tuoyu; Zhou, Sijie; Wang, Tao ... Biosafety and health, 6/2024
    Journal Article
    Peer reviewed
    Open access

    •The convergence of synthetic biology and information security forms a new domain of cyberbiosecurity.•Highlighting significant advances in synthetic biology and their dual-use dilemma, raising ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
493.
  • Technical Solution to Infor... Technical Solution to Information Security of Intelligent Operation and Maintenance System for Urban Rail Transit Vehicles
    PI Wei Chengshi Guidao Jiaotong Yanjiu, 06/2024, Volume: 27, Issue: 6
    Journal Article
    Open access

    Objective With the rapid growth of urban rail transit scale, the application of information-based intelligent vehicle operation and maintenance system becomes increasingly extensive, and the ...
Full text
Available for: NUK, UL, UM, UPUK
494.
  • Intelligent management proc... Intelligent management process analysis and security performance evaluation of sports equipment based on information security
    Li, Yang; Wang, Tao Measurement. Sensors, June 2024, 2024-06-00, 2024-06-01, Volume: 33
    Journal Article
    Peer reviewed
    Open access

    This paper discusses the application and analysis of information security in the intelligent management of sports equipment. With the rapid development of information security, the intelligent ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
495.
Full text
Available for: NUK, UL, UM

PDF
496.
  • Analyzing Regulatory Rules ... Analyzing Regulatory Rules for Privacy and Security Requirements
    Breaux, T.D.; Anton, A.I. IEEE transactions on software engineering, 2008-Jan.-Feb., 2008-01-00, 20080101, Volume: 34, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure compliance under the ...
Full text
Available for: CEKLJ, IJS, NUK, UL

PDF
497.
  • Information security: Liste... Information security: Listening to the perspective of organisational insiders
    Choi, SeEun; Martins, Jorge Tiago; Bernik, Igor Journal of information science, 12/2018, Volume: 44, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    Aligned with the strategy-as-practice research tradition, this article investigates how organisational insiders understand and perceive their surrounding information security practices, how they ...
Full text
Available for: NUK, OILJ, SAZU, UKNU, UL, UM, UPUK

PDF
498.
  • Processing Flows of Informa... Processing Flows of Information: From Data Stream to Complex Event Processing
    CUGOLA, Gianpaolo; MARGARA, Alessandro ACM computing surveys, 06/2012, Volume: 44, Issue: 3
    Journal Article
    Peer reviewed

    A large number of distributed applications requires continuous and timely processing of information as it flows from the periphery to the center of the system. Examples include intrusion detection ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
499.
  • Postprocessing of the Obliv... Postprocessing of the Oblivious Key in Quantum Private Query
    Gao, Fei; Liu, Bin; Huang, Wei ... IEEE journal of selected topics in quantum electronics, 2015-May-June, 2015-5-00, 20150501, Volume: 21, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Private query is a kind of cryptographic protocols to protect both users' privacies in their communication. For instance, Alice wants to buy one item from Bob's database. The aim of private query is ...
Full text
Available for: IJS, NUK, UL

PDF
500.
  • An Insight of Information S... An Insight of Information Security: A Skeleton
    Shah, Yash; Joshi, Soham; Oza, Prof. Parita ... International journal of recent technology and engineering, 09/2019, Volume: 8, Issue: 3
    Journal Article
    Open access

    In this age of growing and developing information and technology, data security, integrity and confidentiality are essential aspects related to shared data over some network or medium. Many ...
Full text
Available for: NUK, UL, UM

PDF

You have reached the maximum number of search results that are displayed.

  • For better performance, the search offers a maximum of 1,000 results per query (or 50 pages if the option 10/page is selected).
  • Consider using result filters or changing the sort order to explore your results further.
48 49 50
hits: 47,888

Load filters