UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

48 49 50
hits: 19,433
491.
  • Real-Time Information Secur... Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique
    Evans, Mark; He, Ying; Luo, Cunjin ... IEEE access, 2019, Volume: 7
    Journal Article
    Peer reviewed
    Open access

    Information security recognised the human as the weakest link. Despite numerous international or sector-specific standards and frameworks, the information security community has not yet adopted ...
Full text

PDF
492.
  • MedRSS: A blockchain-based ... MedRSS: A blockchain-based scheme for secure storage and sharing of medical records
    Sun, Zhijie; Han, Dezhi; Li, Dun ... Computers & industrial engineering, September 2023, 2023-09-00, Volume: 183
    Journal Article
    Peer reviewed

    Due to the rapid advance of Healthcare Information Technology (HIT), the amount of medical data has increased dramatically and highly demands correct and secure storage and exchange. However, ...
Full text
493.
  • Information Security and Pr... Information Security and Privacy Management in Intelligent Transportation Systems
    Bakhtina, Mariia; Matulevičius, Raimundas; Malina, Lukaš Complex Systems Informatics and Modeling Quarterly, 04/2024 38
    Journal Article
    Peer reviewed
    Open access

    With the global digitalization of services, passenger Intelligent Transportation Systems (ITSs) have emerged as transformative components, yet the practical implementation of state-of-the-art ...
Full text
494.
  • An Overview of Information-... An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications
    Bloch, Matthieu; Gunlu, Onur; Yener, Aylin ... IEEE journal on selected areas in information theory, 03/2021, Volume: 2, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    This tutorial reviews fundamental contributions to information security. An integrative viewpoint is taken that explains the security metrics, including secrecy, privacy, and others, the methodology ...
Full text
495.
Full text
496.
  • Botnet in DDoS Attacks: Tre... Botnet in DDoS Attacks: Trends and Challenges
    Hoque, Nazrul; Bhattacharyya, Dhruba K.; Kalita, Jugal K. IEEE Communications surveys and tutorials, 01/2015, Volume: 17, Issue: 4
    Journal Article
    Peer reviewed

    Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due to rapid development of computer networks and associated infrastructure, and millions of software ...
Full text
497.
  • An empirical comparison of ... An empirical comparison of botnet detection methods
    García, S.; Grill, M.; Stiborek, J. ... Computers & security, 09/2014, Volume: 45
    Journal Article
    Peer reviewed
    Open access

    The results of botnet detection methods are usually presented without any comparison. Although it is generally accepted that more comparisons with third-party methods may help to improve the area, ...
Full text
498.
  • Estimating the Contextual R... Estimating the Contextual Risk of Data Breach: An Empirical Approach
    Sen, Ravi; Borle, Sharad Journal of management information systems, 04/2015, Volume: 32, Issue: 2
    Journal Article
    Peer reviewed

    Data breach incidents are on the rise, and have resulted in severe financial and legal implications for the affected organizations. We apply the opportunity theory of crime, the institutional anomie ...
Full text
499.
  • Gearing resource-poor mobil... Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications
    Liu, Fangming; Shu, Peng; Jin, Hai ... IEEE wireless communications, 2013-June, 2013-06-00, 20130601, Volume: 20, Issue: 3
    Journal Article
    Peer reviewed

    Mobile cloud computing, with its promise to meet the urgent need for richer applications and services of resource-constrained mobile devices, is emerging as a new computing paradigm and has recently ...
Full text
500.
Full text

You have reached the maximum number of search results that are displayed.

  • For better performance, the search offers a maximum of 1,000 results per query (or 50 pages if the option 10/page is selected).
  • Consider using result filters or changing the sort order to explore your results further.
48 49 50
hits: 19,433

Load filters