UP - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 50
1.
  • Assessing Competencies Usin... Assessing Competencies Using Scenario-Based Learning in Cybersecurity
    Ghosh, Tirthankar; Francia, Guillermo Journal of cybersecurity and privacy, 12/2021, Letnik: 1, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Recent years have seen a disconnect between much-needed real-world skills and knowledge imparted to cybersecurity graduates by higher education institutions. As employers are shifting their focus to ...
Celotno besedilo

PDF
2.
Celotno besedilo

PDF
3.
  • The Spatial Analysis of the... The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study
    Amin, Raid W.; Sevil, Hakki Erhan; Kocak, Salih ... Information, 01/2021, Letnik: 12, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    In this study, we aimed to identify spatial clusters of countries with high rates of cyber attacks directed at other countries. The cyber attack dataset was obtained from Canadian Institute for ...
Celotno besedilo

PDF
4.
  • An Empirical Study on the P... An Empirical Study on the Performance of Java/.Net Cryptographic APIs
    Francia, Guillermo A.; Francia, Rahjima R. Information systems security, 12/13/2007, Letnik: 16, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    The unprecedented growing demands on security and privacy protection ushered the proliferation of cryptographic tools. This article presents a study on the performance comparison of cryptographic ...
Celotno besedilo

PDF
5.
Celotno besedilo
6.
  • Computer and Network Securi... Computer and Network Security Essentials
    Daimi, Kevin; Francia, Guillermo; Ertaul, Levent ... 2017, 2017-08-12
    eBook

    The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware ...
Celotno besedilo
7.
Celotno besedilo
8.
Celotno besedilo
9.
Celotno besedilo

PDF
10.
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 50

Nalaganje filtrov