Search Results - "security"
-
1
-
2
-
3
-
4
Security aspects and efforts towards secure Internet of things
Published 2017“…The purpose of this paper is to highlight possible security attacks in Low Power and Lossy Networks (LLNs) as identifying pertinent security issues is an initial step to design the effective countermeasures. …”
Get full text
Get full text
Get full text
-
5
Online securities trading and control of securities offences in Malaysia
Published 2006“…The paper addresses online securities trading and the possibility of occurrence of securities offences. …”
Get full text
-
6
Online securities trading and control of securities offences in Malaysia
Published 2006“…The paper addresses online securities trading and the possibility of occurrence of securities offences. …”
Get full text
-
7
Guideline for privacy and security in Cloud First Security Environment
Published 2017“…The discussion of privacy and security in Cloud computing platform which includes data classification, security and privacy governance, guideline implementation and security cases brings a thorough understanding on Cloud and its policy.…”
Get full text
Get full text
Get full text
-
8
'Securing' the Indian Ocean? Competing Regional Security Constructions
Published 2015“…Dictated and driven to a significant extent by the changing dynamics of the knowledge-power equation, regional constructions are devised and propagated for a range of purposes - describing economic success, structuring a set of relationships, reproducing a particular vision of (in)security or organising a specific function, such as to maximise economic cooperation, to minimise insecurity or to fashion a particular form of security architecture. …”
Get full text
-
9
‘Securing’ the Indian Ocean? Competing regional security constructions
Published 2012Subjects: Get full text
-
10
Electronic Book of Network Security: Introduction to Network Security
Published 2003Subjects: Get full text
Get full text
-
11
Environmental security
Published 2019“…Beyond traditional national (military) security, there are growing concerns regarding nontraditional military security issues such as human security, economic security, social security, information security, and environmental security. …”
Get full text
Get full text
-
12
-
13
Securing information system & computer security self-efficacy effect
Published 2013“…CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy Information Systems Theories -TAM , Technology Adoption Model, TTF Social Cognitive Theory Computer security self efficacy -Computer self-efficacy -Internet self-efficacy -Confidentiality -Integrity -Availability -Perceived Risk -Perceived Trust -Online Anxiety …”
Get full text
Get full text
Get full text
-
14
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
Published 2013Subjects: “…information security outsourcing…”
Get full text
-
15
Use of security patterns for development of secure healthcare information system
Published 2016“…This information is shared among different physicians, surgeons and technicians in the distributed and heterogeneous environment. Bearing these security concerns in mind a model driven methodology of using security patterns for development of secure healthcare information systems is proposed. …”
Get full text
Get full text
-
16
-
17
A tool for modeling software security requirements using security patterns
Published 2016Subjects: “…Computer security…”
Get full text
Get full text
-
18
-
19
-
20
Security Mechanism for MANETs
Published 2009“…Even though immune-inspired approaches aren’t essentially new to the research domain, the percentage of applying immune features in solving security problems fluctuates. In this paper, security approach based on both immunity and multi-agent paradigm is presented. …”
Get full text
Get full text