Search Results - "security"

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Security aspects and efforts towards secure Internet of things by Wan Abdul Rahman, Wan Fariza, Hassan Abdalla Hashim, Aisha, Islam, Md Rafiqul

    Published 2017
    “…The purpose of this paper is to highlight possible security attacks in Low Power and Lossy Networks (LLNs) as identifying pertinent security issues is an initial step to design the effective countermeasures. …”
    Get full text
    Get full text
    Get full text
  5. 5

    Online securities trading and control of securities offences in Malaysia by Jawahitha, , Sarabdeen, Mazahir, , Mohamed Ishak Mohamed

    Published 2006
    “…The paper addresses online securities trading and the possibility of occurrence of securities offences. …”
    Get full text
  6. 6

    Online securities trading and control of securities offences in Malaysia by Jawahitha, , Sarabdeen, Mazahir, , Mohamed Ishak Mohamed)

    Published 2006
    “…The paper addresses online securities trading and the possibility of occurrence of securities offences. …”
    Get full text
  7. 7

    Guideline for privacy and security in Cloud First Security Environment by Abdul Aziz, Normaziah, Mansor, Hafizah, Mohd Nor, Rizal, Wahiddin, Mohamed Ridza

    Published 2017
    “…The discussion of privacy and security in Cloud computing platform which includes data classification, security and privacy governance, guideline implementation and security cases brings a thorough understanding on Cloud and its policy.…”
    Get full text
    Get full text
    Get full text
  8. 8

    'Securing' the Indian Ocean? Competing Regional Security Constructions by Rumley, Dennis, Doyle, Timothy, Chaturvedi, Sanjay

    Published 2015
    “…Dictated and driven to a significant extent by the changing dynamics of the knowledge-power equation, regional constructions are devised and propagated for a range of purposes - describing economic success, structuring a set of relationships, reproducing a particular vision of (in)security or organising a specific function, such as to maximise economic cooperation, to minimise insecurity or to fashion a particular form of security architecture. …”
    Get full text
  9. 9
  10. 10
  11. 11

    Environmental security by Hossain, Ishtiaq

    Published 2019
    “…Beyond traditional national (military) security, there are growing concerns regarding nontraditional military security issues such as human security, economic security, social security, information security, and environmental security. …”
    Get full text
    Get full text
  12. 12
  13. 13

    Securing information system & computer security self-efficacy effect by Al-Shawabkeh, Mahmoud

    Published 2013
    “…CONTENT PART I: Securing Information System PART II: Computer Security Self Efficacy Information Systems Theories -TAM , Technology Adoption Model, TTF Social Cognitive Theory Computer security self efficacy -Computer self-efficacy -Internet self-efficacy -Confidentiality -Integrity -Availability -Perceived Risk -Perceived Trust -Online Anxiety …”
    Get full text
    Get full text
    Get full text
  14. 14
  15. 15

    Use of security patterns for development of secure healthcare information system by Maher, Zulfikar Ahmed, Mohd Sani, Nor Fazlida, Din, Jamilah, A. Jabar, Marzanah

    Published 2016
    “…This information is shared among different physicians, surgeons and technicians in the distributed and heterogeneous environment. Bearing these security concerns in mind a model driven methodology of using security patterns for development of secure healthcare information systems is proposed. …”
    Get full text
    Get full text
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Security Mechanism for MANETs by Yasir Abdelgadir , Mohamed, Azween, Abdullah

    Published 2009
    “…Even though immune-inspired approaches aren’t essentially new to the research domain, the percentage of applying immune features in solving security problems fluctuates. In this paper, security approach based on both immunity and multi-agent paradigm is presented. …”
    Get full text
    Get full text