Search

Your search keyword '"Logical security"' showing total 776 results

Search Constraints

Start Over You searched for: Descriptor "Logical security" Remove constraint Descriptor: "Logical security" Topic business Remove constraint Topic: business
776 results on '"Logical security"'

Search Results

1. A New Blockchain-Based trust management model

2. The Basics of Computer System and Data Network Security

3. Visualization of security event logs across multiple networks and its application to a CSOC

4. Network security assessment using a semantic reasoning and graph based approach

5. Analisis dan Audit Sistem Manajemen Keamanan Informasi (SMKI) pada Instansi Perpustakaan dan Arsip Daerah Kota Salatiga

6. Improving Smart Home Security: Integrating Logical Sensing Into Smart Home

7. Opensec: Policy Based Security using Internal Software Defined Network

8. Enhancing Security of Software Defined Mobile Networks

9. System Integration and Security of Information Systems

10. Audit expert system of communication security assessment

12. Content-based security and protected core networking with software-defined networks

13. Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings

14. Hybrid Logical Security Framework for Privacy Preservation in the Green Internet of Things

15. A Secure Dual-Core Processor Design for Embedded Terminal Device

16. Matchmaking semantic security policies in heterogeneous clouds

17. Placement of Security Devices in Cloud Data Centre Network: Analysis and Implementation

18. Performance and security enhanced authentication and key agreement protocol for SAE/LTE network

19. Providing customized security based on network function composition and reconfiguration

20. Android Access Control Extension

21. Lesson Learned: Security is Inevitable

22. Mobile-Based DoS Attack Security Agent in Sensor Networking

23. A First Step Toward Network Security Virtualization: From Concept To Prototype

24. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints

25. Security of Software Defined Networks: A survey

26. New Proof Methods for Improving Privacy and Security by using Abe

27. A Study on Stabilizing a Network Security Zone Based on the Application of Logical Area to Communication Bandwidth

28. A Study on Security Attribute Design in Security Plan of The Design Phase

29. Design and Implementation of Physical Secure Card for Financial Security

30. A novel secure architecture of the virtualized server system

31. Get in Line: Ongoing Co-Presence Verification of a Vehicle Formation Based on Driving Trajectories

32. Safeguarding Personal Health Information: Case Study

33. Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks

34. AC-PROT: An Access Control Model to Improve Software-Defined Networking Security

35. Data-driven Software Security and its Hardware Support

36. Design process for usable security and authentication using a user-centered approach

37. Transaction-based security for smart grids

38. Modeling and Analysis of the Security Protocol in C-DAX Based on Process Algebra

39. Robotman: A security robot for human-robot interaction

40. A multi-factors security key generation mechanism for IoT

41. A framework for security on demand

42. Dynamic adaptation and reconfiguration of security in mobile devices

43. A Hierarchical Architecture for Distributed Security Control of Large Scale Systems

44. Security requirements modelling for virtualized 5G small cell networks

45. A Game of Things

46. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks

47. New access control policies for private network and protocol security

48. Security auditing in the fog

49. Design of Network Security Distributed Pre-Warning System

50. An Integrated Electricity Information Security Monitoring Platform

Catalog

Books, media, physical & digital resources