Facet browsing currently unavailable
Page 2 of 7430 results
Sort by: relevance publication year
Secure software verification tools JOURNAL ARTICLE published October 1988 in Computers & Security |
Security issues in contemporary banking JOURNAL ARTICLE published January 1995 in Computers & Security |
Free file encryption offered JOURNAL ARTICLE published January 1999 in Computers & Security |
Editorial Board JOURNAL ARTICLE published October 2021 in Computers & Security |
Security aspects of wireless local area networks JOURNAL ARTICLE published September 1992 in Computers & Security |
Smartcards—A security assessment JOURNAL ARTICLE published April 1994 in Computers & Security |
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data JOURNAL ARTICLE published October 2006 in Computers & Security |
Trustworthy exams without trusted parties JOURNAL ARTICLE published June 2017 in Computers & Security Research funded by FNR (C11/IS/1183245) |
MapperDroid: Verifying app capabilities from description to permissions and API calls JOURNAL ARTICLE published December 2021 in Computers & Security |
Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic mapping review JOURNAL ARTICLE published May 2023 in Computers & Security |
Representation learning-based network intrusion detection system by capturing explicit and implicit feature interactions JOURNAL ARTICLE published January 2022 in Computers & Security Research funded by National Science Foundation (62002371) | National University of Defense Technology (ZK21-17) |
Attack detection/prevention system against cyber attack in industrial control systems JOURNAL ARTICLE published August 2018 in Computers & Security |
Abstracts of recent articles and literature JOURNAL ARTICLE published October 1989 in Computers & Security |
A dynamic key-lock-pair access control scheme JOURNAL ARTICLE published April 1991 in Computers & Security |
Data errors hurt state department system JOURNAL ARTICLE published February 1988 in Computers & Security |
Governments act to improve security JOURNAL ARTICLE published April 2003 in Computers & Security |
PGP 6.0: Pro Crypto suite gets personal JOURNAL ARTICLE published January 1999 in Computers & Security |
High-tech crime's hidden face JOURNAL ARTICLE published January 1997 in Computers & Security |
International board of referees JOURNAL ARTICLE published 1994 in Computers & Security |
Microsoft seeks to split Apple suit into two phases JOURNAL ARTICLE published August 1988 in Computers & Security |