Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 2 of 7430 results
Sort by: relevance publication year

Secure software verification tools

JOURNAL ARTICLE published October 1988 in Computers & Security

Security issues in contemporary banking

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Keith Osborne

Free file encryption offered

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Helen Meyer

Editorial Board

JOURNAL ARTICLE published October 2021 in Computers & Security

Security aspects of wireless local area networks

JOURNAL ARTICLE published September 1992 in Computers & Security

Authors: David L. Lathrop

Smartcards—A security assessment

JOURNAL ARTICLE published April 1994 in Computers & Security

Authors: Jerome Svigals

Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data

JOURNAL ARTICLE published October 2006 in Computers & Security

Authors: Wei Wang | Xiaohong Guan | Xiangliang Zhang | Liwei Yang

Trustworthy exams without trusted parties

JOURNAL ARTICLE published June 2017 in Computers & Security

Research funded by FNR (C11/IS/1183245)

Authors: Giampaolo Bella | Rosario Giustolisi | Gabriele Lenzini | Peter Y.A. Ryan

MapperDroid: Verifying app capabilities from description to permissions and API calls

JOURNAL ARTICLE published December 2021 in Computers & Security

Authors: Rajendra Kumar Solanki | Vijay Laxmi | Bruhadeshwar Bezawada | Manoj Singh Gaur

Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic mapping review

JOURNAL ARTICLE published May 2023 in Computers & Security

Authors: Isaac D. Sánchez-García | Tomás San Feliu Gilabert | Jose A. Calvo-Manzano

Representation learning-based network intrusion detection system by capturing explicit and implicit feature interactions

JOURNAL ARTICLE published January 2022 in Computers & Security

Research funded by National Science Foundation (62002371) | National University of Defense Technology (ZK21-17)

Authors: Wei Wang | Songlei Jian | Yusong Tan | Qingbo Wu | Chenlin Huang

Attack detection/prevention system against cyber attack in industrial control systems

JOURNAL ARTICLE published August 2018 in Computers & Security

Authors: Ercan Nurcan Yılmaz | Serkan Gönen

Abstracts of recent articles and literature

JOURNAL ARTICLE published October 1989 in Computers & Security

Authors: EstherH. Highland

A dynamic key-lock-pair access control scheme

JOURNAL ARTICLE published April 1991 in Computers & Security

Authors: J.K. Jan | C.C. Chang | S.J. Wang

Data errors hurt state department system

JOURNAL ARTICLE published February 1988 in Computers & Security

Authors: Vanessa Jo Grimm

Governments act to improve security

JOURNAL ARTICLE published April 2003 in Computers & Security

Authors: Dr Chris Pounder

PGP 6.0: Pro Crypto suite gets personal

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Helen Meyer

High-tech crime's hidden face

JOURNAL ARTICLE published January 1997 in Computers & Security

Authors: Ben McClure

International board of referees

JOURNAL ARTICLE published 1994 in Computers & Security

Microsoft seeks to split Apple suit into two phases

JOURNAL ARTICLE published August 1988 in Computers & Security

Authors: Esther H. Highland