-
1
Computer Security Lab Manual /
Published 2006Subjects: “…Computer security Management Handbooks, manuals, etc. 3242…”
View in OPAC
Book -
2
Computer security lab manual /
Table of contents only
Contributor biographical information
View in OPAC
Book -
3
Computer Security Lab Manual/
Published 2006Subjects: “…computer security 11095…”
View in OPAC
Book -
4
Virtual Cloud Laboratories in Training of Specialists of the Direction “Computer Security”
Published 2015-12-01Get full text
Article -
5
-
6
Analysis of the implications of digital voting through neutrosophic Delphi modeling
Published 2024-11-01Subjects: Get full text
Article -
7
Cyber security and IT infrastructure protection /
Published 2014Subjects: “…Computer security.…”
View in OPAC
Book -
8
A novel method for developing post-quantum cryptoschemes and a practical signature algorithm
Published 2025-01-01Subjects: Get full text
Article -
9
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01Subjects: “…Cloud Computing Security…”
Get full text
Article -
10
-
11
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Subjects: “…Fog cloud computing security…”
Get full text
Article -
12
The Study of Methods for Penetration Testing in Training of Information Security Specialists
Published 2016-12-01“…The article deals with issues related to the creation of modern educational virtual laboratory under cloud cluster platform OpenNebula for the training of specialists in the field of information security and computer security. The use of such laboratories allows teaching methods of penetration testing on examples of objects of different levels of difficulty, and also provides the possibility of rapid changes in infrastructure and characteristics of the objects.…”
Get full text
Article -
13
A Survey of Artificial Immune System Based Intrusion Detection
Published 2014-01-01“…In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. …”
Get full text
Article -
14
Unknown presentation attack detection against rational attackers
Published 2021-09-01Get full text
Article -
15
A Program for Master of Information Technology
Published 2022“…The Master of Information Technology (MIT) mainly deals with the Management of Information Technology focusing on a number of areas including but not limited to business process management, e-services, computer security, technology modeling and data management. …”
Get full text
Other -
16
Analisis Komparatif Keamanan Aplikasi Pengelola Kata Sandi Berbayar Lastpass, 1Password, dan Keeper Berdasarkan ISO/IEC 25010
Published 2023-08-01“…Abstract Authentication is one of the most important factors in the scope of computer security, passwords are the dominant authentication method applied to websites or desktops. …”
Get full text
Article -
17
Speedup signing: pre-rejection sampling towards dilithium
Published 2025-02-01“…Applying these two techniques to Dilithium, we obtain an advanced signature scheme with better efficiency, and without any other losses except some pre-computations. Security reduction demonstrates that our scheme is also SUF-CMA in QROM. …”
Get full text
Article -
18
RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks
Published 2025-01-01Get full text
Article -
19
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01Get full text
Article