Showing 181 - 200 results of 332 for search '"information security"', query time: 0.05s Refine Results
  1. 181
  2. 182
  3. 183
  4. 184

    An Image Sharing Encryption Management System For Kabale University. by Bemera, Rauben

    Published 2024
    “…Information security has been the most common word uttered by any man any device or any peripheral for the past two centuries. …”
    Get full text
    Thesis
  5. 185

    Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks by Jiaqi Liang, Yibei Wu, Jun’e Li, Xiong Chen, Heqin Tong, Ming Ni

    Published 2021-01-01
    “…With the development of distributed networks, the remote controllability of the distributed energy objects and the vulnerability of user-side information security protection measures make distributed energy objects extremely vulnerable to malicious control by attackers. …”
    Get full text
    Article
  6. 186
  7. 187
  8. 188
  9. 189
  10. 190
  11. 191
  12. 192

    A SURVEY OF NETWORK SERVICE LOG PROCESSING PLATFORMS AND TECHNIQUES FOR THE DETECTION OF INFORMATION INSECURITY RISKS by Phạm Duy Lộc, Hoàng Xuân Dậu

    Published 2018-07-01
    “…In the layers of information security measures, the monitoring and detection measures of anomalous activities and information insecurity risks are considered the second defense layer behind firewalls and access controls. …”
    Get full text
    Article
  13. 193
  14. 194
  15. 195
  16. 196
  17. 197

    RUSSIA IN THE GLOBAL INFORMATION SOCIETY by E. S. Zinovieva

    Published 2016-06-01
    “…Russian diplomacy is trying to foster the development of global rules regulating the information society and information security based on respect for sovereignty and equality of states. …”
    Get full text
    Article
  18. 198
  19. 199
  20. 200