-
81
Method Framework for Developing Enterprise Architecture Security Principles
Published 2019-10-01Subjects: Get full text
Article -
82
The formal analysis of CC security functional components
Published 2003-01-01Subjects: “…information security…”
Get full text
Article -
83
Preliminary Study on the Security Domain Transformation of SMS Platform
Published 2013-08-01Subjects: Get full text
Article -
84
Review of semantic-based privacy-preserving approaches in LBS
Published 2016-12-01Subjects: “…information security…”
Get full text
Article -
85
Corrections to “A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review”
Published 2024-01-01“…Presents corrections to the paper, (Corrections to “A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review”).…”
Get full text
Article -
86
Corrections to “Information Security and Artificial Intelligence-Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)”
Published 2025-01-01“…Presents corrections to the paper, (Corrections to “Information Security and Artificial Intelligence-Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)”).…”
Get full text
Article -
87
DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article -
88
Research on security of third-party tracking
Published 2014-09-01Subjects: “…information security…”
Get full text
Article -
89
Certificate integration management platform based on identity key
Published 2016-10-01Subjects: Get full text
Article -
90
-
91
Evolution game model of offense-defense for network security based on system dynamics
Published 2014-01-01Subjects: “…information security…”
Get full text
Article -
92
Research on key technology of vulnerability threat classification
Published 2012-09-01Subjects: “…information security…”
Get full text
Article -
93
-
94
TPCM-based trusted PXE boot method for servers
Published 2020-12-01Subjects: “…information security…”
Get full text
Article -
95
Attention-based approach of detecting spam in social networks
Published 2020-02-01Subjects: Get full text
Article -
96
Adaptive JPEG steganography based on distortion cost updating
Published 2017-09-01Subjects: “…information security…”
Get full text
Article -
97
Study on enhancing integrity for BLP model
Published 2010-01-01Subjects: “…information security…”
Get full text
Article -
98
-
99
Research on penalty mechanism against selfish behaviors in anonymous communication system
Published 2006-01-01Subjects: “…information security…”
Get full text
Article -
100
Researcb on Network Security Monitoring Model and Associated Algoritbm in tbe Age of Big Data
Published 2014-07-01Subjects: Get full text
Article