SciMatic
Journals
Thesis Rep
Docs
Products
SciMatic.net
Journament
Journal Manager
Subjects
Thesis
ImProofer
Research Groups
Letter Pad
Conferences
Services
About
SciMatic
Team
Earn With Us
Join Us
Contact Us
EN
English
Türkçe
Español
Português
Pусский
Filipino
Tiếng Việt
हिन्दी
العربية
বাংলা
Deutsch
中文
Login
Keyword Connections
information security
Journals
3
1
Scientific reports
2
Sensors (Basel, Switzerland)
3
Journal of medical systems
Research Groups
0
No Research Group Connected
Bibliographies
59
1
Accurate Approach Towards Efficiency of Searching Agents in Digital Libraries Using Keywords.
2
Violent paroxysmal activity drives self-feeding magma replenishment at Mt. Etna.
3
Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain
4
Continuous Quantitative Risk Management in Smart Grids Using Attack Defense Trees.
5
information security incident management practical aspects
6
reputation risks through information security incidents
7
using saml for attribution, delegation and least privilege
8
inefficiency of ids static anomaly detectors in real-world networks
9
pengembangan metode pengamanan data menggunakan teknik interpolasi antar piksel dan reduced difference expansion
10
mobile devices and effective information security
11
influence of socially-psychological aspects on maintenance of information security of subjects of information relations
12
information security current problems
13
using financial instruments to transfer the information security risks
14
the strategy for the development of information society in serbia by 2020: information security and critical infrastructure
15
security information in production and operations: a study on audit trails in database systems
16
efficient factual search and requirements of the information security
17
specific methods of information security for nuclear materials control and accounting automate systems
18
dlp-systems: protection from insiders
19
Research and Determination of Personal Information Security Culture Level Using Fuzzy Logic Methods
20
Selecting the Business Information Security Officer with ECU@Risk and the Critical Role Model
21
Information security governance: a risk assessment approach to health information systems protection.
22
Patients’ perception of the information security management in health centers: the role of organizational and human factors
23
Information Security of Mobile Systems
24
Multiple-information security system using key image phase and chaotic random phase encoding in Fresnel transform domain
25
Analysis of Information Security News Content and Abnormal Returns of Enterprises
26
Detecting credit fraud in E-Business system: An information security perspective on the banking sector in UK
27
Structure of information security subsystem in the systems of commercial energy resources accounting
28
Information security policies in organizations: How convention theory can serve as a framework to inform information security research and HR practice
29
Determining information security threats for an iot-based energy internet by adopting software engineering and risk management approaches
30
Information Security of Children and Adolescents According to Parents and Teachers (Part 2: The Results of an Empirical Study)
31
Network power-grid information security architecture model for intelligent distribution communication network
32
Information security assessment in public administration
33
Coping strategies and paradoxes related to byod information security threats in France
34
LiSRA: Lightweight Security Risk Assessment for decision support in information security
35
Corrigendum to “A New User Behavior Evaluation Method in Online Social Network” (Journal of Information Security and Applications (2019) 47 (217–222), (S2214212619300468), (10.1016/j.jisa.2019.04.008))
36
Stakeholder perceptions of information security policy: Analyzing personal constructs
37
Information Security Policy Compliance: Leadership, Trust, Role Values, and Awareness
38
Information security research for instant messaging service in taiwan – build a private instant messaging
39
A model of information security policy compliance for public universities: A conceptual model
40
Special section on cryptography and information security
41
Impact on the Information Security Management Due to the Use of Social Networks in a Public Organization in Ecuador
42
Authenticate audio video-crypto invisible watermarking approach for enhancing hidden information security and robustness
43
A 3-layer RDH method in encrypted domain for medical information security
44
Developing an Information Security Management System for Libraries Based on an Improved Risk Analysis Methodology Compatible with ISO/IEC 27001
45
Leader power and employees’ information security policy compliance
46
Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization
47
Do employees in a “good” company comply better with information security policy? A corporate social responsibility perspective
48
From ISO/IEC 27002:2013 information security controls to personal data protection controls: Guidelines for GDPR compliance
49
Prioritization of information security controls through fuzzy AHP for cloud computing networks and wireless sensor networks
50
biometric feature script for information security
51
information security in data exchange between mobile devices with android system using rsa encryption
52
implementation issues of the information security management systems based on the standards
53
analysis of the use of neutralisation techniques in violations of information security
54
benefits of creating information security management system on the enterprise using 1c: enterprise and mathematical models
55
Technology architecture of smart grid information security defense system
56
information security risks on a university campus
57
unification of information security policies for network security solutions
58
organisational information security strategy: review, discussion and future research
59
information security risk management: an intelligence-driven approach