中图分类
执行
    中文(共67篇) 外文(共1276篇)
    排序:
    导出 保存至文件
    摘要 : Cloud computing is considered as a new paradigm shift in distributed computing. Due to its increasing popularity, it has gotten increasing attention in the research community. In the last few years, the usage of cloud computing ha... 展开

    摘要 : Thousands of new threats and threat categories emerge every second in cyberspace, even as known threats keep adapting robustly to existing solutions, thus challenging modern approaches to threat detection. While many contemporary ... 展开

    [期刊]   Daniele Granata   Massimiliano Rak   《Software Quality Journal》    2024年32卷1期      共37页
    摘要 : Companies face increasing pressure to protect themselves and their customers from security threats. Security by design is a proactive approach that builds security into all aspects of a system from the ground up, rather than addin... 展开

    [机翻] 信息系统安全威胁与对策:跨行业研究
    [期刊]   Quey-Jen Yeh   Arthur Jung-Ting Chang   《Information & Management》    2007年44卷5期      共12页
    摘要 : IS security threats have increased significantly in recent years. We identified the gaps between manager perceptions of IS security threats and the security countermeasures adopted by firms by collecting empirical data from 109 Ta... 展开

    [机翻] 基于信息安全管理系统(ISMS)的智能手机增强安全模型
    [期刊]   Jong Hyuk Park   Ki Jung Yi   Young-Sik Jeong   《Electronic Commerce Research》    2014年14卷3期      共28页
    摘要 : As the penetration of smartphones increases rapidly, in the occurrence of security threats in smartphones, smartphone security technologies are not sufficient, and moreover, the security technologies and measures that can be appli... 展开

    [期刊]   TAI-HOON KIM   《WSEAS Transactions on Signal Processing》    2010年6卷1/4期      共12页
    摘要 : To uniquely identify physical objects, Radio Frequency Identification (RFID) systems are used with its limitless possibilities and low cost. RFID is a method of remotely storing and retrieving data using devices called RFID tags. ... 展开
    关键词 : RFID   Security   Threats  

    [机翻] 如何考虑安全性
    [期刊]   Whittaker, J.A.   Ford, R.   《IEEE Security & Privacy Magazine》    2006年4卷2期      共4页
    摘要 : Learning how to think about security means adopting a different mindset than we've had in the past. As a community, software developers have been thinking too much like "good guys" and thus ended up developing insecure software be... 展开

    [机翻] 机场安全:人种学研究
    摘要 : This paper employs a behavioral science perspective of airport security to, examine security related decision behaviors using exploratory ethnographic observations. Sampling employees from a broad spectrum of departments and occup... 展开

    [期刊]   Amrita Sharma Rathod   Anil Kumar Tiwari   《Research journal of engineering and technology》    2020年11卷2期      共4页
    摘要 : Cloud computing is a transpiring way of computing in computer science. Cloud computing is a technology that uses a network of remote servers hosted on internet to store, manage and process data on demand and pay as per use. It pro... 展开

    摘要 : This paper presents Requirement Analysis of cloud Security in Distributed Systems, particularly looking at trust, confidentiality and privacy issues. The novelty of cloud is its ability to perform automated tasks in a way that was... 展开

    研究趋势
    相关热图
    学科分类