skip to main content
Resultados 1 2 3 4 5 next page
Mostrar Somente
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Performance of Adaptive Space Sharing Processor Allocation Policies for Distributed-Memory Multicomputers
Material Type:
Artigo
Adicionar ao Meu Espaço

Performance of Adaptive Space Sharing Processor Allocation Policies for Distributed-Memory Multicomputers

Dandamudi, Sivarama P. ; Yu, Hai

Journal of parallel and distributed computing, 1999-07, Vol.58 (1), p.109-125 [Periódico revisado por pares]

San Diego, CA: Elsevier Inc

Texto completo disponível

2
Employees’ adherence to information security policies: An exploratory field study
Material Type:
Artigo
Adicionar ao Meu Espaço

Employees’ adherence to information security policies: An exploratory field study

Siponen, Mikko ; Adam Mahmood, M. ; Pahnila, Seppo

Information & management, 2014-03, Vol.51 (2), p.217-224 [Periódico revisado por pares]

Kidlington: Elsevier B.V

Texto completo disponível

3
Attribute-Based Encryption With Verifiable Outsourced Decryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Attribute-Based Encryption With Verifiable Outsourced Decryption

Junzuo Lai ; Deng, Robert H. ; Chaowen Guan ; Jian Weng

IEEE transactions on information forensics and security, 2013-08, Vol.8 (8), p.1343-1354 [Periódico revisado por pares]

New York, NY: IEEE

Texto completo disponível

4
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)
Material Type:
Artigo
Adicionar ao Meu Espaço

Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)

Parsons, Kathryn ; McCormac, Agata ; Butavicius, Marcus ; Pattinson, Malcolm ; Jerram, Cate

Computers & security, 2014-05, Vol.42, p.165-176 [Periódico revisado por pares]

Amsterdam: Elsevier Ltd

Texto completo disponível

5
On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems
Material Type:
Artigo
Adicionar ao Meu Espaço

On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems

Elhag, Salma ; Fernández, Alberto ; Bawakid, Abdullah ; Alshomrani, Saleh ; Herrera, Francisco

Expert systems with applications, 2015-01, Vol.42 (1), p.193-202 [Periódico revisado por pares]

Amsterdam: Elsevier Ltd

Texto completo disponível

6
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
Material Type:
Artigo
Adicionar ao Meu Espaço

Motivating IS security compliance: Insights from Habit and Protection Motivation Theory

Vance, Anthony ; Siponen, Mikko ; Pahnila, Seppo

Information & management, 2012-05, Vol.49 (3-4), p.190-198 [Periódico revisado por pares]

Kidlington: Elsevier B.V

Texto completo disponível

7
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures
Material Type:
Artigo
Adicionar ao Meu Espaço

White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures

Zhen Liu ; Zhenfu Cao ; Wong, D. S.

IEEE transactions on information forensics and security, 2013-01, Vol.8 (1), p.76-88 [Periódico revisado por pares]

New York, NY: IEEE

Texto completo disponível

8
Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
Material Type:
Artigo
Adicionar ao Meu Espaço

Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition

Ifinedo, Princely

Information & management, 2014-01, Vol.51 (1), p.69-79 [Periódico revisado por pares]

Kidlington: Elsevier B.V

Texto completo disponível

9
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
Material Type:
Artigo
Adicionar ao Meu Espaço

Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory

Cheng, Lijiao ; Li, Ying ; Li, Wenli ; Holm, Eric ; Zhai, Qingguo

Computers & security, 2013-11, Vol.39, p.447-459 [Periódico revisado por pares]

Amsterdam: Elsevier Ltd

Texto completo disponível

10
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Material Type:
Artigo
Adicionar ao Meu Espaço

Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness

Herath, Tejaswini ; Rao, H.R.

Decision Support Systems, 2009-05, Vol.47 (2), p.154-165 [Periódico revisado por pares]

Amsterdam: Elsevier B.V

Texto completo disponível

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Revistas revisadas por pares (346)

Refinar Meus Resultados

Tipo de Recurso 

  1. Artigos  (247)
  2. Anais de Congresso  (97)
  3. Book Chapters  (39)
  4. magazinearticle  (21)
  5. Mais opções open sub menu

Data de Publicação 

De até
  1. Antes de1990  (7)
  2. 1990Até1995  (16)
  3. 1996Até2001  (55)
  4. 2002Até2008  (159)
  5. Após 2008  (171)
  6. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.