skip to main content
Resultados 1 2 3 4 5 next page
Mostrar Somente
Result Number Material Type Add to My Shelf Action Record Details and Options
1
A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework, CURF
Material Type:
Artigo
Adicionar ao Meu Espaço

A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework, CURF

Wangen, Gaute ; Hallstensen, Christoffer ; Snekkenes, Einar

International journal of information security, 2018-11, Vol.17 (6), p.681-699 [Periódico revisado por pares]

Berlin/Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

2
A comprehensive review on permissions-based Android malware detection
Material Type:
Artigo
Adicionar ao Meu Espaço

A comprehensive review on permissions-based Android malware detection

Sharma, Yash ; Arora, Anshul

International journal of information security, 2024-06, Vol.23 (3), p.1877-1912 [Periódico revisado por pares]

Berlin/Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

3
Computable Analysis of a Boundary-Value Problem for the Korteweg-de Vries Equation
Material Type:
Artigo
Adicionar ao Meu Espaço

Computable Analysis of a Boundary-Value Problem for the Korteweg-de Vries Equation

Zhong, Ning

Theory of computing systems, 2007-07, Vol.41 (1), p.155-175 [Periódico revisado por pares]

New York: Springer Nature B.V

Texto completo disponível

4
Radio frequency fingerprinting techniques for device identification: a survey
Material Type:
Artigo
Adicionar ao Meu Espaço

Radio frequency fingerprinting techniques for device identification: a survey

Abbas, Sohail ; Abu Talib, Manar ; Nasir, Qassim ; Idhis, Sally ; Alaboudi, Mariam ; Mohamed, Ali

International journal of information security, 2024-04, Vol.23 (2), p.1389-1427 [Periódico revisado por pares]

Berlin/Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

5
Cyber–physical risk assessment for false data injection attacks considering moving target defences: Best practice application of respective cyber and physical reinforcement assets to defend against FDI attacks
Material Type:
Artigo
Adicionar ao Meu Espaço

Cyber–physical risk assessment for false data injection attacks considering moving target defences: Best practice application of respective cyber and physical reinforcement assets to defend against FDI attacks

Higgins, Martin ; Xu, Wangkun ; Teng, Fei ; Parisini, Thomas

International journal of information security, 2023-06, Vol.22 (3), p.579-589 [Periódico revisado por pares]

Berlin/Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

6
Coupling multifunction drones with AI in the fight against the coronavirus pandemic
Material Type:
Artigo
Adicionar ao Meu Espaço

Coupling multifunction drones with AI in the fight against the coronavirus pandemic

Almalki, Faris A. ; Alotaibi, Abdullah A. ; Angelides, Marios C.

Computing, 2022-05, Vol.104 (5), p.1033-1059 [Periódico revisado por pares]

Vienna: Springer Vienna

Texto completo disponível

7
Introducing uncertainty in complex event processing: model, implementation, and validation
Material Type:
Artigo
Adicionar ao Meu Espaço

Introducing uncertainty in complex event processing: model, implementation, and validation

Cugola, Gianpaolo ; Margara, Alessandro ; Matteucci, Matteo ; Tamburrelli, Giordano

Computing, 2015-02, Vol.97 (2), p.103-144 [Periódico revisado por pares]

Vienna: Springer Vienna

Texto completo disponível

8
The engage taxonomy: SDT-based measurable engagement indicators for MOOCs and their evaluation
Material Type:
Artigo
Adicionar ao Meu Espaço

The engage taxonomy: SDT-based measurable engagement indicators for MOOCs and their evaluation

Cristea, Alexandra I. ; Alamri, Ahmed ; Alshehri, Mohammed ; Pereira, Filipe Dwan ; Toda, Armando M. ; de Oliveira, Elaine Harada T. ; Stewart, Craig

User modeling and user-adapted interaction, 2024-04, Vol.34 (2), p.323-374 [Periódico revisado por pares]

Dordrecht: Springer Netherlands

Texto completo disponível

9
Transient fault aware application partitioning computational offloading algorithm in microservices based mobile cloudlet networks
Material Type:
Artigo
Adicionar ao Meu Espaço

Transient fault aware application partitioning computational offloading algorithm in microservices based mobile cloudlet networks

Lakhan, Abdullah ; Li, Xiaoping

Computing, 2020, Vol.102 (1), p.105-139 [Periódico revisado por pares]

Vienna: Springer Vienna

Texto completo disponível

10
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications
Material Type:
Artigo
Adicionar ao Meu Espaço

Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications

Deepa, G. ; Thilagam, P. Santhi ; Khan, Furqan Ahmed ; Praseed, Amit ; Pais, Alwyn R. ; Palsetia, Nushafreen

International journal of information security, 2018-02, Vol.17 (1), p.105-120 [Periódico revisado por pares]

Berlin/Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Revistas revisadas por pares (188)

Refinar Meus Resultados

Tipo de Recurso 

  1. Artigos  (183)
  2. Resenhas  (6)
  3. Mais opções open sub menu

Data de Publicação 

De até
  1. Antes de1997  (8)
  2. 1997Até2003  (22)
  3. 2004Até2010  (51)
  4. 2011Até2018  (60)
  5. Após 2018  (49)
  6. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.