skip to main content
Resultados 1 2 3 4 5 next page
Refinado por: Nome da Publicação: Computer remover assunto: Computer Security remover Computer Science remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
On-Demand Security Architecture for Cloud Computing
Material Type:
Artigo
Adicionar ao Meu Espaço

On-Demand Security Architecture for Cloud Computing

Chen, Jianyong ; Wang, Yang ; Wang, Xiaomin

Computer (Long Beach, Calif.), 2012-07, Vol.45 (7), p.73-78 [Periódico revisado por pares]

New York, NY: IEEE

Texto completo disponível

2
A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System Architecture
Material Type:
Artigo
Adicionar ao Meu Espaço

A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System Architecture

Sanislav, Teodora ; Zeadally, Sherali ; Mois, George Dan

Computer (Long Beach, Calif.), 2017-04, Vol.50 (4), p.27-37 [Periódico revisado por pares]

New York: IEEE

Texto completo disponível

3
An Attack-Resilient CPS Architecture for Hierarchical Control: A Case Study on Train Control Systems
Material Type:
Artigo
Adicionar ao Meu Espaço

An Attack-Resilient CPS Architecture for Hierarchical Control: A Case Study on Train Control Systems

Won, Yuchang ; Yu, Buyeon ; Park, Jaegeun ; Park, In-Hee ; Jeong, Haegeon ; Baik, Jeanseong ; Kang, Kyungtae ; Lee, Insup ; Son, Sang Hyuk ; Park, Kyung-Joon ; Eun, Yongsoon

Computer (Long Beach, Calif.), 2018-11, Vol.51 (11), p.46-55 [Periódico revisado por pares]

New York: IEEE

Texto completo disponível

4
The Rise of Hardware Security in Computer Architectures
Material Type:
Artigo
Adicionar ao Meu Espaço

The Rise of Hardware Security in Computer Architectures

Schaumont, Patrick ; Montuschi, Paolo

Computer (Long Beach, Calif.), 2018-08, Vol.51 (8), p.4-5 [Periódico revisado por pares]

New York: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)

Texto completo disponível

5
Cyberentity Security in the Internet of Things
Material Type:
Artigo
Adicionar ao Meu Espaço

Cyberentity Security in the Internet of Things

Huansheng Ning ; Hong Liu ; Yang, L. T.

Computer (Long Beach, Calif.), 2013-04, Vol.46 (4), p.46-53 [Periódico revisado por pares]

New York: IEEE

Texto completo disponível

6
Can You Trust Zero Trust?
Material Type:
Artigo
Adicionar ao Meu Espaço

Can You Trust Zero Trust?

Michael, James Bret ; Dinolt, George C. ; Cohen, Frederick B. ; Wijesekera, Duminda ; Michael, James Bret

Computer (Long Beach, Calif.), 2022-08, Vol.55 (8), p.103-105 [Periódico revisado por pares]

IEEE

Texto completo disponível

7
Beyond Zero Trust: Trust Is a Vulnerability
Material Type:
Artigo
Adicionar ao Meu Espaço

Beyond Zero Trust: Trust Is a Vulnerability

Campbell, Mark

Computer (Long Beach, Calif.), 2020-10, Vol.53 (10), p.110-113 [Periódico revisado por pares]

IEEE

Texto completo disponível

8
A Formal Approach to Constructing Secure Air Vehicle Software
Material Type:
Artigo
Adicionar ao Meu Espaço

A Formal Approach to Constructing Secure Air Vehicle Software

Cofer, Darren ; Gacek, Andrew ; Backes, John ; Whalen, Michael W. ; Pike, Lee ; Foltzer, Adam ; Podhradsky, Michal ; Klein, Gerwin ; Kuz, Ihor ; Andronick, June ; Heiser, Gernot ; Stuart, Douglas

Computer (Long Beach, Calif.), 2018-11, Vol.51 (11), p.14-23 [Periódico revisado por pares]

New York: IEEE

Texto completo disponível

9
DDoS in the IoT: Mirai and Other Botnets
Material Type:
Artigo
Adicionar ao Meu Espaço

DDoS in the IoT: Mirai and Other Botnets

Kolias, Constantinos ; Kambourakis, Georgios ; Stavrou, Angelos ; Voas, Jeffrey

Computer (Long Beach, Calif.), 2017, Vol.50 (7), p.80-84 [Periódico revisado por pares]

New York: IEEE

Texto completo disponível

10
The Top 10 Risks of Machine Learning Security
Material Type:
Artigo
Adicionar ao Meu Espaço

The Top 10 Risks of Machine Learning Security

McGraw, Gary ; Bonett, Richie ; Shepardson, Victor ; Figueroa, Harold

Computer (Long Beach, Calif.), 2020-06, Vol.53 (6), p.57-61 [Periódico revisado por pares]

IEEE

Texto completo disponível

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Buscando em bases de dados remotas. Favor aguardar.