Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
On-Demand Security Architecture for Cloud ComputingChen, Jianyong ; Wang, Yang ; Wang, XiaominComputer (Long Beach, Calif.), 2012-07, Vol.45 (7), p.73-78 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System ArchitectureSanislav, Teodora ; Zeadally, Sherali ; Mois, George DanComputer (Long Beach, Calif.), 2017-04, Vol.50 (4), p.27-37 [Periódico revisado por pares]New York: IEEETexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
An Attack-Resilient CPS Architecture for Hierarchical Control: A Case Study on Train Control SystemsWon, Yuchang ; Yu, Buyeon ; Park, Jaegeun ; Park, In-Hee ; Jeong, Haegeon ; Baik, Jeanseong ; Kang, Kyungtae ; Lee, Insup ; Son, Sang Hyuk ; Park, Kyung-Joon ; Eun, YongsoonComputer (Long Beach, Calif.), 2018-11, Vol.51 (11), p.46-55 [Periódico revisado por pares]New York: IEEETexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
The Rise of Hardware Security in Computer ArchitecturesSchaumont, Patrick ; Montuschi, PaoloComputer (Long Beach, Calif.), 2018-08, Vol.51 (8), p.4-5 [Periódico revisado por pares]New York: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)Texto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Cyberentity Security in the Internet of ThingsHuansheng Ning ; Hong Liu ; Yang, L. T.Computer (Long Beach, Calif.), 2013-04, Vol.46 (4), p.46-53 [Periódico revisado por pares]New York: IEEETexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Can You Trust Zero Trust?Michael, James Bret ; Dinolt, George C. ; Cohen, Frederick B. ; Wijesekera, Duminda ; Michael, James BretComputer (Long Beach, Calif.), 2022-08, Vol.55 (8), p.103-105 [Periódico revisado por pares]IEEETexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Beyond Zero Trust: Trust Is a VulnerabilityCampbell, MarkComputer (Long Beach, Calif.), 2020-10, Vol.53 (10), p.110-113 [Periódico revisado por pares]IEEETexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
A Formal Approach to Constructing Secure Air Vehicle SoftwareCofer, Darren ; Gacek, Andrew ; Backes, John ; Whalen, Michael W. ; Pike, Lee ; Foltzer, Adam ; Podhradsky, Michal ; Klein, Gerwin ; Kuz, Ihor ; Andronick, June ; Heiser, Gernot ; Stuart, DouglasComputer (Long Beach, Calif.), 2018-11, Vol.51 (11), p.14-23 [Periódico revisado por pares]New York: IEEETexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
DDoS in the IoT: Mirai and Other BotnetsKolias, Constantinos ; Kambourakis, Georgios ; Stavrou, Angelos ; Voas, JeffreyComputer (Long Beach, Calif.), 2017, Vol.50 (7), p.80-84 [Periódico revisado por pares]New York: IEEETexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
The Top 10 Risks of Machine Learning SecurityMcGraw, Gary ; Bonett, Richie ; Shepardson, Victor ; Figueroa, HaroldComputer (Long Beach, Calif.), 2020-06, Vol.53 (6), p.57-61 [Periódico revisado por pares]IEEETexto completo disponível |