Economic acceptable risk assessment model
Proceedings of the 5th annual conference on Information security curriculum development
Security considerations for the wireless HART protocol
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
Crypt analysis of two time pads in case of compressed speech
Computers and Electrical Engineering
Neural network face identification
AIASABEBI'11 Proceedings of the 11th WSEAS international conference on Applied informatics and communications, and Proceedings of the 4th WSEAS International conference on Biomedical electronics and biomedical informatics, and Proceedings of the international conference on Computational engineering in systems applications
Developments and Constraints in 802.11-Based Roadside-to-Vehicle Communications
Wireless Personal Communications: An International Journal
Galaxie: a P2P based EDSOA platform for cloud services
Proceedings Demo & Poster Track of ACM/IFIP/USENIX International Middleware Conference
Hi-index | 0.00 |
Promoting the view that the management, ethics, and values of an organization leads directly to its information security program, this guide addresses up-to-date issues in this increasingly important area.