Font Size: a A A
Keyword [Computer Security]
Result: 61 - 80 | Page: 4 of 5
61. Applying information visualization to computer security applications
62. Improving host-based computer security using secure active monitoring and memory analysis
63. Computer science education: Secure software
64. An analysis of the impact of information security policies on computer security breach incidents in law firms
65. Autonomous Computer Security Game: Techniques, Strategy and Investigatio
66. New techniques to defend against computer security attacks
67. Motivating contributions for home computer security
68. Investigating security failures and their causes: An analytic approach to computer security
69. Framework for Performance Evaluation of Computer Security Incident Response Capabilities
70. A study of the contributions of attitude, computer security policy awareness, and computer self-efficacy to the employees' computer abuse intention in business environments
71. An Analysis of the Relationship between Security Information Technology Enhancements and Computer Security Breaches and Incidents
72. A new protocol for password authentication and key exchange
73. Computer security behaviors of home PC users: A diffusion of innovation approach
74. Security measures and effective corporate information systems management: An examination of issues surrounding computer network security
75. Analyzing intrusions of a hybrid virtual honeynet
76. New techniques for analyzing applied computer security systems
77. Application of artificial immune systems to computer security
78. The cybercitizen dimension: A quantitative study using a threat avoidance perspective
79. Sky-walker: An integrated solution for network and computer security
80. The Role of Self-Efficacy in Computer Security Behavior: Developing the Construct of Computer Security Self-Efficacy (CSSE)
  <<First  <Prev  Next>  Last>>  Jump to