Font Size:
a
A
A
Keyword [Computer Security]
Result: 61 - 80 | Page: 4 of 5
61.
Applying information visualization to computer security applications
62.
Improving host-based computer security using secure active monitoring and memory analysis
63.
Computer science education: Secure software
64.
An analysis of the impact of information security policies on computer security breach incidents in law firms
65.
Autonomous Computer Security Game: Techniques, Strategy and Investigatio
66.
New techniques to defend against computer security attacks
67.
Motivating contributions for home computer security
68.
Investigating security failures and their causes: An analytic approach to computer security
69.
Framework for Performance Evaluation of Computer Security Incident Response Capabilities
70.
A study of the contributions of attitude, computer security policy awareness, and computer self-efficacy to the employees' computer abuse intention in business environments
71.
An Analysis of the Relationship between Security Information Technology Enhancements and Computer Security Breaches and Incidents
72.
A new protocol for password authentication and key exchange
73.
Computer security behaviors of home PC users: A diffusion of innovation approach
74.
Security measures and effective corporate information systems management: An examination of issues surrounding computer network security
75.
Analyzing intrusions of a hybrid virtual honeynet
76.
New techniques for analyzing applied computer security systems
77.
Application of artificial immune systems to computer security
78.
The cybercitizen dimension: A quantitative study using a threat avoidance perspective
79.
Sky-walker: An integrated solution for network and computer security
80.
The Role of Self-Efficacy in Computer Security Behavior: Developing the Construct of Computer Security Self-Efficacy (CSSE)
<<First
<Prev
Next>
Last>>
Jump to