6 results for security threat.

Parameters for your search query:
Keyword    security threat

Open AccessArticle
Export: RIS | BibTeX | EndNote
A Lightweight Rogue Access Point Detection Algorithm for Embedded Internet of Things (IoT) Devices
Information Security and Computer Fraud. 2019, 7(1), 7-12. DOI: 10.12691/iscf-7-1-2
Pub. Date: January 19, 2019Views: 1416Downloads: 1197
Open AccessArticle
Export: RIS | BibTeX | EndNote
A Security Scheme to Mitigate Denial of Service Attacks in Delay Tolerant Networks
Journal of Computer Sciences and Applications. 2017, 5(2), 50-63. DOI: 10.12691/jcsa-5-2-2
Pub. Date: June 30, 2017Views: 8179Downloads: 6509
Open AccessArticle
Export: RIS | BibTeX | EndNote
Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey
Information Security and Computer Fraud. 2015, 3(1), 1-7. DOI: 10.12691/iscf-3-1-1
Pub. Date: June 23, 2015Views: 24881Downloads: 20469
Open AccessArticle
Export: RIS | BibTeX | EndNote
A Grounded Theory of Security and Technical Barriers to the Continuance Use of Cloud Storage by SMEs
Information Security and Computer Fraud. 2018, 6(1), 1-7. DOI: 10.12691/iscf-6-1-1
Pub. Date: December 03, 2018Views: 1286Downloads: 868
Open AccessArticle
Export: RIS | BibTeX | EndNote
The Security File System in Smart TV Operating System
Information Security and Computer Fraud. 2014, 2(3), 48-51. DOI: 10.12691/iscf-2-3-3
Pub. Date: December 30, 2014Views: 7818Downloads: 3896
Open AccessArticle
Export: RIS | BibTeX | EndNote
Analyse the Risks of Ad Hoc Programming in Web Development and Develop a Metrics of Appropriate Tools
American Journal of Information Systems. 2013, 1(1), 9-20. DOI: 10.12691/ajis-1-1-2
Pub. Date: November 21, 2013Views: 19508Downloads: 14053
Figure of 9
Results: sort by Relevance

Filter by

Date

Published between:

and

Subjects

Journals



Article Types