设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
院士团队服务(20)
在“
Elsevier电子期刊
”中,
命中:
34,166
条,耗时:小于0.01 秒
在所有数据库中总计命中:
20
条
1.
Security
knowledge representation artifacts for creating secure IT systems
作者:
Jose Fran. Ruiz
a
;
jose.ruizr@atos.net" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Marcos Arjona
b
;
marcos@lcc.uma.es" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Antonio Mañ
;
a
b
;
amg@lcc.uma.es" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Carsten Rudolph
c
;
carsten.rudolph@sit.fraunhofer.de" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Security
engineering process
;
Security
modeling
;
Security
solutions
;
Domain specific tools
;
Security
requirements
刊名:Computers &
Security
出版年:2017
2.
Why employees share information
security
advice? Exploring the contributing factors and structural patterns of
security
advice sharing in the workplace
作者:
Duy Dang-Pham
;
duy.dang@rmit.edu.au
;
Siddhi Pittayachawan
siddhi.pittayachawan@rmit.edu.au
;
Vince Bruno
vince.bruno@rmit.edu.au
关键词:
Information
security
behaviour
;
Information
security
management
;
Knowledge sharing
;
Social network analysis
;
Exponential random graph modeling
刊名:Computers in Human Behavior
出版年:2017
3.
Cloud
security
issues and challenges: A survey
作者:
Ashish Singh
;
ashish.cse15@nitp.ac.in
;
Kakali Chatterjee
kakali@nitp.ac.in
关键词:
Cloud computing
;
Cloud framework
;
Cloud
security
;
Cloud
security
challenges
;
Cloud
security
issues
刊名:Journal of Network and Computer Applications
出版年:2017
4.
Model-based
security
engineering for cyber-physical systems: A systematic mapping study
作者:
Phu H. Nguyen
;
a
;
phu@simula.no
;
nguyenhongphu@gmail.com
;
Shaukat Ali
a
;
Tao Yue
a
;
b
关键词:
Cyber-physical systems
;
Security
;
Model-based engineering
;
Security
engineering
;
Systematic mapping
;
Snowballing
;
Survey
刊名:Information and Software Technology
出版年:2017
5.
Mobile cloud
security
: An adversary model for lightweight browser
security
作者:
Shasi Pokharel
a
;
Kim-Kwang Raymond Choo
b
;
a
;
raymond.choo@fulbrightmail.org" class="auth_mail" title="E-mail the corresponding author
;
Jixue Liu
a
关键词:
Mobile cloud
security
;
Lightweight browser
security
;
UC Browser
;
Dolphin
;
CM Browser
;
Samsung Stock Browser
刊名:Computer Standards & Interfaces
出版年:2017
6.
A dynamic prime number based efficient
security
mechanism for big sensing data streams
作者:
Deepak Puthal
a
;
deepak.puthal@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
Surya Nepal
b
;
surya.nepal@csiro.au" class="auth_mail" title="E-mail the corresponding author
;
Rajiv Ranjan
b
;
c
;
rranjans@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
Jinjun Chen
a
;
jinjun.chen@gmail.com" class="auth_mail" title="E-mail the corresponding author
关键词:
Security
;
Sensor networks
;
Big data stream
;
Key exchange
;
Security
verification
刊名:Journal of Computer and System Sciences
出版年:2017
7.
Energy
security
measurement - A sustainable approach
作者:
Mirjana Radovanović
a
;
mirjanagolusin@sbb.rs
;
Sanja Filipović
b
;
sanja.filipovic@ecinst.org.rs
;
Dejan Pavlović
c
;
dejan.pavlovic@nis.eu
关键词:
Energy
security
;
Quantification
;
Sustainable approach
刊名:Renewable and Sustainable Energy Reviews
出版年:2017
8.
Individual differences and Information
Security
Awareness
作者:
Agata McCormac
a
;
agata.mccormac@dsto.defence.gov.au
;
Tara Zwaans
b
;
tara.zwaans@student.adelaide.edu.au
;
Kathryn Parsons
a
;
kathryn.parsons@dsto.defence.gov.au
;
Dragana Calic
a
;
dragana.calic@dsto.defence.gov.au
;
Marcus Butavicius
a
;
marcus.butavicius@dsto.defence.gov.au
;
Malcolm Pattinson
c
;
malcolm.pattinson@adelaide.edu.au
关键词:
Information
Security
Awareness (ISA)
;
Information
security
(InfoSec)
;
Cyber
security
;
Personality
;
Risk
;
Individual differences
刊名:Computers in Human Behavior
出版年:2017
9.
A survey on device-to-device (D2D) communication: Architecture and
security
issues
作者:
Pimmy Gandotra
a
;
pimmy.gandotra@gmail.com
Author Vitae
;
Rakesh Kumar Jha
a
;
1
;
jharakesh.45@gmail.com
Author Vitae
;
Sanjeev Jain
b
;
dr_sanjeevjain@yahoo.com
Author Vitae
关键词:
Device-to-device (D2D) communication
;
Spectral efficiency
;
Resource allocation
;
Security
;
InternetProtocol
Security
(IP Sec)
刊名:Journal of Network and Computer Applications
出版年:2017
10.
An ecological network analysis of the structure, development and sustainability of China’s natural gas supply system
security
作者:
Faheemullah Shaikh
a
;
b
;
c
;
engrfaheemshaikh@gmail.com
;
Qiang Ji
a
;
1
;
jqwxnjq@163.com
;
Ying Fan
d
;
engrfaheemshaikh@gmail.com
关键词:
Ecological network analysis
;
Energy
security
;
China&rsquo
;
s natural gas supply
security
policy
刊名:Ecological Indicators
出版年:2017
1
2
3
4
5
6
7
8
9
查看站内搜索结果(2)
按检索点细分(34166)
刊名(13537)
题名(6840)
作者(15)
关键词(6679)
文摘(19956)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.