Accès libre

Research on Group Theory Strategies in Computer Security Mechanisms and Collaborative Defense Techniques for Distributed Systems

  
19 mars 2025
À propos de cet article

Citez
Télécharger la couverture

Gollmann, D. (2010). Computer security. Wiley Interdisciplinary Reviews: Computational Statistics, 2(5), 544-554. Gollmann D. ( 2010 ). Computer security . Wiley Interdisciplinary Reviews: Computational Statistics , 2 ( 5 ), 544 - 554 . Search in Google Scholar

Pieprzyk, J., Hardjono, T., & Seberry, J. (2013). Fundamentals of computer security. Springer Science & Business Media. Pieprzyk J. Hardjono T. Seberry J. ( 2013 ). Fundamentals of computer security . Springer Science & Business Media . Search in Google Scholar

Carroll, J. M. (2014). Computer security. Butterworth-Heinemann. Carroll J. M. ( 2014 ). Computer security . Butterworth-Heinemann . Search in Google Scholar

van Oorschot, P. C. (2020). Computer Security and the Internet. Springer International Publishing. van Oorschot P. C. ( 2020 ). Computer Security and the Internet . Springer International Publishing . Search in Google Scholar

Denning, T., Kohno, T., & Levy, H. M. (2013). Computer security and the modern home. Communications of the ACM, 56(1), 94-103. Denning T. Kohno T. Levy H. M. ( 2013 ). Computer security and the modern home . Communications of the ACM , 56 ( 1 ), 94 - 103 . Search in Google Scholar

Hsiao, D. K., Kerr, D. S., & Madnick, S. E. (2014). Computer security. Academic Press. Hsiao D. K. Kerr D. S. Madnick S. E. ( 2014 ). Computer security . Academic Press . Search in Google Scholar

Stallings, W., & Brown, L. (2015). Computer security: principles and practice. Pearson. Stallings W. Brown L. ( 2015 ). Computer security: principles and practice . Pearson . Search in Google Scholar

Easttom, C. (2019). Computer security fundamentals. Pearson IT certification. Easttom C. ( 2019 ). Computer security fundamentals . Pearson IT certification . Search in Google Scholar

Pfleeger, C. P., & Pfleeger, S. L. (2012). Analyzing computer security: A threat/vulnerability/countermeasure approach. Prentice Hall Professional. Pfleeger C. P. Pfleeger S. L. ( 2012 ). Analyzing computer security: A threat/vulnerability/countermeasure approach . Prentice Hall Professional . Search in Google Scholar

Kizza, J. M., Kizza, W., & Wheeler. (2013). Guide to computer network security (Vol. 8). Berlin: Springer. Kizza J. M. Kizza W. Wheeler ( 2013 ). Guide to computer network security (Vol. 8 ). Berlin : Springer . Search in Google Scholar

Tang, Y., & Elhoseny, M. (2019). Computer network security evaluation simulation model based on neural network. Journal of Intelligent & Fuzzy Systems, 37(3), 3197-3204. Tang Y. Elhoseny M. ( 2019 ). Computer network security evaluation simulation model based on neural network . Journal of Intelligent & Fuzzy Systems , 37 ( 3 ), 3197 - 3204 . Search in Google Scholar

Wolf, W., White, G. B., Fisch, E. A., Crago, S. P., Pooch, U. W., McMahon, J. O., … & Lebak, J. M. (2017). Computer system and network security. CRC press. Wolf W. White G. B. Fisch E. A. Crago S. P. Pooch U. W. McMahon J. O. Lebak J. M. ( 2017 ). Computer system and network security . CRC press . Search in Google Scholar

Bjørn, P., Esbensen, M., Jensen, R. E., & Matthiesen, S. (2014). Does distance still matter? Revisiting the CSCW fundamentals on distributed collaboration. ACM Transactions on Computer-Human Interaction (TOCHI), 21(5), 1-26. Bjørn P. Esbensen M. Jensen R. E. Matthiesen S. ( 2014 ). Does distance still matter? Revisiting the CSCW fundamentals on distributed collaboration . ACM Transactions on Computer-Human Interaction (TOCHI) , 21 ( 5 ), 1 - 26 . Search in Google Scholar

Meng, G., Liu, Y., Zhang, J., Pokluda, A., & Boutaba, R. (2015). Collaborative security: A survey and taxonomy. ACM Computing Surveys (CSUR), 48(1), 1-42. Meng G. Liu Y. Zhang J. Pokluda A. Boutaba R. ( 2015 ). Collaborative security: A survey and taxonomy . ACM Computing Surveys (CSUR) , 48 ( 1 ), 1 - 42 . Search in Google Scholar

Kumari, A., Mishra, S., & Kushwaha, D. S. (2010). A new collaborative trust enhanced security model for distributed system. International Journal of Computer Applications, 1(26), 127-134. Kumari A. Mishra S. Kushwaha D. S. ( 2010 ). A new collaborative trust enhanced security model for distributed system . International Journal of Computer Applications , 1 ( 26 ), 127 - 134 . Search in Google Scholar

Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based forensic analysis for collaborative network security management system. Tsinghua science and technology, 18(1), 40-50. Chen Z. Han F. Cao J. Jiang X. Chen S. ( 2013 ). Cloud computing-based forensic analysis for collaborative network security management system . Tsinghua science and technology , 18 ( 1 ), 40 - 50 . Search in Google Scholar

Galinec, D., Možnik, D., & Guberina, B. (2017). Cybersecurity and cyber defence: national level strategic approach. Automatika: časopis za automatiku, mjerenje, elektroniku, računarstvo i komunikacije, 58(3), 273-286. Galinec D. Možnik D. Guberina B. ( 2017 ). Cybersecurity and cyber defence: national level strategic approach . Automatika: časopis za automatiku, mjerenje, elektroniku, računarstvo i komunikacije , 58 ( 3 ), 273 - 286 . Search in Google Scholar

Oyelami, J. O., & Kassim, A. M. (2020). Cyber security defence policies: A proposed guidelines for organisations cyber security practices. International Journal of Advanced Computer Science and Applications, 11(8). Oyelami J. O. Kassim A. M. ( 2020 ). Cyber security defence policies: A proposed guidelines for organisations cyber security practices . International Journal of Advanced Computer Science and Applications , 11 ( 8 . Search in Google Scholar

Aljumah, A., & Ahanger, T. A. (2020). Cyber security threats, challenges and defence mechanisms in cloud computing. IET communications, 14(7), 1185-1191. Aljumah A. Ahanger T. A. ( 2020 ). Cyber security threats, challenges and defence mechanisms in cloud computing . IET communications , 14 ( 7 ), 1185 - 1191 . Search in Google Scholar

Dongdong Xie,Yonggang Zheng,Bo Wang,Shengli Xu,Yongfeng Sui & Qiang Gao. (2024). A method for static analysis of multistage cyclic structure based on group theory and two-stage Guyan reduction. Computers and Structures107548-107548. Xie Dongdong Zheng Yonggang Wang Bo Xu Shengli Sui Yongfeng Gao Qiang ( 2024 ). A method for static analysis of multistage cyclic structure based on group theory and two-stage Guyan reduction . Computers and Structures 107548 - 107548 . Search in Google Scholar

Rabas Tomáš,Buček Jiří & Lórencz Róbert. (2024). Single-Trace Side-Channel Attacks on NTRU Implementation. SN Computer Science(2). Tomáš Rabas Jiří Buček Róbert Lórencz ( 2024 ). Single-Trace Side-Channel Attacks on NTRU Implementation . SN Computer Science ( 2 ). Search in Google Scholar

Andrea Flamini,Giada Sciarretta,Mario Scuro,Amir Sharif,Alessandro Tomasi & Silvio Ranise. (2024). On cryptographic mechanisms for the selective disclosure of verifiable credentials. Journal of Information Security and Applications103789-. Flamini Andrea Sciarretta Giada Scuro Mario Sharif Amir Tomasi Alessandro Ranise Silvio ( 2024 ). On cryptographic mechanisms for the selective disclosure of verifiable credentials . Journal of Information Security and Applications 103789 -. Search in Google Scholar

Alexandru Marius Bonteanu & Cătălin Tudose. (2024). Performance Analysis and Improvement for CRUD Operations in Relational Databases from Java Programs Using JPA, Hibernate, Spring Data JPA. Applied Sciences(7). Bonteanu Alexandru Marius Tudose Cătălin ( 2024 ). Performance Analysis and Improvement for CRUD Operations in Relational Databases from Java Programs Using JPA, Hibernate, Spring Data JPA . Applied Sciences ( 7 ). Search in Google Scholar

Rong Xue,Jiping Wang,Yiming Chen,Zhejian Zhang,Zhichao Xiao & Hongyan Xia. (2023). A hybrid graphite powder PFC@G for reserving higher carbon content of self-lubrication graphite/SiC composites by RMI. Journal of the American Ceramic Society(10),6317-6329. Xue Rong Wang Jiping Chen Yiming Zhang Zhejian Xiao Zhichao Xia Hongyan ( 2023 ). A hybrid graphite powder PFC@G for reserving higher carbon content of self-lubrication graphite/SiC composites by RMI . Journal of the American Ceramic Society ( 10 ), 6317 - 6329 . Search in Google Scholar