Accesso libero

Research on Group Theory Strategies in Computer Security Mechanisms and Collaborative Defense Techniques for Distributed Systems

  
19 mar 2025
INFORMAZIONI SU QUESTO ARTICOLO

Cita
Scarica la copertina

Gollmann, D. (2010). Computer security. Wiley Interdisciplinary Reviews: Computational Statistics, 2(5), 544-554. Gollmann D. ( 2010 ). Computer security . Wiley Interdisciplinary Reviews: Computational Statistics , 2 ( 5 ), 544 - 554 . Search in Google Scholar

Pieprzyk, J., Hardjono, T., & Seberry, J. (2013). Fundamentals of computer security. Springer Science & Business Media. Pieprzyk J. Hardjono T. Seberry J. ( 2013 ). Fundamentals of computer security . Springer Science & Business Media . Search in Google Scholar

Carroll, J. M. (2014). Computer security. Butterworth-Heinemann. Carroll J. M. ( 2014 ). Computer security . Butterworth-Heinemann . Search in Google Scholar

van Oorschot, P. C. (2020). Computer Security and the Internet. Springer International Publishing. van Oorschot P. C. ( 2020 ). Computer Security and the Internet . Springer International Publishing . Search in Google Scholar

Denning, T., Kohno, T., & Levy, H. M. (2013). Computer security and the modern home. Communications of the ACM, 56(1), 94-103. Denning T. Kohno T. Levy H. M. ( 2013 ). Computer security and the modern home . Communications of the ACM , 56 ( 1 ), 94 - 103 . Search in Google Scholar

Hsiao, D. K., Kerr, D. S., & Madnick, S. E. (2014). Computer security. Academic Press. Hsiao D. K. Kerr D. S. Madnick S. E. ( 2014 ). Computer security . Academic Press . Search in Google Scholar

Stallings, W., & Brown, L. (2015). Computer security: principles and practice. Pearson. Stallings W. Brown L. ( 2015 ). Computer security: principles and practice . Pearson . Search in Google Scholar

Easttom, C. (2019). Computer security fundamentals. Pearson IT certification. Easttom C. ( 2019 ). Computer security fundamentals . Pearson IT certification . Search in Google Scholar

Pfleeger, C. P., & Pfleeger, S. L. (2012). Analyzing computer security: A threat/vulnerability/countermeasure approach. Prentice Hall Professional. Pfleeger C. P. Pfleeger S. L. ( 2012 ). Analyzing computer security: A threat/vulnerability/countermeasure approach . Prentice Hall Professional . Search in Google Scholar

Kizza, J. M., Kizza, W., & Wheeler. (2013). Guide to computer network security (Vol. 8). Berlin: Springer. Kizza J. M. Kizza W. Wheeler ( 2013 ). Guide to computer network security (Vol. 8 ). Berlin : Springer . Search in Google Scholar

Tang, Y., & Elhoseny, M. (2019). Computer network security evaluation simulation model based on neural network. Journal of Intelligent & Fuzzy Systems, 37(3), 3197-3204. Tang Y. Elhoseny M. ( 2019 ). Computer network security evaluation simulation model based on neural network . Journal of Intelligent & Fuzzy Systems , 37 ( 3 ), 3197 - 3204 . Search in Google Scholar

Wolf, W., White, G. B., Fisch, E. A., Crago, S. P., Pooch, U. W., McMahon, J. O., … & Lebak, J. M. (2017). Computer system and network security. CRC press. Wolf W. White G. B. Fisch E. A. Crago S. P. Pooch U. W. McMahon J. O. Lebak J. M. ( 2017 ). Computer system and network security . CRC press . Search in Google Scholar

Bjørn, P., Esbensen, M., Jensen, R. E., & Matthiesen, S. (2014). Does distance still matter? Revisiting the CSCW fundamentals on distributed collaboration. ACM Transactions on Computer-Human Interaction (TOCHI), 21(5), 1-26. Bjørn P. Esbensen M. Jensen R. E. Matthiesen S. ( 2014 ). Does distance still matter? Revisiting the CSCW fundamentals on distributed collaboration . ACM Transactions on Computer-Human Interaction (TOCHI) , 21 ( 5 ), 1 - 26 . Search in Google Scholar

Meng, G., Liu, Y., Zhang, J., Pokluda, A., & Boutaba, R. (2015). Collaborative security: A survey and taxonomy. ACM Computing Surveys (CSUR), 48(1), 1-42. Meng G. Liu Y. Zhang J. Pokluda A. Boutaba R. ( 2015 ). Collaborative security: A survey and taxonomy . ACM Computing Surveys (CSUR) , 48 ( 1 ), 1 - 42 . Search in Google Scholar

Kumari, A., Mishra, S., & Kushwaha, D. S. (2010). A new collaborative trust enhanced security model for distributed system. International Journal of Computer Applications, 1(26), 127-134. Kumari A. Mishra S. Kushwaha D. S. ( 2010 ). A new collaborative trust enhanced security model for distributed system . International Journal of Computer Applications , 1 ( 26 ), 127 - 134 . Search in Google Scholar

Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based forensic analysis for collaborative network security management system. Tsinghua science and technology, 18(1), 40-50. Chen Z. Han F. Cao J. Jiang X. Chen S. ( 2013 ). Cloud computing-based forensic analysis for collaborative network security management system . Tsinghua science and technology , 18 ( 1 ), 40 - 50 . Search in Google Scholar

Galinec, D., Možnik, D., & Guberina, B. (2017). Cybersecurity and cyber defence: national level strategic approach. Automatika: časopis za automatiku, mjerenje, elektroniku, računarstvo i komunikacije, 58(3), 273-286. Galinec D. Možnik D. Guberina B. ( 2017 ). Cybersecurity and cyber defence: national level strategic approach . Automatika: časopis za automatiku, mjerenje, elektroniku, računarstvo i komunikacije , 58 ( 3 ), 273 - 286 . Search in Google Scholar

Oyelami, J. O., & Kassim, A. M. (2020). Cyber security defence policies: A proposed guidelines for organisations cyber security practices. International Journal of Advanced Computer Science and Applications, 11(8). Oyelami J. O. Kassim A. M. ( 2020 ). Cyber security defence policies: A proposed guidelines for organisations cyber security practices . International Journal of Advanced Computer Science and Applications , 11 ( 8 . Search in Google Scholar

Aljumah, A., & Ahanger, T. A. (2020). Cyber security threats, challenges and defence mechanisms in cloud computing. IET communications, 14(7), 1185-1191. Aljumah A. Ahanger T. A. ( 2020 ). Cyber security threats, challenges and defence mechanisms in cloud computing . IET communications , 14 ( 7 ), 1185 - 1191 . Search in Google Scholar

Dongdong Xie,Yonggang Zheng,Bo Wang,Shengli Xu,Yongfeng Sui & Qiang Gao. (2024). A method for static analysis of multistage cyclic structure based on group theory and two-stage Guyan reduction. Computers and Structures107548-107548. Xie Dongdong Zheng Yonggang Wang Bo Xu Shengli Sui Yongfeng Gao Qiang ( 2024 ). A method for static analysis of multistage cyclic structure based on group theory and two-stage Guyan reduction . Computers and Structures 107548 - 107548 . Search in Google Scholar

Rabas Tomáš,Buček Jiří & Lórencz Róbert. (2024). Single-Trace Side-Channel Attacks on NTRU Implementation. SN Computer Science(2). Tomáš Rabas Jiří Buček Róbert Lórencz ( 2024 ). Single-Trace Side-Channel Attacks on NTRU Implementation . SN Computer Science ( 2 ). Search in Google Scholar

Andrea Flamini,Giada Sciarretta,Mario Scuro,Amir Sharif,Alessandro Tomasi & Silvio Ranise. (2024). On cryptographic mechanisms for the selective disclosure of verifiable credentials. Journal of Information Security and Applications103789-. Flamini Andrea Sciarretta Giada Scuro Mario Sharif Amir Tomasi Alessandro Ranise Silvio ( 2024 ). On cryptographic mechanisms for the selective disclosure of verifiable credentials . Journal of Information Security and Applications 103789 -. Search in Google Scholar

Alexandru Marius Bonteanu & Cătălin Tudose. (2024). Performance Analysis and Improvement for CRUD Operations in Relational Databases from Java Programs Using JPA, Hibernate, Spring Data JPA. Applied Sciences(7). Bonteanu Alexandru Marius Tudose Cătălin ( 2024 ). Performance Analysis and Improvement for CRUD Operations in Relational Databases from Java Programs Using JPA, Hibernate, Spring Data JPA . Applied Sciences ( 7 ). Search in Google Scholar

Rong Xue,Jiping Wang,Yiming Chen,Zhejian Zhang,Zhichao Xiao & Hongyan Xia. (2023). A hybrid graphite powder PFC@G for reserving higher carbon content of self-lubrication graphite/SiC composites by RMI. Journal of the American Ceramic Society(10),6317-6329. Xue Rong Wang Jiping Chen Yiming Zhang Zhejian Xiao Zhichao Xia Hongyan ( 2023 ). A hybrid graphite powder PFC@G for reserving higher carbon content of self-lubrication graphite/SiC composites by RMI . Journal of the American Ceramic Society ( 10 ), 6317 - 6329 . Search in Google Scholar

Lingua:
Inglese
Frequenza di pubblicazione:
1 volte all'anno
Argomenti della rivista:
Scienze biologiche, Scienze della vita, altro, Matematica, Matematica applicata, Matematica generale, Fisica, Fisica, altro