This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Gollmann, D. (2010). Computer security. Wiley Interdisciplinary Reviews: Computational Statistics, 2(5), 544-554.GollmannD. (2010). Computer security. Wiley Interdisciplinary Reviews: Computational Statistics, 2(5), 544-554.Search in Google Scholar
Pieprzyk, J., Hardjono, T., & Seberry, J. (2013). Fundamentals of computer security. Springer Science & Business Media.PieprzykJ.HardjonoT.SeberryJ. (2013). Fundamentals of computer security. Springer Science & Business Media.Search in Google Scholar
Carroll, J. M. (2014). Computer security. Butterworth-Heinemann.CarrollJ. M. (2014). Computer security. Butterworth-Heinemann.Search in Google Scholar
van Oorschot, P. C. (2020). Computer Security and the Internet. Springer International Publishing.van OorschotP. C. (2020). Computer Security and the Internet. Springer International Publishing.Search in Google Scholar
Denning, T., Kohno, T., & Levy, H. M. (2013). Computer security and the modern home. Communications of the ACM, 56(1), 94-103.DenningT.KohnoT.LevyH. M. (2013). Computer security and the modern home. Communications of the ACM, 56(1), 94-103.Search in Google Scholar
Hsiao, D. K., Kerr, D. S., & Madnick, S. E. (2014). Computer security. Academic Press.HsiaoD. K.KerrD. S.MadnickS. E. (2014). Computer security. Academic Press.Search in Google Scholar
Stallings, W., & Brown, L. (2015). Computer security: principles and practice. Pearson.StallingsW.BrownL. (2015). Computer security: principles and practice. Pearson.Search in Google Scholar
Easttom, C. (2019). Computer security fundamentals. Pearson IT certification.EasttomC. (2019). Computer security fundamentals. Pearson IT certification.Search in Google Scholar
Pfleeger, C. P., & Pfleeger, S. L. (2012). Analyzing computer security: A threat/vulnerability/countermeasure approach. Prentice Hall Professional.PfleegerC. P.PfleegerS. L. (2012). Analyzing computer security: A threat/vulnerability/countermeasure approach. Prentice Hall Professional.Search in Google Scholar
Kizza, J. M., Kizza, W., & Wheeler. (2013). Guide to computer network security (Vol. 8). Berlin: Springer.KizzaJ. M.KizzaW.Wheeler (2013). Guide to computer network security (Vol. 8). Berlin: Springer.Search in Google Scholar
Tang, Y., & Elhoseny, M. (2019). Computer network security evaluation simulation model based on neural network. Journal of Intelligent & Fuzzy Systems, 37(3), 3197-3204.TangY.ElhosenyM. (2019). Computer network security evaluation simulation model based on neural network. Journal of Intelligent & Fuzzy Systems, 37(3), 3197-3204.Search in Google Scholar
Wolf, W., White, G. B., Fisch, E. A., Crago, S. P., Pooch, U. W., McMahon, J. O., … & Lebak, J. M. (2017). Computer system and network security. CRC press.WolfW.WhiteG. B.FischE. A.CragoS. P.PoochU. W.McMahonJ. O.LebakJ. M. (2017). Computer system and network security. CRC press.Search in Google Scholar
Bjørn, P., Esbensen, M., Jensen, R. E., & Matthiesen, S. (2014). Does distance still matter? Revisiting the CSCW fundamentals on distributed collaboration. ACM Transactions on Computer-Human Interaction (TOCHI), 21(5), 1-26.BjørnP.EsbensenM.JensenR. E.MatthiesenS. (2014). Does distance still matter? Revisiting the CSCW fundamentals on distributed collaboration. ACM Transactions on Computer-Human Interaction (TOCHI), 21(5), 1-26.Search in Google Scholar
Meng, G., Liu, Y., Zhang, J., Pokluda, A., & Boutaba, R. (2015). Collaborative security: A survey and taxonomy. ACM Computing Surveys (CSUR), 48(1), 1-42.MengG.LiuY.ZhangJ.PokludaA.BoutabaR. (2015). Collaborative security: A survey and taxonomy. ACM Computing Surveys (CSUR), 48(1), 1-42.Search in Google Scholar
Kumari, A., Mishra, S., & Kushwaha, D. S. (2010). A new collaborative trust enhanced security model for distributed system. International Journal of Computer Applications, 1(26), 127-134.KumariA.MishraS.KushwahaD. S. (2010). A new collaborative trust enhanced security model for distributed system. International Journal of Computer Applications, 1(26), 127-134.Search in Google Scholar
Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based forensic analysis for collaborative network security management system. Tsinghua science and technology, 18(1), 40-50.ChenZ.HanF.CaoJ.JiangX.ChenS. (2013). Cloud computing-based forensic analysis for collaborative network security management system. Tsinghua science and technology, 18(1), 40-50.Search in Google Scholar
Galinec, D., Možnik, D., & Guberina, B. (2017). Cybersecurity and cyber defence: national level strategic approach. Automatika: časopis za automatiku, mjerenje, elektroniku, računarstvo i komunikacije, 58(3), 273-286.GalinecD.MožnikD.GuberinaB. (2017). Cybersecurity and cyber defence: national level strategic approach. Automatika: časopis za automatiku, mjerenje, elektroniku, računarstvo i komunikacije, 58(3), 273-286.Search in Google Scholar
Oyelami, J. O., & Kassim, A. M. (2020). Cyber security defence policies: A proposed guidelines for organisations cyber security practices. International Journal of Advanced Computer Science and Applications, 11(8).OyelamiJ. O.KassimA. M. (2020). Cyber security defence policies: A proposed guidelines for organisations cyber security practices. International Journal of Advanced Computer Science and Applications, 11(8.Search in Google Scholar
Aljumah, A., & Ahanger, T. A. (2020). Cyber security threats, challenges and defence mechanisms in cloud computing. IET communications, 14(7), 1185-1191.AljumahA.AhangerT. A. (2020). Cyber security threats, challenges and defence mechanisms in cloud computing. IET communications, 14(7), 1185-1191.Search in Google Scholar
Dongdong Xie,Yonggang Zheng,Bo Wang,Shengli Xu,Yongfeng Sui & Qiang Gao. (2024). A method for static analysis of multistage cyclic structure based on group theory and two-stage Guyan reduction. Computers and Structures107548-107548.XieDongdongZhengYonggangWangBoXuShengliSuiYongfengGaoQiang (2024). A method for static analysis of multistage cyclic structure based on group theory and two-stage Guyan reduction. Computers and Structures107548-107548.Search in Google Scholar
Rabas Tomáš,Buček Jiří & Lórencz Róbert. (2024). Single-Trace Side-Channel Attacks on NTRU Implementation. SN Computer Science(2).TomášRabasJiříBučekRóbertLórencz (2024). Single-Trace Side-Channel Attacks on NTRU Implementation. SN Computer Science(2).Search in Google Scholar
Andrea Flamini,Giada Sciarretta,Mario Scuro,Amir Sharif,Alessandro Tomasi & Silvio Ranise. (2024). On cryptographic mechanisms for the selective disclosure of verifiable credentials. Journal of Information Security and Applications103789-.FlaminiAndreaSciarrettaGiadaScuroMarioSharifAmirTomasiAlessandroRaniseSilvio (2024). On cryptographic mechanisms for the selective disclosure of verifiable credentials. Journal of Information Security and Applications103789-.Search in Google Scholar
Alexandru Marius Bonteanu & Cătălin Tudose. (2024). Performance Analysis and Improvement for CRUD Operations in Relational Databases from Java Programs Using JPA, Hibernate, Spring Data JPA. Applied Sciences(7).BonteanuAlexandru MariusTudoseCătălin (2024). Performance Analysis and Improvement for CRUD Operations in Relational Databases from Java Programs Using JPA, Hibernate, Spring Data JPA. Applied Sciences(7).Search in Google Scholar
Rong Xue,Jiping Wang,Yiming Chen,Zhejian Zhang,Zhichao Xiao & Hongyan Xia. (2023). A hybrid graphite powder PFC@G for reserving higher carbon content of self-lubrication graphite/SiC composites by RMI. Journal of the American Ceramic Society(10),6317-6329.XueRongWangJipingChenYimingZhangZhejianXiaoZhichaoXiaHongyan (2023). A hybrid graphite powder PFC@G for reserving higher carbon content of self-lubrication graphite/SiC composites by RMI. Journal of the American Ceramic Society(10),6317-6329.Search in Google Scholar