Printer Friendly

Browse Internet security topic

Usage subtopic


1-30 out of 30 article(s)
Title Author Type Date Words
Safer Internet Day 2021: what is it, how to take part in the BBC live lessons and top tips for internet safety; The awareness day of internet safety promotes key ways to keep children safe online, as nearly 70 percent of teens now use Facebook and Snapchat. Chelsea Rocks Feb 9, 2021 1330
Breaches are old news, but have we learned our lesson? Jul 14, 2020 1019
Technology for Studio Safety: Online, Offline, and Everywhere in Between. Kirk, Shana Apr 1, 2020 779
Surge in cloud usage drives steep rise in cybersecurity spending. Chris Kelly Feb 17, 2020 357
Eliminating Rogue Femtocells for IoT Open Meter System Based on Expert System. Xiao, Yong; Qian, Bin; Cai, Ziwen; Hong, Liang; Su, Sheng Dec 31, 2019 5270
Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT. Yin, Mingyong; Chen, Xingshu; Wang, Qixu; Wang, Wei; Wang, Yulong Sep 30, 2019 7264
Use of Cyber War as a Force Multiplier in US-Iran escalation. Jul 1, 2019 1241
Resilient Cyber-Physical Systems and Big Data Architectures in Industry 4.0: Smart Digital Factories, Automated Production Systems, and Innovative Sustainable Business Models. Nica, Elvira; Potcovaru, Ana-Madalina; Hurdubei, Roxana Elisabeta "Ionescu" Jun 1, 2019 1668
Don't Stifle It: Rules need to manage privacy and cybersecurity developments without suppressing insurers' uses of data. Augustinos, Theodore P. May 1, 2019 551
Facebook lets people look up your profile using your 'security' phone number; Online security experts claim Facebook is putting its users at risk. Sophie Curtis Mar 5, 2019 640
Network Forensics Analysis of Man in the Middle Attack Using Live Forensics Method. Saputra, Dedy; Riadi, Imam Jan 1, 2019 3583
Pentesting: A crucial element of cybersecurity. White, Dominic Dec 1, 2018 532
Development and Evaluation of Intelligent Network Forensic System LIFT Using Bayesian Network for Targeted Attack Detection and Prevention. Sasaki, Ryoichi; Yamaki, Hiroshi; Kakizaki, Yoshio; Shimazaki, Kazuki; Terada, Masato; Uehara, Tetsu Oct 1, 2018 4632
Perceived Risks in Online Shopping for Non Users of Internet--An Empirical Study in New Delhi. Tuteja, Geetu; Goyal, Falak Report Apr 1, 2018 5099
Maintaining a Cybersecurity Curriculum: Professional Certifications as Valuable Guidance. Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava Case study Dec 1, 2017 8293
Feature Selection Algorithm for Intrusions Detection System using Sequential Forward Search and Random Forest Classifier. Lee, Jinlee; Park, Dooho; Lee, Changhoon Report Oct 1, 2017 6176
How to use the world economic forum's cybersecurity principles. George, Torsten Jun 1, 2017 718
Cyberspace and the New World Order. Ciot, Melania-Gabriela Report Jun 1, 2017 2790
Cyber Defence and National Defence. Jul 31, 2016 997
Implementation of SlowDroid: Slow DoS Attack Performed by a Smartphone. Cambiaso, Enrico; Papaleo, Gianluca; Aiello, Maurizio Jul 1, 2015 5734
Detection of URL based attacks using reduced feature set and modified C4.5 algorithm. Rakesh, R.; Muthurajkumar, S.; SaiRamesh, L.; Vijayalakshmi, M.; Kannan A. Report Jun 1, 2015 3702
'Don't be bystanders on internet safety' Today is Safer Internet Day, a global event which promotes the safe and responsible use of online technology and mobile phones for children and young people. Rachael Misstear reports on a 21st century issue... Feb 11, 2014 1411
NSA Able to Target Offline Computers Using Radio Waves for Surveillance, Cyber Attacks. Jan 15, 2014 306
Disney's safety guide to the Web; there's plenty of internet safety advice availablefor parents, but LISA SALMON looks at a new guide that explains how mums and dads can best help kids have fun learning online too. Oct 20, 2012 912
Travel Technology Business News Alert - North America. Apr 16, 2012 1394
Session teaching online safety. Mar 7, 2011 192
Network security: it's one area where you simply can't afford to take risks. Wayne, Mark Apr 1, 2005 597
Oh what a tangled Web: many Web applications, from complex online banking pages to simple Web forms, are rife with exploitable weaknesses. Is your company at risk? Piazza, Peter Sep 1, 2004 2881
Security alert! The constant threat of worms, viruses, and spyware hacks has builders wondering where to turn. Start your security program by following these eight steps. Zurier, Steve Feb 1, 2004 1878

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters