When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. IEEE Security & Privacy - Wikipedia

    en.wikipedia.org/wiki/IEEE_Security_&_Privacy

    Main page; Contents; Current events; Random article; About Wikipedia; Contact us; Help; Learn to edit; Community portal; Recent changes; Upload file

  3. Sushil Jajodia - Wikipedia

    en.wikipedia.org/wiki/Sushil_Jajodia

    Sushil Jajodia’s research interests include security, privacy, databases, and distributed systems. [6] [7] He has authored or coauthored seven books, edited 53 books and conference proceedings, and published more than 500 technical papers in the refereed journals and conference proceedings.

  4. List of IEEE publications - Wikipedia

    en.wikipedia.org/wiki/List_of_IEEE_publications

    In addition, the IEEE Standards Association maintains over 1,300 standards in engineering. Some of the journals are published in association with other societies, like the Association for Computing Machinery (ACM), the American Society of Mechanical Engineers (ASME), the Optical Society (OSA), and the Minerals, Metals & Materials Society (TMS).

  5. IEEE Xplore - Wikipedia

    en.wikipedia.org/wiki/IEEE_Xplore

    IEEE Xplore (stylized as IEEE Xplore) digital library is a research database for discovery and access to journal articles, conference proceedings, technical standards, and related materials on computer science, electrical engineering and electronics, and allied fields.

  6. Category:Cybersecurity engineering - Wikipedia

    en.wikipedia.org/wiki/Category:Cybersecurity...

    Cybersecurity engineering focuses on the design, implementation, and management of systems to protect computer networks, data, and applications from cyber threats. It involves developing security protocols, risk assessments, and defense mechanisms to prevent unauthorized access, data breaches, and attacks.

  7. Cybersecurity engineering - Wikipedia

    en.wikipedia.org/wiki/Cybersecurity_engineering

    Cybersecurity engineering is a tech discipline focused on the protection of systems, networks, and data from unauthorized access, cyberattacks, and other malicious activities. It applies engineering principles to the design, implementation, maintenance, and evaluation of secure systems, ensuring the integrity, confidentiality, and availability ...

  8. Virgil D. Gligor - Wikipedia

    en.wikipedia.org/wiki/Virgil_D._Gligor

    He and his students published all DoS research papers during the 1980s, including the Yu-Gligor model. [8] In the mid’ 80s he and Gary Luckenbaugh were the principal designers of the Secure Xenix , [ 9 ] [ 10 ] which was the first Unix-class commodity operating system to be evaluated at the B2 security level according to the NSA’s TCSEC.

  9. Proceedings of the IEEE - Wikipedia

    en.wikipedia.org/wiki/Proceedings_of_the_IEEE

    Proceedings of the IEEE provides in-depth review, survey, and tutorial coverage of the technical developments in electronics, electrical and computer engineering, and computer science. Reviews critically examine a technology, tracing its progress from its inception to the present—and perhaps into the future.