Information security protection in hybrid office

被引:0
|
作者
Ma, Jun [1 ]
Alias, Syazwina [1 ]
Huang, Chunya [2 ]
机构
[1] SEGi University, Kota Damansara, Selangor, 47810, Malaysia
[2] Guilin Tourism University, Guilin, Guangxi,541006, China
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Computer system firewalls - Computer viruses - Cybersecurity - Floods - User interfaces - Virtual addresses
引用
收藏
页码:21 / 25
相关论文
共 50 条
  • [31] A Hybrid Method of Coreference Resolution in Information Security
    Hu, Yongjin
    Guo, Yuanbo
    Liu, Junxiu
    Zhang, Han
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (02): : 1297 - 1315
  • [32] A hybrid method of coreference resolution in information security
    Hu Y.
    Guo Y.
    Liu J.
    Zhang H.
    Computers, Materials and Continua, 2020, 64 (02): : 1297 - 1315
  • [33] A Conceptual Hybrid Approach for Information Security Governance
    Zaydi, Mounia
    Nassereddine, Bouchaib
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2021, 16 (01): : 47 - 66
  • [34] Exploring the role of gamified information security education systems on information security awareness and protection behavioral intention
    Hao Chen
    Yan Zhang
    Song Zhang
    Tu Lyu
    Education and Information Technologies, 2023, 28 : 15915 - 15948
  • [35] Exploring the role of gamified information security education systems on information security awareness and protection behavioral intention
    Chen, Hao
    Zhang, Yan
    Zhang, Song
    Lyu, Tu
    EDUCATION AND INFORMATION TECHNOLOGIES, 2023, 28 (12) : 15915 - 15948
  • [36] A Latter Day Judas? Security, Diplomatic Protection, and the Foreign Office Security Department, 1955-1987
    Lomas, Daniel W. B.
    INTERNATIONAL HISTORY REVIEW, 2025, 47 (02): : 321 - 340
  • [37] Security Protocols Analysis in Relation to Information Structures Protection
    Grabusts, Peter
    2019 60TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT SCIENCE OF RIGA TECHNICAL UNIVERSITY (ITMS), 2019,
  • [38] Optical security system for the protection of personal identification information
    Doh, YH
    Yoon, JS
    Choi, KH
    Alam, MS
    APPLIED OPTICS, 2005, 44 (05) : 742 - 750
  • [39] SPORTS DATA PRIVACY PROTECTION AND INFORMATION SECURITY MANAGEMENT
    Jin, Biao
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05): : 4390 - 4398
  • [40] Analysis of computer network information security and protection strategy
    Yu, Wenye
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY (ICEMCT-16), 2016, 59 : 1239 - 1242