Zobrazeno 1 - 10
of 91
pro vyhledávání: '"Mario Jino"'
Publikováno v:
Journal of Computer Science and Technology, Vol 5, Iss 02, Pp 100-106 (2005)
Understanding how a user interacts with a system is important if the goal is to deliver a product that meets the user's needs. Use cases constitute a primary source of requirements in a user-centered perspective and are often utilized to derive accep
Externí odkaz:
https://doaj.org/article/b084d543ad1f4f8b957efd2204ff6477
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783031283314
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c61709aa8be63527596254556895e319
https://doi.org/10.1007/978-3-031-28332-1_11
https://doi.org/10.1007/978-3-031-28332-1_11
Publikováno v:
International Journal of Web Portals. 12:57-80
Security assessment is crucial to the implementation and use of secure web portals. Literature reports studies about knowledge representation models for systems assessment and information security areas; however, there is a lack of conceptual formali
Publikováno v:
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA).
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030704155
Virtual Local Area Network (VLAN) is a technology capable of separating networks into specific domains. Attacks on VLANs could affect computing environments causing service interruptions. These attacks exploit vulnerabilities and operating characteri
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ee3159879165e59b1085a2f26a81f00c
https://doi.org/10.1007/978-3-030-70416-2_14
https://doi.org/10.1007/978-3-030-70416-2_14
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030430191
Military commanders follow various principles of war aiming at reducing material and human losses as well as maximizing the advantages in military missions. Military mission operations are increasingly complex due to the intensive use of information
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c964e0c0398f271da5830be90fe0c1f5
https://doi.org/10.1007/978-3-030-43020-7_5
https://doi.org/10.1007/978-3-030-43020-7_5
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030430191
Consumers are heavily dependent on secure and reliable cloud computing services. However, there are various shortcomings in cloud services, such as those concerning performance, security, trust and privacy, among others. Cloud services consumers do n
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1e83a073c9b921d487dd4f942e3163b3
https://doi.org/10.1007/978-3-030-43020-7_14
https://doi.org/10.1007/978-3-030-43020-7_14
Publikováno v:
AICCSA
Nowadays, military cyber-missions are increasingly complex, demanding specific and critical socio-technical operational resources. We propose a conceptual proposal of a system architecture aimed at supporting complex operations of cyber-missions. The
Publikováno v:
AICCSA
Information Security is an aggregation of people effort, processes and technology to help organizations at providing confidentiality, integrity and availability in their information assets. Nowadays, almost all technology services are heavily depende
Autor:
Ricardo Resende de Mendonça, Ferrucio de Franco Rosa, Antonio Carlos Theophilo CostaJr., Mario Jino, Rodrigo Bonacin
Publikováno v:
16th International Conference on Information Technology-New Generations (ITNG 2019) ISBN: 9783030140694
Internet has become the main communication instrument between criminals. Expressions used by criminals are ciphered, by replacing language terms with regionalized and mutant expressions. There is a need to reveal, understand and formalize these obscu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7be9eabff55897e4b449653eff33a92e
https://doi.org/10.1007/978-3-030-14070-0_7
https://doi.org/10.1007/978-3-030-14070-0_7