B
uscar
R
evistas
T
esis
Acceso usuarios
Acceso de usuarios registrados
Identificarse
¿Olvidó su contraseña?
¿Es nuevo?
Regístrese
Ventajas de registrarse
Ayuda
Ir al conteni
d
o
A Study On Tools And Techniques For Business Models
Enita Rosmika
[1]
;
Phong Thanh Nguyen
[2]
;
Oksana M. Gushchina
[3]
[1]
Universitas Amir Hamzah
Universitas Amir Hamzah
Indonesia
[2]
Ho Chi Minh City Open University
Ho Chi Minh City Open University
Vietnam
[3]
Togliatti State University
Togliatti State University
Rusia
Mostrar afiliaciones
+
Localización:
Opción: Revista de Ciencias Humanas y Sociales
,
ISSN
1012-1587,
Nº. Extra 20, 2019
,
págs.
533-548
Idioma:
inglés
Enlaces
Texto completo (
pdf
)
Referencias bibliográficas
Adams, N., Heard, N., Adams, N. and Heard, N., 2014. Data analysis for network cyber-security. World Scientific Publishing Co., Inc..
Alnasser, A., Sun, H. and Jiang, J., 2019. Cyber security challenges and solutions for V2X communications: A survey. Computer Networks, 151,...
Bilal, K., Malik, S.U.R., Khalid, O., Hameed, A., Alvarez, E., Wijayseka- ra, V., Irfan, R., Shrestha, S., Dwivedy, D., Ali, M. and Khan,...
Buczak, A.L. and Guven, E., 2015. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communi-...
Di, M., 2019, February. Design of the Network Security Intrusion Detec- tion System Based on the Cloud Computing. In The International Confer-...
Kantarcioglu, M., 2019, May. Securing Big Data: New Access Control Challenges and Approaches. In Proceedings of the 24th ACM Symposium on...
Mahmood, T. and Afzal, U., 2013, December. Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools....
Mäurer, N. and Schmitt, C., 2019, April. Towards Successful Realization of the LDACS Cybersecurity Architecture: An Updated Datalink Security...
Sani, A.S., Yuan, D., Jin, J., Gao, L., Yu, S. and Dong, Z.Y., 2019. Cyber security framework for Internet of Things-based Energy Internet....
Srinivas, J., Das, A.K. and Kumar, N., 2019. Government regulations in cyber security: Framework, standards and recommendations. Future Gen-...
Verma, A., Khanna, A., Agrawal, A., Darwish, A. and Hassanien, A.E., 2019. Security and Privacy in Smart City Applications and Services: Op-...
Wu, J., Guo, S., Li, J. and Zeng, D., 2016. Big data meet green challenges: Greening big data. IEEE Systems Journal, 10(3), pp.873-887.
Xu, G., Yu, W., Chen, Z., Zhang, H., Moulema, P., Fu, X. and Lu, C., 2015. A cloud computing based system for cyber security management. In-...
Zhao, R., Liu, Y., Zhang, N. and Huang, T., 2017. An optimization model for green supply chain management by using a big data analytic approach....
Zhong, S., Zhong, H., Huang, X., Yang, P., Shi, J., Xie, L. and Wang, K., 2019. Networking Cyber-Physical Systems: Algorithm Fundamentals...
Opciones
Mi Ágora
S
elección
Opciones de artículo
Seleccionado
Opciones de compartir
Opciones de entorno
Sugerencia / Errata
©
2025
INAP
- Todos los derechos reservados
Ayuda
Accesibilidad
Aviso Legal
¿En qué podemos ayudarle?
×
Buscar en la ayuda
Buscar