×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海电子信息职业技术... [8]
清华大学 [4]
大连理工大学 [3]
地理科学与资源研究所 [2]
软件研究所 [2]
北京大学 [1]
更多...
内容类型
期刊论文 [14]
会议论文 [5]
学位论文 [2]
EI期刊论文 [1]
SCI/SSCI论文 [1]
发表日期
2021 [1]
2019 [3]
2016 [2]
2015 [1]
2014 [1]
2013 [2]
更多...
学科主题
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共23条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Enhancing the security of memory in cloud infrastructure through in-phase change memory data randomisation
期刊论文
IET COMPUTERS AND DIGITAL TECHNIQUES, 2021, 页码: 14
作者:
Zhou, Xianzhong
;
Wang, Ying
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2021/12/01
Keeping secure to the end: a long-term perspective to understand employees' consequence-delayed information security violation
期刊论文
BEHAVIOUR & INFORMATION TECHNOLOGY, 2019, 卷号: 38, 页码: 435-453
作者:
Li, Ying
;
Zhang, Nan
;
Siponen, Mikko
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/02
Information security behaviour
consequence-delayed information security violation
long-term orientation
higher-order needs
stewardship theory
Understanding commitment and apathy in is security extra-role behavior from a person-organization fit perspective
期刊论文
BEHAVIOUR & INFORMATION TECHNOLOGY, 2019, 卷号: 38, 页码: 454-468
作者:
Chen, Hao
;
Li, Wenli
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2019/12/02
Information security
complementary fit
supplementary fit
apathy
security commitment
The effects of moral disengagement and organizational ethical climate on insiders' information security policy violation behavior
期刊论文
INFORMATION TECHNOLOGY & PEOPLE, 2019, 卷号: 32, 页码: 973-992
作者:
Chen, Hao
;
Chau, Patrick Y. K.
;
Li, Wenli
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/02
Moral disengagement
Information security behaviour
Information security policy violation
Organizational ethical climate
Random table and hash coding-based binary code obfuscation against stack trace analysis
期刊论文
IET INFORMATION SECURITY, 2016, 卷号: 10, 期号: 1, 页码: 18-27
作者:
Xie, X
;
Lu, B
;
Gong, DF
;
Luo, XY
;
Liu, FL
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2016/12/13
program diagnostics
reverse engineering
cryptography
hash coding-based binary code obfuscation method
stack trace analysis
random table
thwart reverse engineering
call chains
stack tracing
reverse program analysis
ret instructions
call instructions
Culture dimensions of information systems security in Saudi Arabia national health services
学位论文
: De Montfort University, 2016
作者:
Al-umaran,Saleh
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/24
005.1
Behaviour
theory
Culture
dimensions
Electronic
health
records
Information
security
Organisations
behaviour
Human
behaviour
Culture Dimensions of Information Systems Security in Saudi Arabia National Health Services
期刊论文
International Journal of Social, Education, Economics and Management Engineering, 2015, 卷号: Vol.9 No.2, 页码: 501-505
作者:
FengChen
;
GiampaoloBella
;
SalehAlumaran
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Behaviour
theory
Culture
dimensions
Electronic
health
records
Information
security.
Physical layer security with dynamic behaviour cooperator based on coalitional game
期刊论文
IET Communications, 2014, 卷号: Vol.8 No.8
作者:
Hou, L.
;
Fu, X.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/11/21
Social impacts of the climatic shift around the turn of the 19th century on the North China Plain
EI期刊论文
2013
Fang Xiuqi
;
Xiao Lingbo
;
Wei Zhudeng
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2014/12/31
Climate change
Critical current density (superconductivity)
Disaster prevention
Economics
Food supply
Social impacts of the climatic shift around the turn of the 19th century on the North China Plain
SCI/SSCI论文
2013
Fang X. Q.
;
Xiao L. B.
;
Wei Z. D.
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2014/12/24
climate refugees
impact of climate change
Little Ice Age
North China
Plain
temporal variations
temperature series
linking climate
monsoonal
rain
migration
collapse
reconstruction
vulnerability
africa
sun
©版权所有 ©2017 CSpace - Powered by
CSpace