Keywords: امنیت اطلاعات; Cloud computing; Information security; Cloud security; Data protection; GDPR; Cloud contracts; Cloud governance; Standards;
مقالات ISI ترجمه شده امنیت اطلاعات
Keywords: امنیت اطلاعات; Information security; Risk management; FMEA; Fuzzy theory
Keywords: امنیت اطلاعات; VIKOR; Analytic network process (ANP); DEMATEL; Multiple criteria decision making (MCDM); Information security; Risk control assessment
مقالات ISI امنیت اطلاعات (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: امنیت اطلاعات; Information security; Access control; Inference control; Time-series database; Temporal data;
Keywords: امنیت اطلاعات; Optical image encryption; Information security; Biometric keys;
Keywords: امنیت اطلاعات; Authentications; Key distribution; Information security; Quantum communication; Cryptography;
Keywords: امنیت اطلاعات; Information security; Malware detection; Malware classification; Multinomial classification; Low-level features; Hardware activity;
Keywords: امنیت اطلاعات; Mobile device security; Mobile app installation; Institutionalized trust; Information security; Intent to install;
Keywords: امنیت اطلاعات; Information security; Insider threat; Organisation; Risk; Human factors;
Keywords: امنیت اطلاعات; Information security; Technostress; Role stress; Regulatory focus; Organizational commitment; Compliance intention;
Keywords: امنیت اطلاعات; Security; Information security; Cipher; Encryption; Cryptography; Block cipher; Lightweight block cipher; FPGA; Power; Energy; Low-resource devices; KATAN; KTANTAN;
Keywords: امنیت اطلاعات; Information security; Information security modeling; Quantitative analysis of information leakage; Trust;
Keywords: امنیت اطلاعات; Cybersecurity; Information security; Risk analysis model; Fuzzy decision theory; Fault tree analysis;
Keywords: امنیت اطلاعات; Smart manufacturing; Sustainable manufacturing; Design for manufacturing; Internet of Things; Information security; Cyber-physical systems;
Keywords: امنیت اطلاعات; Readiness assessment; Maturity level; Information security; Privacy; Compliance; Cloud computing; Service provider; Financial payment systems;
Keywords: امنیت اطلاعات; Online privacy; Information security; Social media; Risk perception; Facebook; Precautionary behaviour;
Keywords: امنیت اطلاعات; Patient Centric Big Medical Data; Information security; Privacy; Trust; Access Control;
Keywords: امنیت اطلاعات; Cybersecurity; Information security; Smart grid; Standards; Security requirements; Cyber-physical systems; Industrial control systems; SCADA;
Keywords: امنیت اطلاعات; Data protection; Privacy; Information security; Sensor systems; Communications monitoring; Metadata;
Keywords: امنیت اطلاعات; Smart cities; Information security; Privacy protection; Cyber-physical systems;
Keywords: امنیت اطلاعات; Electronic information; Classification of security systems; Information security; Internet of things; Meta-analysis;
Keywords: امنیت اطلاعات; Information security; Security measures; Security perception; Usability perception; Discrete choice experiments; Discrete choice models; Employees' preferences;
Keywords: امنیت اطلاعات; Reversible data hiding; Peak and zero bins; HS; DE; Information security; Watermarking;
Keywords: امنیت اطلاعات; Information security; Online social networks; Image steganography; Security in social networking; Image and video processing; Uncorrelated color space;
Keywords: امنیت اطلاعات; Information security; Cyber security; Cyberterrorist; Cyberterrorism; Fear appeals; Resilience;
Keywords: امنیت اطلاعات; Social networking services (SNS); Information security; Technology Acceptance Model (TAM); Theory of Planned Behavior (TPB); Trust; Perceived risk;
Keywords: امنیت اطلاعات; Digital watermarking; Disclosure; Fidelity metric; Gap; Geospatial map; Information security; Overlap; Topology preservation;
Keywords: امنیت اطلاعات; Password security; Memorability; Human memory; Metamemory; Information security; Authentication;
Keywords: امنیت اطلاعات; Information security; Software vulnerability; Text analysis; Multi-target classification;
Keywords: امنیت اطلاعات; Information Security; Social Engineering; Cyber Crime; Semantic Attacks; Intrusion detection;
Keywords: امنیت اطلاعات; information security; project management; investment and construction projects; life cycle;
Keywords: امنیت اطلاعات; Academic journals; Predatory journals; Hijacked journals; Journals' websites; Information security;
Keywords: امنیت اطلاعات; Image encryption; Optical information processing; Fourier optics; Information security;
Keywords: امنیت اطلاعات; Cloaking; Time-domain analysis; Optical fiber dispersion; Optical communication; Information security;
Keywords: امنیت اطلاعات; Information Security; Information Security Policy; IS Awareness; ISP Maturity; Case Study;
Keywords: امنیت اطلاعات; Document recovery; Character stroke; Shred stitching; Information security;
Keywords: امنیت اطلاعات; cybersecurity; information security; cyberphysical system; cyberphysical society; cyber war; Internet of Things; framing; communication; evidence-based policymaking;
Keywords: امنیت اطلاعات; Telemedicine; Telepsychiatry; Consult; Collaborative; Mental health; Child psychiatry; System of care; Information security;
Keywords: امنیت اطلاعات; Cybersecurity; Information Sharing; Data Swapping; Data Privacy; Information Security;
Keywords: امنیت اطلاعات; Information security; Security awareness; Risk; Human factors; Personas;
Keywords: امنیت اطلاعات; Wearable healthcare; SWOT analysis; Infant safety and care; Elderly care; Chronic disease management; Patient safety; Information security; Patient privacy; Regulation; Operational cost;
Keywords: امنیت اطلاعات; Information security; Psychological capital (PsyCap); Protection motivation theory (PMT); Positive psychology; Organizational insiders;
Keywords: امنیت اطلاعات; Software defined networks; Information security; Intrusion detection; Graph mining, Denial of service attacks; Security architecture;
Keywords: امنیت اطلاعات; Information security; Incident management; Preparedness exercises; Self-managing teams; Training; Decision-making;
Keywords: امنیت اطلاعات; Information security; Watermark; Authentication; Visual masking; Human visual system;
Keywords: امنیت اطلاعات; Information security; Medical image analysis; Wireless capsule endoscopy; Image encryption; Personalized healthcare systems; Video summarization;
Keywords: امنیت اطلاعات; Behavioral IS security; Information security; Mobile device security; Home computer security; Protection motivation theory;
Keywords: امنیت اطلاعات; Learning agents; Hybrid agents; Case-based reasoning; Ontologies; Information security; Intrusion detection systems;
Keywords: امنیت اطلاعات; Risk perception; Precautionary behaviour; Information security; Cyber-security; Non-aggregate data analysis;
Keywords: امنیت اطلاعات; Information security; Early conformance behavior; Perceived security threat; Passwords; Mandatory security policies; Information security awareness;