Fernandes, 2021 - Google Patents
Data security and privacy in times of pandemicFernandes, 2021
View PDF- Document ID
- 283862306554978879
- Author
- Fernandes L
- Publication year
- Publication venue
- Proceedings of the digital Privacy and security conference
External Links
Snippet
Our presentis marked with the corona virus appearance, which lead to a worldwide pandemic situation declared by the world health organization. This situation leads to several different measures to prevent the virus from spreading, which includes online classes from …
- 241000700605 Viruses 0 abstract description 9
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Amara et al. | Cloud computing security threats and attacks with their mitigation techniques | |
US20250284813A1 (en) | Managing permitted browser related risky activity in a secure environment | |
US10382525B2 (en) | Managing transmission and storage of sensitive data | |
US8826400B2 (en) | System for automated prevention of fraud | |
US8856869B1 (en) | Enforcement of same origin policy for sensitive data | |
Chhikara et al. | Phishing & anti-phishing techniques: Case study | |
US20250097264A1 (en) | Mitigating phishing attempts | |
Hutchings et al. | Cloud computing for small business: Criminal and security threats and prevention measures | |
Fernandes | Data security and privacy in times of pandemic | |
Haber et al. | Attack vectors | |
Nelson et al. | Social engineering for security attacks | |
Lepofsky | The manager's guide to web application security: a concise guide to the weaker side of the web | |
Odirichukwu et al. | Security concept in web database development and administration—A review perspective | |
Khandelwal et al. | Frontline techniques to prevent web application vulnerability | |
Kakareka | What is vulnerability assessment? | |
Krasniqi et al. | Vulnerability Assessment & Penetration Testing: Case study on web application security | |
Campbell | Protection of systems | |
Rao et al. | A Three-Pronged Approach to Mitigate Web Attacks | |
Robles et al. | Survey of non-malicious user actions that introduce network and system vulnerabilities and exploits | |
Dhule et al. | Analysis and Survey on Cybersecurity: Threats and Solutions | |
Nair et al. | Cyber Attacks and its Prevention Techniques | |
Kamal et al. | Security and Privacy Issues in Wireless Networks and Mitigation Methods | |
Sayibu et al. | Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana | |
De Ryck | Client-side web security: mitigating threats against web sessions | |
Imanova et al. | Cyberattacks and social media account security |