You are not logged in.

Securing cyberspace

Li, Gang, Niu, Wenjia, Guo, Li, Batten, Lynn, Liu, Yinlong and Cai, Guoyong 2016, Securing cyberspace, Concurrency and computation, vol. 28, no. 6, pp. 1870-1871, doi: 10.1002/cpe.3753.

Attached Files
Name Description MIMEType Size Downloads

Title Securing cyberspace
Author(s) Li, GangORCID iD for Li, Gang orcid.org/0000-0003-1583-641X
Niu, Wenjia
Guo, Li
Batten, Lynn
Liu, Yinlong
Cai, Guoyong
Journal name Concurrency and computation
Volume number 28
Issue number 6
Start page 1870
End page 1871
Total pages 2
Publisher Wiley
Place of publication London, Eng.
Publication date 2016-04-25
ISSN 1532-0626
1532-0634
Summary Cyberspace, the ubiquitous space that exists in relation to the Internet, is usually referred to as a dynamic broad domain ranging from Internet and its infrastructures to social networks. More research work in security has been extended from securing computers to securing Cyberspace, which includes the physical-level security, the network-level security, and the application-level security and addresses improvements in Cyberspace management.
Language eng
DOI 10.1002/cpe.3753
Field of Research 0805 Distributed Computing
0803 Computer Software
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C4 Letter or note
ERA Research output type C Journal article
Copyright notice ©2016, Wiley
Persistent URL http://hdl.handle.net/10536/DRO/DU:30083368

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 4 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Mon, 09 May 2016, 18:05:28 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.