Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Security.

Zeitschriftenartikel zum Thema „Security“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Security" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Kumar, Ashok. „Securing the security“. City 18, Nr. 3 (04.05.2014): 356–59. http://dx.doi.org/10.1080/13604813.2014.906731.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Nadler, Jerrold. „Securing social security“. Washington Quarterly 22, Nr. 1 (März 1999): 185–87. http://dx.doi.org/10.1080/01636609909550377.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Pollak, William. „Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions“. University of Michigan Journal of Law Reform, Nr. 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.

Der volle Inhalt der Quelle
Annotation:
Part I of this Note addresses the restrictions on intelligence gathering under FISA prior to 9/11 and the motivations underlying the Patriot Act's revisions to FISA. Part II discusses the problems with the "primary purpose" test, which was in effect prior to the Patriot Act's revisions to FISA. Part III reviews the various policy and constitutional arguments made against the Patriot Act's "significant purpose" test. Part IV proposes that Congress enact a new "inextricably intertwined" test to govern the admission of FISA material in criminal prosecutions. Specifically, this Part looks at sixty criminal cases in which FISA material was admitted and evaluates how the "inextricably intertwined" test would play out in those cases. Part V examines the arguments in favor of the inextricably intertwined test. Finally, Part VI counters the argument that the inextricably intertwined test violates the plain view doctrine.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Al-Fedaghi, Sabah. „Securing the Security System“. International Journal of Security and Its Applications 11, Nr. 3 (31.03.2017): 95–108. http://dx.doi.org/10.14257/ijsia.2017.11.3.09.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Brandon, William P., und Zachary Mohr. „Securing Social Security Solvency“. Politics and the Life Sciences 38, Nr. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.

Der volle Inhalt der Quelle
Annotation:
AbstractAdequate income is a social determinant of health. In the United States, only Social Security beneficiaries receive inflation-protected guaranteed income. Social Security needs another 1983 compromise in which stakeholders accepted “shared pain” to avoid insolvency. We propose indexing the benefit using the chained consumer price index (CPI) for all urban consumers and providing a one-time bonus of 8% to 10% for beneficiaries in their mid-80s, when needs become greater. The chained CPI has little impact when beneficiaries start receiving benefits, but older beneficiaries need protection. The estimated 75-year savings from this restructured benefit amount to 14.2% to 18% of Social Security deficits. Modest increases in payroll taxes and maximum earnings taxed should make up most of the shortfall. Including unearned income with wages and salaries subject to the 6.2% individual tax would produce much more revenue. The discussion explores the proposal’s political feasibility, grounding in current policy and political science literature, and the role of income as a social determinant of health.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Nissenbaum, Helen. „Where Computer Security Meets National Security1“. Ethics and Information Technology 7, Nr. 2 (Juni 2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Kamradt-Scott, Adam. „Securing Indo-Pacific health security: Australia’s approach to regional health security“. Australian Journal of International Affairs 72, Nr. 6 (15.10.2018): 500–519. http://dx.doi.org/10.1080/10357718.2018.1534942.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Molloy, Patricia. „Desiring security/securing desire: (Re)re‐thinking alterity in security discourse“. Cultural Values 3, Nr. 3 (Juli 1999): 304–28. http://dx.doi.org/10.1080/14797589909367169.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Wright, J. „Security? What security? [job security]“. Engineering & Technology 4, Nr. 3 (14.02.2009): 80–81. http://dx.doi.org/10.1049/et.2009.0321.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Economides, Spyros. „Balkan security: What security? Whose security?“ Southeast European and Black Sea Studies 3, Nr. 3 (September 2003): 105–29. http://dx.doi.org/10.1080/14683850412331321678.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

TOMÁŠEK, Martin. „Security Properties Verification of Security Protocols“. Acta Electrotechnica et Informatica 14, Nr. 2 (01.06.2014): 15–18. http://dx.doi.org/10.15546/aeei-2014-0012.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Muhammad Jamshid Khan. „Securing network infrastructure with cyber security“. World Journal of Advanced Research and Reviews 17, Nr. 2 (28.02.2023): 803–13. http://dx.doi.org/10.30574/wjarr.2023.17.2.0308.

Der volle Inhalt der Quelle
Annotation:
In today's digital age, securing network infrastructure has become a critical concern for organizations of all sizes. With the increasing number of cyber threats, it is essential to implement effective measures to protect sensitive information and prevent unauthorized access to network infrastructure. This article explores the various methods that organizations can use to secure their network infrastructure and maintain the integrity of their sensitive information. This article provides valuable insights into the various methods that organizations can use to secure their network infrastructure and protect their sensitive information against cyber threats. By implementing these methods, organizations can reduce the risk of data breaches, protect their reputation, and ensure the ongoing security of their network infrastructure.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Hama, Hawre Hasan. „State Security, Societal Security, and Human Security“. Jadavpur Journal of International Relations 21, Nr. 1 (Juni 2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.

Der volle Inhalt der Quelle
Annotation:
Generally speaking, the traditional approach of security mainly regards states as a sole referent object of security and refutes any attempt to broaden the concept of security. This understanding is known as a realist approach. This approach, however, has been recently challenged by the Copenhagen School, the Welsh School, and the human security approach. The Copenhagen School assumes that there is now a duality of security: state security and societal security. However, both the Welsh School and the human security school look at individuals as a sole referent object of security. This article critically reviews the traditional approaches of security, the Copenhagen School, the Welsh School, and the human security approach. This article finally argues that the Copenhagen School could successfully broaden the concept of security, and therefore, it is more convincing when compared to other schools.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Neamah, Muthanna Ibrahim. „The Security Vulnerabilities in Websites the Security“. International Journal of Psychosocial Rehabilitation 24, Nr. 5 (20.04.2020): 4319–24. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020147.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Kharb, Latika, und Deepak Chahal. „Cloud Access Security Brokers: Strengthening Cloud Security“. International Journal of Research Publication and Reviews 4, Nr. 8 (August 2023): 642–44. http://dx.doi.org/10.55248/gengpi.4.823.50412.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Dynon, Nicholas. „Securing Public Places: New Zealand’s Private Security Sector as a National Security Enabler“. National Security Journal 1, Nr. 1 (Oktober 2019): 75–92. http://dx.doi.org/10.36878/nsj201901.75.

Der volle Inhalt der Quelle
Annotation:
In recent years, national security policy makers globally have grappled with the challenge of addressing the vulnerability of ‘public spaces’ to terror attack. In the wake of the Christchurch mosque attacks, it’s a challenge that has gained sudden urgency in New Zealand. Faced with the numeric impossibility of protecting infinite public spaces within their jurisdictions, several states have enacted strategies to utilise the considerable ‘eyes and ears’ capability of their private security personnel sectors. While the harnessing of numerically superior private security guard forces presents opportunities for a more linked-up approach to protecting the public, there are also significant barriers. Despite their massive growth in recent decades, private security industries the world over struggle with issues – both real and perceived – around pay and conditions, training, standards and professionalism. With the UK and Australia already having taken steps towards public-private security partnerships, to what extent does New Zealand’s private security guarding sector constitute a potential national security force-multiplier?
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

WEBER, CYNTHIA, und MARK LACY. „Securing by design“. Review of International Studies 37, Nr. 3 (01.03.2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.

Der volle Inhalt der Quelle
Annotation:
AbstractThis article investigates how modern neo-liberal states are ‘securing by design’ – harnessing design to new technologies in order to produce security, safety, and protection. We take a critical view toward ‘securing by design’ and the policy agendas it produces of ‘designing out insecurity’ and ‘designing in protection’ because securing by design strategies rely upon inadequate conceptualisations of security, technology, and design and inadequate understandings of their relationships to produce inadequate ‘security solutions’ to ready-made ‘security problems’. This critique leads us to propose a new research agenda we call Redesigning Security. A Redesigning Security Approach begins from a recognition that the achievement of security is more often than not illusive, which means that the desire for security is itself problematic. Rather than encouraging the design of ‘security solutions’ – a securing by design – a Redesigning Security Approach explores how we mightinsecure securing by design. By acknowledging and then moving beyond the new security studies insight that security often produces insecurity, our approach uses design as a vehicle through which to raise questions about security problems and security solutions by collaborating with political and critical design practitioners to design concrete material objects that themselves embody questions about traditional security and about traditional design practices that use technology to depoliticise how technology is deployed by states and corporations to make us ‘safe’.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Clough, Patricia Ticineto, und Craig Willse. „Gendered Security/National Security“. Social Text 28, Nr. 4 (2010): 45–63. http://dx.doi.org/10.1215/01642472-2010-010.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Elliott, Lorraine. „Human security/environmental security“. Contemporary Politics 21, Nr. 1 (02.01.2015): 11–24. http://dx.doi.org/10.1080/13569775.2014.993905.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Pasquinucci, Andrea. „Defeating security with security“. Computer Fraud & Security 2008, Nr. 2 (Februar 2008): 6–9. http://dx.doi.org/10.1016/s1361-3723(08)70024-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Keeley, James F. „Review: Security: Writing Security“. International Journal: Canada's Journal of Global Policy Analysis 48, Nr. 3 (September 1993): 566–67. http://dx.doi.org/10.1177/002070209304800308.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Helmy, Army Fuad. „PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN“. Badamai Law Journal 1, Nr. 2 (01.09.2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.

Der volle Inhalt der Quelle
Annotation:
This research aims to: (1) Assess and evaluate the pattern containedsystem in the Securing of National Vital Objectsby Vital Object Security Directorate of Polda Kalimantan Selatan; and (2) Assess and evaluate the obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan. It can be concluded that: 1. The system pattern contained in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan not stated clearly and explicitly in the legislation pam obvitnas, but in the Presidential Decree No. 63 of 2004 on the Securing of National Vital Security Object there is described that pattern Sispamobvitnas, they are: (1) The main executor of the system Securing of National Vital Objek is obvitnas management authority, in this case the Police through Dirpamobvit; (2) Police are obliged to provide security assistance obvitnas; (3) priority preemptive and preventive activities; (4) in an integrated and simultaneous shared obvitnas managers implement security systems obvitnas; and (5) and against obvitnas is an organic part of or including the military, the security environment remain to be implemented, although the security environment outside Obvitnas or process interruption handling defense and security. 2. The obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan, they are: (1) Lack of quality personnel guard PT. Pertamina (Persero) BBM Terminal Banjarmasin due to lack of professional recruitment system; (2) Insufficient number of security officers compared to the vulnerability of the region; (3) Infrastructure security Obvit Of Polda Kalimantan Selatan are limited;(4) The lack of security coordination between Ditpamobvit Polda Kalimantan Selatan with regional security managers of the company, and the company's internal security guard at the Police Post.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Othman, Sadeq. „Securing Robotic Communication using Multiple Security Techniques“. International Journal of Computer Applications 178, Nr. 1 (15.11.2017): 1–4. http://dx.doi.org/10.5120/ijca2017915704.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Antonius, Rachad, Micheline Labelle und François Rocher. „Canadian Immigration Policies: Securing a Security Paradigm?“ International Journal of Canadian Studies, Nr. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Romero Ortiz, María Elena, und Carlos Uscanga Prieto. „Japan: Securing Cooperation or Cooperating to Security?“ México y la Cuenca del Pacífico 5, Nr. 14 (01.05.2016): 53–78. http://dx.doi.org/10.32870/mycp.v5i14.506.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Singh, Ritesh, Lalit Kumar, Debraj Banik und S. Sundar. „Smart security and securing data through watermarking“. IOP Conference Series: Materials Science and Engineering 263 (November 2017): 052040. http://dx.doi.org/10.1088/1757-899x/263/5/052040.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Shin, Beom-Shik. „Collective Security, Common Security, Cooperative Security: Concept and Reality“. Journal of International Politics 15, Nr. 1 (31.03.2010): 5. http://dx.doi.org/10.18031/jip.2010.03.15.1.5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Rushton, Simon. „Global Health Security: Security for whom? Security from what?“ Political Studies 59, Nr. 4 (07.11.2011): 779–96. http://dx.doi.org/10.1111/j.1467-9248.2011.00919.x.

Der volle Inhalt der Quelle
Annotation:
The concept of ‘health security’ has been increasingly apparent in recent years in both academic and policy discourses on transborder infectious disease threats. Yet it has been noted that there are a range of conceptualisations of ‘health security’ in circulation and that confusion over the concept is creating international tensions with some states (particularly from the Global South) fearing that ‘health security’ in reality means securing the West. This article examines these tensions but puts forward an alternative explanation for them. It begins by looking at the different ‘health securities' that characterise the contemporary global health discourse, arguing that there is in fact a good deal more consensus than we are often led to believe. In particular there is a high level of agreement evident over what the major threats to ‘health security’ are and what should be done about them. These are a particular set of health risks which are primarily seen as major threats by Western developed nations, and contemporary global responses – often couched in the language of global health security – have a tendency to focus on containment rather than prevention. The article makes the case that to resolve the tensions around (global) health security there is the need for a more explicit recognition of the primary beneficiaries of the current system, and of who is bearing the costs. Only following such a recognition can meaningful debates be carried out about the appropriate prioritisation of global health security in relation to other global health governance priorities.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

G, Anusha. „Cyber Security“. International Journal of Research Publication and Reviews 4, Nr. 4 (April 2023): 2585–87. http://dx.doi.org/10.55248/gengpi.4.423.36341.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Manoj Thakur Neha, Rajani. „Cyber Security“. International Journal of Science and Research (IJSR) 13, Nr. 1 (05.01.2024): 440–44. http://dx.doi.org/10.21275/mr231228122722.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Toka, K. O., Y. Dikilitaş, T. Oktay und A. Sayar. „SECURING IOT WITH BLOCKCHAIN“. International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (23.12.2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.

Der volle Inhalt der Quelle
Annotation:
Abstract. IoT is becoming ubiquitous in industry, homes, cities, literally in every aspect of our daily lives. Securing IoT-based systems is difficult because of deficiencies in the very nature of IoT devices such as limited battery power, processing, and storage, etc. Blockchain is a new approach used to securely record transactions and offers potential solutions to computer and internet security issues such as confidentiality, integrity, availability, authentication, authorization, and accountability. Blockchain, as a decentralized ledger consisting of interconnected blocks, can remedy most of the security deficiencies of heavily IoT based systems. The Hyperledger Fabric blockchain network used in this study provides confidentiality, data integrity, authentication, and data security for data obtained from IoT devices. Widely used IoT data transfer MQTT protocol is included in the proposed approach. The approach is demonstrated in a simple demo Hyperledger network with simulated IoT devices. The proposed approach is discussed in terms of network security dimensions. Based on the features of the Hyperledger Blockchain network, it is displayed that the IoT security deficiencies can largely be remedied with the proposed approach.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Kyung-Im Cho. „Security Deposit as Collateral Security“. Korean Lawyers Association Journal 64, Nr. 12 (Dezember 2015): 143–88. http://dx.doi.org/10.17007/klaj.2015.64.12.004.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

HOFREITER, Ladislav. „SECURITY CULTURE AND SECURITY MANAGEMENT“. Krízový Manažment 14, Nr. 2 (30.09.2015): 63–68. http://dx.doi.org/10.26552/krm.c.2015.2.63-68.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

INTRILIGATOR, MICHAEL D. „GLOBAL SECURITY AND HUMAN SECURITY“. International Journal of Development and Conflict 01, Nr. 01 (April 2011): 1–10. http://dx.doi.org/10.1142/s2010269011000026.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Johansen, Robert C. „Real Security is Democratic Security“. Alternatives: Global, Local, Political 16, Nr. 2 (April 1991): 209–42. http://dx.doi.org/10.1177/030437549101600206.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Malcolmson, Robert W. „Review: International Security: Alternative Security“. International Journal: Canada's Journal of Global Policy Analysis 46, Nr. 4 (Dezember 1991): 733–34. http://dx.doi.org/10.1177/002070209104600413.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Cohen, Fred. „Strategic Security Intelligence — Embedded Security“. Network Security 2002, Nr. 2 (Februar 2002): 14–15. http://dx.doi.org/10.1016/s1353-4858(02)00218-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Leach, Dr John. „Security engineering and security RoI“. Computers & Security 22, Nr. 6 (September 2003): 482–86. http://dx.doi.org/10.1016/s0167-4048(03)00605-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Meyer, Helen. „Security risk or security solution?“ Computers & Security 15, Nr. 4 (Januar 1996): 317. http://dx.doi.org/10.1016/0167-4048(96)88943-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

SØRENSEN, GEORG. „Individual Security and National Security“. Security Dialogue 27, Nr. 4 (Dezember 1996): 371–86. http://dx.doi.org/10.1177/0967010696027004002.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Trzciński, Łukasz, und Juliusz Piwowarski. „Security culture and security anthropology“. Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 33, Nr. 33 (29.03.2019): 131–53. http://dx.doi.org/10.5604/01.3001.0013.1955.

Der volle Inhalt der Quelle
Annotation:
The topic of the article is the relationship between security culture and anthropology of securi-ty. The authors recall the most important definitions of security culture and anthropology of security, both of which belong to the discipline of security sciences, and conclude that culture, including its special sphere called security culture, is a human creation that strongly affects people, so it would be difficult to explore it scientifically without anthropological knowledge and tools. The authors give an account of the development of security sciences research in Poland, and point out that its subdiscipline called security anthropology is not fully formed yet, its theoretical and methodological identity still being underway; however, it develops dynamically. In forming this new subdiscipline of security sciences, apart from applying mul-tidisciplinary research, it is also necessary to consider different types of anthropology, above all biological, cultural and philosophical anthropology. The authors signalize the potential di-rections of research within the field and conclude that a methodological framework of securi-ty anthropology should be worked out, in a form that is most important and legible at the cur-rent stage of the development of science.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Stosic, Lazar, und Dragan Velickovic. „Computer security and security technologies“. Journal of Process Management. New Technologies 1, Nr. 1 (2013): 14–19. http://dx.doi.org/10.5937/jpmnt1301014s.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Fekete, Liz. „Peoples' Security Versus National Security“. Race & Class 44, Nr. 3 (Januar 2003): 78–84. http://dx.doi.org/10.1177/030639603128968790.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Perlmutter, Amos, und Benjamin Frankel. „SECURITY STUDIES and Security Studies“. Security Studies 1, Nr. 1 (September 1991): iv. http://dx.doi.org/10.1080/09636419109347452.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Soneji, Samir, und Gary King. „Statistical Security for Social Security“. Demography 49, Nr. 3 (17.05.2012): 1037–60. http://dx.doi.org/10.1007/s13524-012-0106-z.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Alkunidry, Dona, Shahad Alhuwaysi und Rawan Alharbi. „Security Threads and IoT Security“. Journal of Computer and Communications 11, Nr. 09 (2023): 76–83. http://dx.doi.org/10.4236/jcc.2023.119005.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Sharma, Suman, Yogesh Verma und Amit Nadda. „Information Security Cyber Security Challenges“. International Journal of Scientific Research in Computer Science and Engineering 7, Nr. 1 (28.02.2019): 10–15. http://dx.doi.org/10.26438/ijsrcse/v7i1.1015.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Chun, Woong. „National Security and Human Security“. Korean Journal of International Relations 44, Nr. 1 (30.04.2004): 25–49. http://dx.doi.org/10.14731/kjir.2004.04.44.1.25.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Smith, Donna B., und Assistant. „National Security Archive9971National Security Archive. National Security Archive. National Security Archive, URL: www.seas.gwu.edu/nsarchive“. Electronic Resources Review 3, Nr. 7 (Juli 1999): 77–78. http://dx.doi.org/10.1108/err.1999.3.7.77.71.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Shakir, Taif Khalid, Rabah Scharif und Manal M. Nasir. „A Proposed Blockchain based System for Secure Data Management of Computer Networks“. Journal of Cybersecurity and Information Management 11, Nr. 2 (2023): 36–46. http://dx.doi.org/10.54216/jcim.110204.

Der volle Inhalt der Quelle
Annotation:
As technology continues to evolve, the importance of information security and management becomes more crucial than ever. Blockchain and machine learning (ML) are two technologies that are gaining increasing attention in this field. Blockchain provides a secure and decentralized platform for storing and sharing information, while ML can help detect patterns and anomalies in data to identify potential security threats. This paper proposes a blockchain-based ML system for securing information management by providing an automated service for detecting anomalies in Ethereum transactions. The system utilizes a blockchain network to securely store and manage data, and ML algorithms to analyze and detect potential security threats. We present a case study using the Ethereum Fraud Detection Dataset to demonstrate the effectiveness of our proposed system in detecting fraudulent transactions. Our results show that our system outperforms traditional ML algorithms in terms of accuracy (99.55%), and F1-score (99.98%), highlighting the potential of blockchain-based ML for improving information security and management in various industries.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie