Academic literature on the topic 'ENHANCING SECURITY'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ENHANCING SECURITY.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "ENHANCING SECURITY"
J, Stephen, and Vidyavati Ramteke. "Enhancing Security Issues in Online Games." Journal of Advanced Research in Dynamical and Control Systems 12, no. 8 (August 19, 2020): 95–103. http://dx.doi.org/10.5373/jardcs/v12i8/20202451.
Full textHaedar Akib,, Lutfi Saefullah, Husain Syam, Hamsu Abdul Gani,. "ENHANCING MARITIME SECURITY COOPERATION." Psychology and Education Journal 58, no. 2 (February 10, 2021): 4769–75. http://dx.doi.org/10.17762/pae.v58i2.2868.
Full textShonola, Shaibu Adekunle, and Mike Joy. "Enhancing Mobile Learning Security." International Journal on Integrating Technology in Education 5, no. 3 (September 30, 2016): 01–15. http://dx.doi.org/10.5121/ijite.2016.5301.
Full textHudson, R. B. "Enhancing Elderly Financial Security." Public Policy & Aging Report 19, no. 3 (June 1, 2009): 2. http://dx.doi.org/10.1093/ppar/19.3.2.
Full textPangalos, G., M. Khair, and L. Bozios. "Enhancing medical database security." Journal of Medical Systems 18, no. 4 (August 1994): 159–71. http://dx.doi.org/10.1007/bf00996700.
Full textWilkinson, Paul. "Enhancing global aviation security?" Terrorism and Political Violence 10, no. 3 (September 1998): 147–66. http://dx.doi.org/10.1080/09546559808427475.
Full textArazi, B. "Enhancing Security with Nanotechnology." Computer 39, no. 10 (October 2006): 106–7. http://dx.doi.org/10.1109/mc.2006.338.
Full textvan der Meer, Sico. "Enhancing International Cyber Security." Security and Human Rights 26, no. 2-4 (December 7, 2015): 193–205. http://dx.doi.org/10.1163/18750230-02602004.
Full textHnamte, Vanlalruata, Jamal Hussain, Samuel Lalmuanawma, Chhakchhuak Lalrinawma, and Lalchhanhima Hmar. "Enhancing Secured Network Slicer for Cloud Security Systems." Indian Journal Of Science And Technology 16, sp1 (October 3, 2023): 179–91. http://dx.doi.org/10.17485/ijst/v16sp1.msc25.
Full textModares, Hero, Amirhossein Moravejosharieh, Rosli Bin Salleh, and Jaime Lloret. "Enhancing Security in Mobile IPv6." ETRI Journal 36, no. 1 (February 1, 2014): 51–61. http://dx.doi.org/10.4218/etrij.14.0113.0177.
Full textDissertations / Theses on the topic "ENHANCING SECURITY"
Zhang, Linfan, and Shuang Zheng. "Enhancing QR Code Security." Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-14145.
Full textYue, Chuan. "Enhancing Web Browsing Security." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623575.
Full textH, Fruchter Nathaniel. "Enhancing ISP-consumer security notifications." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122916.
Full textThesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2019
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 79-85).
Security notification schemes hold great promise for improving both consumer cybersecurity and general network health as malware and other sources of malicious activity are becoming more prevalent on home networks. For example, botnets of Internet of Things devices engage in denial of service (DoS) attacks and ransomware holds data on personal and commercial systems hostage. Many of these threats are relatively opaque for an end user. An end user may not know that their smart device is participating in a DoS attack at all, unless they notice a protracted slowdown in network speeds. An upstream network provider like a consumer ISP has more visibility into the issue. Due to their privileged position, ISPs often have more data about the status of a malware infection, denial of service attack, or other malicious activity. This extra information can be of great benefit for the purposes of notification. For instance, an ISP may be able to notify a customer that a device on their network is being used for a DoS attackor that they see communication with a server involved in distributing ransomware. ISPs and other organizations that try and implement these schemes often run into a set of questions: How do I get the right data to power the notification? How do I ensure the user trusts the notification? Can I ensure the notification is not spoofed? Is there an optimal way to present the notification? How do I make sure a user takes the proper remedial action? This thesis presents a framework for new notification schemes to answer these questions by examining four key elements of a notification: form, delivery, and content. It also proposes multi-factor verification, a novel scheme to address trust and spoofing issues within a notification scheme. Finally, it provides a model for a new ISP-user security notification scheme within the context of the United States market and policy landscape.
by Nathaniel H. Fruchter.
S.M. in Technology and Policy
S.M.inTechnologyandPolicy Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program
Mohammed, Ali, Sachin Sama, and Majeed Mohammed. "Enhancing Network Security in Linux Environment." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17144.
Full textLiu, Ying. "Enhancing security for XML Web services." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27531.
Full textKadhum, Hamza. "Enhancing Zigbee Security for Industrial Implementation." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279559.
Full textZigbee nätverk är ett populärt val vid uppsättning av ett nätverk med låg strömförbrukning. Zigbees användningsområde är olika men den är väldigt populär inom industriell områdesövervakning och hemautomation. Däremot har Zigbees säkerhet varit en nackdel, då det har framkommit att den inte möter kraven för industriell användning. Arbetet kom till genom ett samarbete med Ericsson och KTH för att undersöka Zigbee nätverks implementation och säkerhet. Arbetet bearbetar olika säkerhetslösningar för Zigbee nätverk och hur den kan implementeras för att uppnå långtidsanvändning utan batteribyte. Säkerhetslösningar bygger på public-key samt symmetric key kryptografi algoritmer för att förbättra och öka Zigbees säkerhet genom autentisering och tillåtelse av noder som ansluter sig till nätverket. Nätverkets konfiguration för långtidsanvändning redovisas genom att jämföra olika polling tidsintervaller mellan meddelanden. Långtidsanvändning utan batteribyte är viktigt för att nätverket kommer implementeras i ett avlägset område som är svåråtkomlig. Arbetet redovisar och jämföra olika lösningar för att öka säkerheten för Zigbee nätverk. Den optimala lösningen för att uppnå autentisering samt tillåtelse av noder som ansluter sig uppnås med nyckel skapande genom secret-splitting metoden. Metoden följer NIST rekommendationer och anses vara säker, därav uppfyller den kraven för industriell implementation. Nätverkets säkerhet ökar samt bibehåller ett nätverk med låg strömförbrukning.
Makkar, Ankush. "Enhancing IoT Security Using 5G Capabilities." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85109.
Full textFekete, Florian. "Civil-military relations : enhancing international security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FFekete.pdf.
Full textThesis advisor(s): Donald Abenheim, Karen Guttieri. Includes bibliographical references (p. 65-70). Also available online.
Kirkham, E., and C. Flew. "Strengthening embargoes and enhancing human security." Thesis, International Alert, Saferworld and University of Bradford, Department of Peace Studies, Centre for International Co-operation and Security, 2003. http://hdl.handle.net/10454/4275.
Full textArms embargoes are one of the principal tools of states in seeking to prevent, limit and bring an end to armed conflict and human rights abuses. Despite the frequency with which arms embargoes have been imposed, there are significant problems with their implementation. Pressure is therefore growing for the international governmental community to act in order to ensure that the political commitment embodied by the imposition of arms embargoes is matched by the commitment to ensure their rigorous enforcement and to achieve enhanced human security on the ground. Increasing the effectiveness of arms embargoes is a specific aim of the United Nations Programme of Action for Preventing and Combating the Illicit Trade in Small Arms and Light Weapons in All Its Aspects1 which specifically calls upon states "To take appropriate measures, including all legal or administrative means, against any activity that violates a United Nations Security Council arms embargo in accordance with the Charter of the United Nations".2 Accordingly, within the context of the implementation of the UN PoA, the overall aim of this paper is to explore ways in which the international community can act in order to strengthen the impact of arms embargoes and enhance human security. It will begin by examining the purposes, processes and effects relating to arms embargoes, with particular attention to those agreed at international (UN) level, and by highlighting issues of concern in each regard. An overview of the main issues and challenges facing implementation of arms embargoes will include the elaboration of three case-study examples showing the impact of UN arms embargoes on the availability of arms and on human security and a further five that illustrate the dilemmas faced by states in seeking to implement arms embargoes. Priority areas for attention in any international effort to strengthen the effectiveness of arms embargoes will be followed by more extensive proposals for enhancing international embargo regimes within the context of implementing the UN PoA. Whilst it is recognised that the UN PoA contains measures that relate only to the illicit trade in small arms and light weapons (SALW), if implemented fully, many of these would serve to strengthen the international apparatus of control, information exchange and provision of assistance relating to arms proliferation and misuse as a whole. In turn, this would greatly enhance the implementation of UN arms embargoes. Therefore, as well as providing an opportunity for reviewing progress on implementing the PoA, the first Biennial Meeting of States in July 2003 is clearly a major opportunity for states to address a number of the pressing challenges facing states in the implementation of UN embargoes.
Lee, Man Hee. "Architectural support for enhancing security in clusters." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2889.
Full textBooks on the topic "ENHANCING SECURITY"
Cuthbertson, Ian M., and David Robertson. Enhancing European Security. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7.
Full textShultz, George Pratt. Enhancing diplomatic security. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1986.
Find full textRowny, Edward L. SDI, enhancing security and stability. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.
Find full textRowny, Edward L. SDI, enhancing security and stability. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.
Find full textRowny, Edward L. SDI, enhancing security and stability. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.
Find full textRao, Vemuri V., ed. Enhancing computer security with smart technology. Boca Raton, FL: Auerbach Publications, 2005.
Find full textUnited States. Congressional Budget Office., ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Find full textUnited States. Congressional Budget Office., ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Find full textUnited States. Congressional Budget Office, ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Find full textUnited States. Congressional Budget Office, ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Find full textBook chapters on the topic "ENHANCING SECURITY"
Coffin, David. "Enhancing Security." In Expert Oracle and Java Security, 267–328. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3832-4_11.
Full textCuthbertson, Ian M., and David Robertson. "Security Through Behavioral Modification." In Enhancing European Security, 186–206. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_11.
Full textCuthbertson, Ian M., and David Robertson. "Introduction." In Enhancing European Security, 3–21. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_1.
Full textCuthbertson, Ian M., and David Robertson. "Arms Control and All That." In Enhancing European Security, 166–85. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_10.
Full textCuthbertson, Ian M., and David Robertson. "Combining Control and Enhancement." In Enhancing European Security, 207–16. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_12.
Full textCuthbertson, Ian M., and David Robertson. "Why Was INF Needed, and Would It Have Been Used?" In Enhancing European Security, 23–35. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_2.
Full textCuthbertson, Ian M., and David Robertson. "Conventional Force Imbalances: How to Count, and Can We Count?" In Enhancing European Security, 36–53. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_3.
Full textCuthbertson, Ian M., and David Robertson. "Conventional Force Imbalances: The Numbers." In Enhancing European Security, 54–66. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_4.
Full textCuthbertson, Ian M., and David Robertson. "Is There a Special European Interest in European Security?" In Enhancing European Security, 67–106. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_5.
Full textCuthbertson, Ian M., and David Robertson. "Is There a Pan-European Special Interest?" In Enhancing European Security, 107–25. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_6.
Full textConference papers on the topic "ENHANCING SECURITY"
Zisiadis, Dimitris, Spyros Kopsidas, Argyris Varalis, and Leandros Tassiulas. "Enhancing WPS security." In 2012 IFIP Wireless Days (WD). IEEE, 2012. http://dx.doi.org/10.1109/wd.2012.6402836.
Full textFall, Moustapha, Chris Chuvalas, Nolan Warning, Max Rabiee, and Carla Purdy. "Enhancing SCADA System Security." In 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2020. http://dx.doi.org/10.1109/mwscas48704.2020.9184532.
Full textSingh, Arun Kumar, Shefalika Ghosh Samaddar, and Arun K. Misra. "Enhancing VPN security through security policy management." In 2012 1st International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2012. http://dx.doi.org/10.1109/rait.2012.6194494.
Full textPriyanka, S. Sharon, and B. Nagajayanthi. "Enhancing security in Bluetooth networks." In 2014 International Conference on Science Engineering and Management Research (ICSEMR). IEEE, 2014. http://dx.doi.org/10.1109/icsemr.2014.7043560.
Full textTamaki, Kiyoshi. "Enhancing implementation security of QKD." In Quantum Technologies and Quantum Information Science, edited by Mark T. Gruneisen, Miloslav Dusek, and John G. Rarity. SPIE, 2017. http://dx.doi.org/10.1117/12.2280737.
Full textThomson, I. R. "Performance enhancing proxies and security." In IP over Satellite - The Next Generation: MPLS, VPN and DRM Delivered Services. IEE, 2003. http://dx.doi.org/10.1049/ic:20030055.
Full textKetel, Mohammed. "Enhancing BYOD Security Through SDN." In SoutheastCon 2018. IEEE, 2018. http://dx.doi.org/10.1109/secon.2018.8479230.
Full textFarinholt, Jacob M., and James E. Troupe. "Enhancing QKD security with weak measurements." In SPIE Security + Defence, edited by Mark T. Gruneisen, Miloslav Dusek, and John G. Rarity. SPIE, 2016. http://dx.doi.org/10.1117/12.2241059.
Full textDulski, R., P. Powalisz, M. Kastek, and P. Trzaskawka. "Enhancing image quality produced by IR cameras." In Security + Defence, edited by David A. Huckridge and Reinhard R. Ebert. SPIE, 2010. http://dx.doi.org/10.1117/12.864979.
Full textChaudhry, Yuvraj Singh, Upasana Sharma, and Ajay Rana. "Enhancing Security Measures of AI Applications." In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9197790.
Full textReports on the topic "ENHANCING SECURITY"
Rowny, Edward L. SDI: Enhancing Security and Stability. Fort Belvoir, VA: Defense Technical Information Center, March 1988. http://dx.doi.org/10.21236/ada351518.
Full textPregenzer, A. L. Enhancing regional security agreements through cooperative monitoring. Office of Scientific and Technical Information (OSTI), May 1995. http://dx.doi.org/10.2172/79720.
Full textYunus, Sarıkaya, and Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, July 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19167.
Full textYunus, Sarıkaya, and Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, July 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19168.
Full textAlbek, Aminuddin. The ASEAN Political-Security Community: Enhancing Defense Cooperation. Fort Belvoir, VA: Defense Technical Information Center, December 2015. http://dx.doi.org/10.21236/ad1009058.
Full textResearch Institute (IFPRI), International Food Policy. Increasing agricultural productivity and enhancing food security in Africa. Washington, DC: International Food Policy Research Institute, 2012. http://dx.doi.org/10.2499/9780896297937.
Full textFritz, Tucker. Enhancing Reliability of Classified Shipments Between the Nuclear Security Enterprise. Office of Scientific and Technical Information (OSTI), March 2020. http://dx.doi.org/10.2172/1764607.
Full textBarbeau, Sean. Enhancing Transit Safety and Security with Wireless Detection and Communication Technologies. Tampa, FL: University of South Florida, November 2008. http://dx.doi.org/10.5038/cutr-nctr-rr-2007-02.
Full textCruz, Alfredo, Jeff Duffany, and Alexander Lopez. Enhancing Research in Networking & System Security, and Forensics, in Puerto Rico. Fort Belvoir, VA: Defense Technical Information Center, March 2015. http://dx.doi.org/10.21236/ada622717.
Full textFuller, Rob. Resilience in Pakistan: Evaluation of enhancing food security and resilience of small-scale farmers. Oxfam GB, February 2015. http://dx.doi.org/10.21201/2015.344180.
Full text