Academic literature on the topic 'ENHANCING SECURITY'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ENHANCING SECURITY.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "ENHANCING SECURITY"

1

J, Stephen, and Vidyavati Ramteke. "Enhancing Security Issues in Online Games." Journal of Advanced Research in Dynamical and Control Systems 12, no. 8 (August 19, 2020): 95–103. http://dx.doi.org/10.5373/jardcs/v12i8/20202451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haedar Akib,, Lutfi Saefullah, Husain Syam, Hamsu Abdul Gani,. "ENHANCING MARITIME SECURITY COOPERATION." Psychology and Education Journal 58, no. 2 (February 10, 2021): 4769–75. http://dx.doi.org/10.17762/pae.v58i2.2868.

Full text
Abstract:
Seaborne trade is an important component of world trade by which, Indonesia’s water becomes very important and vital in contributing to the world economy. Notwithstanding the strategic meaning of Indonesian water to the World, Indonesian water is still the full responsibility of Indonesia. Indonesia has made substantial and sustained efforts to maintain the safety and security of its sea lanes of communication by updating paper charts, installing navigational aids, broadcasting maritime hazards and weather forecasts, and patrolling certain areas. These efforts show that Indonesia, somewhat, has undertaken its obligations in taking care of the international community interests. Nevertheless, user states and other ships which use chokepoints within Indonesia’ water and derive significant benefits within sometimes do not realize as such. Therefore, this article on the results of normative research aims to explain the need to increase maritime security cooperation as a precondition for achieving the common goals of countries that utilize Indonesian waters and surrounding countries as a route of transportation, trade, cultural exchange, science and civilization.
APA, Harvard, Vancouver, ISO, and other styles
3

Shonola, Shaibu Adekunle, and Mike Joy. "Enhancing Mobile Learning Security." International Journal on Integrating Technology in Education 5, no. 3 (September 30, 2016): 01–15. http://dx.doi.org/10.5121/ijite.2016.5301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hudson, R. B. "Enhancing Elderly Financial Security." Public Policy & Aging Report 19, no. 3 (June 1, 2009): 2. http://dx.doi.org/10.1093/ppar/19.3.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pangalos, G., M. Khair, and L. Bozios. "Enhancing medical database security." Journal of Medical Systems 18, no. 4 (August 1994): 159–71. http://dx.doi.org/10.1007/bf00996700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wilkinson, Paul. "Enhancing global aviation security?" Terrorism and Political Violence 10, no. 3 (September 1998): 147–66. http://dx.doi.org/10.1080/09546559808427475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Arazi, B. "Enhancing Security with Nanotechnology." Computer 39, no. 10 (October 2006): 106–7. http://dx.doi.org/10.1109/mc.2006.338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

van der Meer, Sico. "Enhancing International Cyber Security." Security and Human Rights 26, no. 2-4 (December 7, 2015): 193–205. http://dx.doi.org/10.1163/18750230-02602004.

Full text
Abstract:
Cyber aggression is an increasing threat to international security and stability. While national policies intended to deter cyber aggression may offer some solution in the short term, their effects in the long term are doubtful. National cyber-deterrence policies entail the risk of an on-going cyber arms race and a cycle of escalation between potential cyber opponents. Diplomacy may offer fewer results in the short term, but it is more promising in the long term. Confidence-building measures and international norms and values may not be easy to reach, but in the end they could be more effective (and cheaper) than a single focus on national cyber-deterrence strategies. In the long term, cooperation between states to establish confidence and commonly accepted norms of behaviour in cyber space are the most promising ways available to achieve enduring cyber security and stability. Enhancing interstate co-operation, transparency and predictability of behaviour in cyberspace will reduce the risks of misperception, escalation and conflict.
APA, Harvard, Vancouver, ISO, and other styles
9

Hnamte, Vanlalruata, Jamal Hussain, Samuel Lalmuanawma, Chhakchhuak Lalrinawma, and Lalchhanhima Hmar. "Enhancing Secured Network Slicer for Cloud Security Systems." Indian Journal Of Science And Technology 16, sp1 (October 3, 2023): 179–91. http://dx.doi.org/10.17485/ijst/v16sp1.msc25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Modares, Hero, Amirhossein Moravejosharieh, Rosli Bin Salleh, and Jaime Lloret. "Enhancing Security in Mobile IPv6." ETRI Journal 36, no. 1 (February 1, 2014): 51–61. http://dx.doi.org/10.4218/etrij.14.0113.0177.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "ENHANCING SECURITY"

1

Zhang, Linfan, and Shuang Zheng. "Enhancing QR Code Security." Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-14145.

Full text
Abstract:
Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come after. We also give an objective evaluation on the outcome in comparison to existing QR products. They are based on the purpose of enhancing QR code security and aim to interpret how we have tackle the specified problems meanwhile to suggest possible further work for bringing security of QR code to a higher level.
APA, Harvard, Vancouver, ISO, and other styles
2

Yue, Chuan. "Enhancing Web Browsing Security." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623575.

Full text
Abstract:
Web browsing has become an integral part of our lives, and we use browsers to perform many important activities almost everyday and everywhere. However, due to the vulnerabilities in Web browsers and Web applications and also due to Web users' lack of security knowledge, browser-based attacks are rampant over the Internet and have caused substantial damage to both Web users and service providers. Enhancing Web browsing security is therefore of great need and importance.;This dissertation concentrates on enhancing the Web browsing security through exploring and experimenting with new approaches and software systems. Specifically, we have systematically studied four challenging Web browsing security problems: HTTP cookie management, phishing, insecure JavaScript practices, and browsing on untrusted public computers. We have proposed new approaches to address these problems, and built unique systems to validate our approaches.;To manage HTTP cookies, we have proposed an approach to automatically validate the usefulness of HTTP cookies at the client-side on behalf of users. By automatically removing useless cookies, our approach helps a user to strike an appropriate balance between maximizing usability and minimizing security risks. to protect against phishing attacks, we have proposed an approach to transparently feed a relatively large number of bogus credentials into a suspected phishing site. Using those bogus credentials, our approach conceals victims' real credentials and enables a legitimate website to identify stolen credentials in a timely manner. to identify insecure JavaScript practices, we have proposed an execution-based measurement approach and performed a large-scale measurement study. Our work sheds light on the insecure JavaScript practices and especially reveals the severity and nature of insecure JavaScript inclusion and dynamic generation practices on the Web. to achieve secure and convenient Web browsing on untrusted public computers, we have proposed a simple approach that enables an extended browser on a mobile device and a regular browser on a public computer to collaboratively support a Web session. A user can securely perform sensitive interactions on the mobile device and conveniently perform other browsing interactions on the public computer.
APA, Harvard, Vancouver, ISO, and other styles
3

H, Fruchter Nathaniel. "Enhancing ISP-consumer security notifications." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122916.

Full text
Abstract:
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2019
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 79-85).
Security notification schemes hold great promise for improving both consumer cybersecurity and general network health as malware and other sources of malicious activity are becoming more prevalent on home networks. For example, botnets of Internet of Things devices engage in denial of service (DoS) attacks and ransomware holds data on personal and commercial systems hostage. Many of these threats are relatively opaque for an end user. An end user may not know that their smart device is participating in a DoS attack at all, unless they notice a protracted slowdown in network speeds. An upstream network provider like a consumer ISP has more visibility into the issue. Due to their privileged position, ISPs often have more data about the status of a malware infection, denial of service attack, or other malicious activity. This extra information can be of great benefit for the purposes of notification. For instance, an ISP may be able to notify a customer that a device on their network is being used for a DoS attackor that they see communication with a server involved in distributing ransomware. ISPs and other organizations that try and implement these schemes often run into a set of questions: How do I get the right data to power the notification? How do I ensure the user trusts the notification? Can I ensure the notification is not spoofed? Is there an optimal way to present the notification? How do I make sure a user takes the proper remedial action? This thesis presents a framework for new notification schemes to answer these questions by examining four key elements of a notification: form, delivery, and content. It also proposes multi-factor verification, a novel scheme to address trust and spoofing issues within a notification scheme. Finally, it provides a model for a new ISP-user security notification scheme within the context of the United States market and policy landscape.
by Nathaniel H. Fruchter.
S.M. in Technology and Policy
S.M.inTechnologyandPolicy Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program
APA, Harvard, Vancouver, ISO, and other styles
4

Mohammed, Ali, Sachin Sama, and Majeed Mohammed. "Enhancing Network Security in Linux Environment." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17144.

Full text
Abstract:
Designing a secured network is the most important task in any enterprise or organization development. Securing a network mainly involves applying policies and procedures to protect different network devices from unauthorized access. Servers such as web servers, file servers, mail servers, etc., are the important devices in a network. Therefore, securing these servers is the first and foremost step followed in every security implementation mechanism. To implement this, it is very important to analyse and study the security mechanisms provided by the operating system. This makes it easier for security implementation in a network. This thesis work demonstrates the tasks needed to enhance the network security in Linux environment. The various security modules existing in Linux makes it different from other operating systems. The security measures which are mainly needed to enhance the system security are documented as a baseline for practical implementation. After analysing the security measures for implementing network security, it is important to understand the role of network monitoring tools and Linux inbuilt log management in maintaining the security of a network. This is accomplished by presenting a detailed discussion on network monitoring tools and log management in Linux. In order to test the network security, a network is designed using Linux systems by configuring different servers and application firewall for packet filtering. The security measures configured on each server to enhance its security are presented as part of the implementation. The results obtained while an unauthorized user accessing the servers from the external network are also documented along with attack information retrieved by different network monitoring tools and Linux inbuilt log messages.
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Ying. "Enhancing security for XML Web services." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27531.

Full text
Abstract:
The XML-based interoperable characteristics make enhancing security for XML Web Services a lot different from that of the traditional network-based applications. SSL VPN gateways are usually used to provide security for traditional network-based applications, but not for Web Services. This thesis presents an integrated security solution for securing both traditional network-based applications and Web Services. The integrated security solution includes a VPN framework and a Web Services framework. Considering that we have already had an SSL VPN gateway developed by our lab, we take it as the motherboard of the solution and the VPN server of the gateway as the security functional part of the VPN framework. As the highlight of this thesis project, a Web Services security component, also the security functional part of the Web Services framework, has been developed, implemented and integrated with the SSL VPN gateway to get the integrated security solution. The problem of applying ECC over binary fields for XML security, SOAP message security and Web Services security to make the Web Services security component share the same set of ECC keys with the VPN server on the gateway has been studied. Tools for reading ECC keys and certificates from the BUL's key files have been developed. Methods to adopt the ECC key files to ensure security of Web Services have also been developed. To the best of our knowledge, there is no previous work on adopting ECC keys over binary fields for Web Services security. The integrated security solution we present in this thesis is the prototype of a network device that has functions of three gateways: a VPN gateway, a Web Services security gateway and a Web Services gateway.
APA, Harvard, Vancouver, ISO, and other styles
6

Kadhum, Hamza. "Enhancing Zigbee Security for Industrial Implementation." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279559.

Full text
Abstract:
Zigbee network is a popular choice for deploying low power personal area network (LoWPAN). The application areas vary but the most popular are industrial area monitoring and home automation. But Zigbee has been identified to have weak security and is not applicable for industrial implementation. This paper is collaboration with Ericsson to investigate Zigbee network security and implementation. This paper will cover security solutions for Zigbee and touch on how to configure Zigbee network such that it can operate for a long period of time without battery changes. The security solutions will demonstrate how public-key respective symmetric key algorithm can be used for enhancing Zigbee security such that it provide authentication and authorization of joining devices while maintaining confidentiality and integrity of the network communication. Security solutions will also take regards to the power consumption of each proposed solution. For the network configuration part of the thesis, it will present node lifetime for different network configuration, i.e. how polling period between each message will affect the total cur- rent consumption of a node and how the joining procedure, depending on the security solution will affect the total node lifetime. Achieving longer node lifetime is desired because it is assumed that the network will be deployed in remote and unfavorable areas. The result of this paper compares different solutions for enhancing the security. Further, it concludes that Zigbee security with authentication and authorization of joining devices is reached through secret-splitting key establishment - which is the best solution. This is possible while maintaining low power consumption in the network.
Zigbee nätverk är ett populärt val vid uppsättning av ett nätverk med låg strömförbrukning. Zigbees användningsområde är olika men den är väldigt populär inom industriell områdesövervakning och hemautomation. Däremot har Zigbees säkerhet varit en nackdel, då det har framkommit att den inte möter kraven för industriell användning. Arbetet kom till genom ett samarbete med Ericsson och KTH för att undersöka Zigbee nätverks implementation och säkerhet. Arbetet bearbetar olika säkerhetslösningar för Zigbee nätverk och hur den kan implementeras för att uppnå långtidsanvändning utan batteribyte. Säkerhetslösningar bygger på public-key samt symmetric key kryptografi algoritmer för att förbättra och öka Zigbees säkerhet genom autentisering och tillåtelse av noder som ansluter sig till nätverket. Nätverkets konfiguration för långtidsanvändning redovisas genom att jämföra olika polling tidsintervaller mellan meddelanden. Långtidsanvändning utan batteribyte är viktigt för att nätverket kommer implementeras i ett avlägset område som är svåråtkomlig. Arbetet redovisar och jämföra olika lösningar för att öka säkerheten för Zigbee nätverk. Den optimala lösningen för att uppnå autentisering samt tillåtelse av noder som ansluter sig uppnås med nyckel skapande genom secret-splitting metoden. Metoden följer NIST rekommendationer och anses vara säker, därav uppfyller den kraven för industriell implementation. Nätverkets säkerhet ökar samt bibehåller ett nätverk med låg strömförbrukning.
APA, Harvard, Vancouver, ISO, and other styles
7

Makkar, Ankush. "Enhancing IoT Security Using 5G Capabilities." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85109.

Full text
Abstract:
Internet of Things (IoT) is an ecosystem comprises CT (Communication Technology),IT (Information Technology) and sometime OT (Operational Technologies) wheredifferent machines and devices can interact with each other and exchange useful datawhich can be processed using different IoT applications to take decisions and performrequired actions. Number of IoT devices and IoT networks are growing exponentially.Security is of utmost importance and without proper security implementation, IoTNetworks with billions of devices will be hacked and used as botnets which can createdisaster. The new IoT use cases cannot be realized using the current communicationtechnologies due to the QoS (Quality of Service) and business requirements. 5Gnetwork are designed keeping IoT use cases in mind and with the development of 5Gnetwork, it will be easier to implement more secured IoT network and enable differentIoT use cases which are not feasible today.To build the future IoT networks with 5G, it’s important to study and understand 5Gsecurity features. Security is perceived as one of the most important considerationwhile building IoT solutions and to implement 5G network for IoT solutions require anoverall understanding of 5G security features. In the thesis, work have been done toidentify the gap in the current research with respect to 5G security features anddescribe 5G features that will enhance IoT security. After identifying key 5G securityfeatures, the implementation of the identified 5G security features will be describedwith the 5G based smart grid and smart factory use cases. The key finding is howdifferent 5G security capabilities secure IoT communication and another importantfinding is that not all security capabilities are applicable to all IoT use cases. Hence,security capabilities to be used based on the 5G use case requirement.
APA, Harvard, Vancouver, ISO, and other styles
8

Fekete, Florian. "Civil-military relations : enhancing international security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FFekete.pdf.

Full text
Abstract:
Thesis (M.A. in International Security and Civil-Military Relations)--Naval Postgraduate School, March 2003.
Thesis advisor(s): Donald Abenheim, Karen Guttieri. Includes bibliographical references (p. 65-70). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
9

Kirkham, E., and C. Flew. "Strengthening embargoes and enhancing human security." Thesis, International Alert, Saferworld and University of Bradford, Department of Peace Studies, Centre for International Co-operation and Security, 2003. http://hdl.handle.net/10454/4275.

Full text
Abstract:
yes
Arms embargoes are one of the principal tools of states in seeking to prevent, limit and bring an end to armed conflict and human rights abuses. Despite the frequency with which arms embargoes have been imposed, there are significant problems with their implementation. Pressure is therefore growing for the international governmental community to act in order to ensure that the political commitment embodied by the imposition of arms embargoes is matched by the commitment to ensure their rigorous enforcement and to achieve enhanced human security on the ground. Increasing the effectiveness of arms embargoes is a specific aim of the United Nations Programme of Action for Preventing and Combating the Illicit Trade in Small Arms and Light Weapons in All Its Aspects1 which specifically calls upon states "To take appropriate measures, including all legal or administrative means, against any activity that violates a United Nations Security Council arms embargo in accordance with the Charter of the United Nations".2 Accordingly, within the context of the implementation of the UN PoA, the overall aim of this paper is to explore ways in which the international community can act in order to strengthen the impact of arms embargoes and enhance human security. It will begin by examining the purposes, processes and effects relating to arms embargoes, with particular attention to those agreed at international (UN) level, and by highlighting issues of concern in each regard. An overview of the main issues and challenges facing implementation of arms embargoes will include the elaboration of three case-study examples showing the impact of UN arms embargoes on the availability of arms and on human security and a further five that illustrate the dilemmas faced by states in seeking to implement arms embargoes. Priority areas for attention in any international effort to strengthen the effectiveness of arms embargoes will be followed by more extensive proposals for enhancing international embargo regimes within the context of implementing the UN PoA. Whilst it is recognised that the UN PoA contains measures that relate only to the illicit trade in small arms and light weapons (SALW), if implemented fully, many of these would serve to strengthen the international apparatus of control, information exchange and provision of assistance relating to arms proliferation and misuse as a whole. In turn, this would greatly enhance the implementation of UN arms embargoes. Therefore, as well as providing an opportunity for reviewing progress on implementing the PoA, the first Biennial Meeting of States in July 2003 is clearly a major opportunity for states to address a number of the pressing challenges facing states in the implementation of UN embargoes.
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Man Hee. "Architectural support for enhancing security in clusters." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2889.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "ENHANCING SECURITY"

1

Cuthbertson, Ian M., and David Robertson. Enhancing European Security. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shultz, George Pratt. Enhancing diplomatic security. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rowny, Edward L. SDI, enhancing security and stability. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rowny, Edward L. SDI, enhancing security and stability. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rowny, Edward L. SDI, enhancing security and stability. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rao, Vemuri V., ed. Enhancing computer security with smart technology. Boca Raton, FL: Auerbach Publications, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Congressional Budget Office., ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congressional Budget Office., ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Congressional Budget Office, ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Congressional Budget Office, ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "ENHANCING SECURITY"

1

Coffin, David. "Enhancing Security." In Expert Oracle and Java Security, 267–328. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3832-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cuthbertson, Ian M., and David Robertson. "Security Through Behavioral Modification." In Enhancing European Security, 186–206. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cuthbertson, Ian M., and David Robertson. "Introduction." In Enhancing European Security, 3–21. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cuthbertson, Ian M., and David Robertson. "Arms Control and All That." In Enhancing European Security, 166–85. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cuthbertson, Ian M., and David Robertson. "Combining Control and Enhancement." In Enhancing European Security, 207–16. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cuthbertson, Ian M., and David Robertson. "Why Was INF Needed, and Would It Have Been Used?" In Enhancing European Security, 23–35. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cuthbertson, Ian M., and David Robertson. "Conventional Force Imbalances: How to Count, and Can We Count?" In Enhancing European Security, 36–53. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cuthbertson, Ian M., and David Robertson. "Conventional Force Imbalances: The Numbers." In Enhancing European Security, 54–66. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cuthbertson, Ian M., and David Robertson. "Is There a Special European Interest in European Security?" In Enhancing European Security, 67–106. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cuthbertson, Ian M., and David Robertson. "Is There a Pan-European Special Interest?" In Enhancing European Security, 107–25. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "ENHANCING SECURITY"

1

Zisiadis, Dimitris, Spyros Kopsidas, Argyris Varalis, and Leandros Tassiulas. "Enhancing WPS security." In 2012 IFIP Wireless Days (WD). IEEE, 2012. http://dx.doi.org/10.1109/wd.2012.6402836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fall, Moustapha, Chris Chuvalas, Nolan Warning, Max Rabiee, and Carla Purdy. "Enhancing SCADA System Security." In 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2020. http://dx.doi.org/10.1109/mwscas48704.2020.9184532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Arun Kumar, Shefalika Ghosh Samaddar, and Arun K. Misra. "Enhancing VPN security through security policy management." In 2012 1st International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2012. http://dx.doi.org/10.1109/rait.2012.6194494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Priyanka, S. Sharon, and B. Nagajayanthi. "Enhancing security in Bluetooth networks." In 2014 International Conference on Science Engineering and Management Research (ICSEMR). IEEE, 2014. http://dx.doi.org/10.1109/icsemr.2014.7043560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tamaki, Kiyoshi. "Enhancing implementation security of QKD." In Quantum Technologies and Quantum Information Science, edited by Mark T. Gruneisen, Miloslav Dusek, and John G. Rarity. SPIE, 2017. http://dx.doi.org/10.1117/12.2280737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Thomson, I. R. "Performance enhancing proxies and security." In IP over Satellite - The Next Generation: MPLS, VPN and DRM Delivered Services. IEE, 2003. http://dx.doi.org/10.1049/ic:20030055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ketel, Mohammed. "Enhancing BYOD Security Through SDN." In SoutheastCon 2018. IEEE, 2018. http://dx.doi.org/10.1109/secon.2018.8479230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Farinholt, Jacob M., and James E. Troupe. "Enhancing QKD security with weak measurements." In SPIE Security + Defence, edited by Mark T. Gruneisen, Miloslav Dusek, and John G. Rarity. SPIE, 2016. http://dx.doi.org/10.1117/12.2241059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dulski, R., P. Powalisz, M. Kastek, and P. Trzaskawka. "Enhancing image quality produced by IR cameras." In Security + Defence, edited by David A. Huckridge and Reinhard R. Ebert. SPIE, 2010. http://dx.doi.org/10.1117/12.864979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chaudhry, Yuvraj Singh, Upasana Sharma, and Ajay Rana. "Enhancing Security Measures of AI Applications." In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9197790.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "ENHANCING SECURITY"

1

Rowny, Edward L. SDI: Enhancing Security and Stability. Fort Belvoir, VA: Defense Technical Information Center, March 1988. http://dx.doi.org/10.21236/ada351518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pregenzer, A. L. Enhancing regional security agreements through cooperative monitoring. Office of Scientific and Technical Information (OSTI), May 1995. http://dx.doi.org/10.2172/79720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yunus, Sarıkaya, and Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, July 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yunus, Sarıkaya, and Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, July 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Albek, Aminuddin. The ASEAN Political-Security Community: Enhancing Defense Cooperation. Fort Belvoir, VA: Defense Technical Information Center, December 2015. http://dx.doi.org/10.21236/ad1009058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Research Institute (IFPRI), International Food Policy. Increasing agricultural productivity and enhancing food security in Africa. Washington, DC: International Food Policy Research Institute, 2012. http://dx.doi.org/10.2499/9780896297937.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fritz, Tucker. Enhancing Reliability of Classified Shipments Between the Nuclear Security Enterprise. Office of Scientific and Technical Information (OSTI), March 2020. http://dx.doi.org/10.2172/1764607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Barbeau, Sean. Enhancing Transit Safety and Security with Wireless Detection and Communication Technologies. Tampa, FL: University of South Florida, November 2008. http://dx.doi.org/10.5038/cutr-nctr-rr-2007-02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cruz, Alfredo, Jeff Duffany, and Alexander Lopez. Enhancing Research in Networking & System Security, and Forensics, in Puerto Rico. Fort Belvoir, VA: Defense Technical Information Center, March 2015. http://dx.doi.org/10.21236/ada622717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fuller, Rob. Resilience in Pakistan: Evaluation of enhancing food security and resilience of small-scale farmers. Oxfam GB, February 2015. http://dx.doi.org/10.21201/2015.344180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography