Journal articles on the topic 'ENHANCING SECURITY'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'ENHANCING SECURITY.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
J, Stephen, and Vidyavati Ramteke. "Enhancing Security Issues in Online Games." Journal of Advanced Research in Dynamical and Control Systems 12, no. 8 (August 19, 2020): 95–103. http://dx.doi.org/10.5373/jardcs/v12i8/20202451.
Full textHaedar Akib,, Lutfi Saefullah, Husain Syam, Hamsu Abdul Gani,. "ENHANCING MARITIME SECURITY COOPERATION." Psychology and Education Journal 58, no. 2 (February 10, 2021): 4769–75. http://dx.doi.org/10.17762/pae.v58i2.2868.
Full textShonola, Shaibu Adekunle, and Mike Joy. "Enhancing Mobile Learning Security." International Journal on Integrating Technology in Education 5, no. 3 (September 30, 2016): 01–15. http://dx.doi.org/10.5121/ijite.2016.5301.
Full textHudson, R. B. "Enhancing Elderly Financial Security." Public Policy & Aging Report 19, no. 3 (June 1, 2009): 2. http://dx.doi.org/10.1093/ppar/19.3.2.
Full textPangalos, G., M. Khair, and L. Bozios. "Enhancing medical database security." Journal of Medical Systems 18, no. 4 (August 1994): 159–71. http://dx.doi.org/10.1007/bf00996700.
Full textWilkinson, Paul. "Enhancing global aviation security?" Terrorism and Political Violence 10, no. 3 (September 1998): 147–66. http://dx.doi.org/10.1080/09546559808427475.
Full textArazi, B. "Enhancing Security with Nanotechnology." Computer 39, no. 10 (October 2006): 106–7. http://dx.doi.org/10.1109/mc.2006.338.
Full textvan der Meer, Sico. "Enhancing International Cyber Security." Security and Human Rights 26, no. 2-4 (December 7, 2015): 193–205. http://dx.doi.org/10.1163/18750230-02602004.
Full textHnamte, Vanlalruata, Jamal Hussain, Samuel Lalmuanawma, Chhakchhuak Lalrinawma, and Lalchhanhima Hmar. "Enhancing Secured Network Slicer for Cloud Security Systems." Indian Journal Of Science And Technology 16, sp1 (October 3, 2023): 179–91. http://dx.doi.org/10.17485/ijst/v16sp1.msc25.
Full textModares, Hero, Amirhossein Moravejosharieh, Rosli Bin Salleh, and Jaime Lloret. "Enhancing Security in Mobile IPv6." ETRI Journal 36, no. 1 (February 1, 2014): 51–61. http://dx.doi.org/10.4218/etrij.14.0113.0177.
Full textT.Deshmukh, Ashvini, and Parikshit N . Mahalle. "Enhancing Security in Linux OS." International Journal of Computer Applications 117, no. 12 (May 20, 2015): 34–37. http://dx.doi.org/10.5120/20609-3239.
Full textCanfield, Jonathan, and Mary Alice Haddad. "Japan's Alliance-Enhancing Security Developments." Asia Policy 28, no. 4 (2021): 167–93. http://dx.doi.org/10.1353/asp.2021.0048.
Full text., Preetha S., Suhas Kini K. ., and Shailesh A. Patil . "ENHANCING SECURITY USING KEYSTROKE DYNAMICS." International Journal of Engineering Applied Sciences and Technology 4, no. 3 (July 31, 2019): 213–25. http://dx.doi.org/10.33564/ijeast.2019.v04i03.037.
Full textAjit Pratap Singh, Rahul Kumar,. "Enhancing Security using Image Processing." International Journal of Innovative Research in Science, Engineering and Technology 04, no. 04 (April 15, 2015): 2435–42. http://dx.doi.org/10.15680/ijirset.2015.0404045.
Full textDy-Liacco, T. E. "Enhancing power system security control." IEEE Computer Applications in Power 10, no. 3 (July 1997): 38–41. http://dx.doi.org/10.1109/67.595291.
Full textMcGinty, John. "Enhancing Building Security: Design Considerations." Library & Archival Security 21, no. 2 (September 11, 2008): 115–27. http://dx.doi.org/10.1080/01960070802201474.
Full textRanjan, Nikhil. "Enhancing Voting Security and Efficiency." Journal of Computers, Mechanical and Management 2, no. 3 (August 31, 2023): 9–15. http://dx.doi.org/10.57159/gadl.jcmm.2.3.23065.
Full textRao Sangarsu, Raghavendr. "Enhancing Cyber Security Using Artificial Intelligence: A Comprehensive Approach." International Journal of Science and Research (IJSR) 12, no. 11 (November 5, 2023): 8–13. http://dx.doi.org/10.21275/sr231029092527.
Full textKyle Dees and Syed Shawon Rahman. "Enhancing Infrastructure Security in Real Estate." International Journal of Network Security & Its Applications 3, no. 6 (November 30, 2011): 59–80. http://dx.doi.org/10.5121/ijnsa.2011.3604.
Full textMahajan, Jagruti, Harshada Rathod, Parul Mankar, Monika Korde, Vaishnavi Rathod, and Professor Kalyani Pendke. "Enhancing the Cloud Security via Cryptography." International Journal of Innovations in Engineering and Science 7, no. 9 (August 9, 2022): 92–96. http://dx.doi.org/10.46335/ijies.2022.7.9.18.
Full textKushwaha, Dilip Kumar, KM Priyanka, and Harleen Kaur. "Enhancing Web-Security with Stronger Captchas." International Journal of Computer Applications Technology and Research 2, no. 3 (May 10, 2013): 297–301. http://dx.doi.org/10.7753/ijcatr0203.1017.
Full textKadam, Akshita D. "Enhancing Software Security for Salesforce Applications." International Journal for Research in Applied Science and Engineering Technology 7, no. 3 (March 31, 2019): 2176–85. http://dx.doi.org/10.22214/ijraset.2019.3401.
Full textJafari, Said. "Enhancing Security Culture through User-Engagement." International Journal of ICT Research in Africa and the Middle East 6, no. 1 (January 2017): 31–39. http://dx.doi.org/10.4018/ijictrame.2017010103.
Full textFisher, Madeline. "Enhancing food security in the Northeast." CSA News 59, no. 7 (June 30, 2014): 4–9. http://dx.doi.org/10.2134/csa2014-59-7-1.
Full textJose, M. Victor, and V. Seenivasagam. "Enhancing security in secure resource sharing." International Journal of Enterprise Network Management 7, no. 4 (2016): 298. http://dx.doi.org/10.1504/ijenm.2016.080457.
Full textSeenivasagam, V., and M. Victor Jose. "Enhancing security in secure resource sharing." International Journal of Enterprise Network Management 7, no. 4 (2016): 298. http://dx.doi.org/10.1504/ijenm.2016.10001386.
Full textBohli, J.-M., N. Gruschka, M. Jensen, L. L. Iacono, and N. Marnau. "Security and Privacy-Enhancing Multicloud Architectures." IEEE Transactions on Dependable and Secure Computing 10, no. 4 (July 2013): 212–24. http://dx.doi.org/10.1109/tdsc.2013.6.
Full textMcKerchar, Christina, Sharron Bowers, Craig Heta, Louise Signal, and Leonie Matoe. "Enhancing Māori food security using traditionalkai." Global Health Promotion 22, no. 3 (August 2014): 15–24. http://dx.doi.org/10.1177/1757975914543573.
Full textEskandarpour, Rozhin, Pranav Gokhale, Amin Khodaei, Frederic T. Chong, Aleksi Passo, and Shay Bahramirad. "Quantum Computing for Enhancing Grid Security." IEEE Transactions on Power Systems 35, no. 5 (September 2020): 4135–37. http://dx.doi.org/10.1109/tpwrs.2020.3004073.
Full textGothawal, Deepali Bankatsingh, and S. V. Nagaraj. "Intrusion Detection for Enhancing RPL Security." Procedia Computer Science 165 (2019): 565–72. http://dx.doi.org/10.1016/j.procs.2020.01.051.
Full textValentine, J. Andrew. "Enhancing the employee security awareness model." Computer Fraud & Security 2006, no. 6 (June 2006): 17–19. http://dx.doi.org/10.1016/s1361-3723(06)70370-0.
Full textFarnworth, Richard. "Enhancing security for the mobile workforce." Biometric Technology Today 16, no. 1 (January 2008): 8. http://dx.doi.org/10.1016/s0969-4765(08)70017-1.
Full textCaloyannides, M. "Enhancing Security: Not for the Conformist." IEEE Security and Privacy Magazine 2, no. 6 (November 2004): 88–87. http://dx.doi.org/10.1109/msp.2004.98.
Full textSharma, Srinarayan, and Vijayan Sugumaran. "A Framework for Enhancing Systems Security." Journal of Information Privacy and Security 7, no. 4 (October 2011): 3–22. http://dx.doi.org/10.1080/15536548.2011.10855921.
Full textHighland, Esther H. "VMSecure: Enhancing VM security and control." Computers & Security 7, no. 3 (June 1988): 327–28. http://dx.doi.org/10.1016/0167-4048(88)90092-2.
Full textHammood et. al., Maytham M. "Enhancing Security and Speed of RC4." International Journal of Computing and Network Technology 03, no. 02 (May 1, 2015): 37–48. http://dx.doi.org/10.12785/ijcnt/030201.
Full textBotacin, Marcus, Paulo Lício De Geus, and André Grégio. "Enhancing Branch Monitoring for Security Purposes." ACM Transactions on Privacy and Security 21, no. 1 (January 6, 2018): 1–30. http://dx.doi.org/10.1145/3152162.
Full textNeves, Ângelo, and Gisele Lemes Veiga Araujo. "Smart Automation for Enhancing Cyber-Security." Foresight and STI Governance 17, no. 1 (March 20, 2023): 89–97. http://dx.doi.org/10.17323/2500-2597.2023.1.89.97.
Full textC. Smith, Mary. "Enhancing food security through Public Enterprise." Public Enterprise Half-Yearly Journal 27, no. 1 (December 31, 2023): 64–77. http://dx.doi.org/10.21571/pehyj.2023.2701.05.
Full textR., Surya. "Enhancing the Security of Medical Data Using Time Stamp Series." International Journal of Psychosocial Rehabilitation 24, no. 5 (April 20, 2020): 5822–28. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020289.
Full textMathur, Sonali, Shankar Lal Gupta, and Payal Pahwa. "Enhancing Security in Banking Environment Using Business Intelligence." International Journal of Information Retrieval Research 10, no. 4 (October 2020): 21–34. http://dx.doi.org/10.4018/ijirr.2020100102.
Full textMolina Zarca, Alejandro, Jorge Bernal Bernabe, Ivan Farris, Yacine Khettab, Tarik Taleb, and Antonio Skarmeta. "Enhancing IoT security through network softwarization and virtual security appliances." International Journal of Network Management 28, no. 5 (July 16, 2018): e2038. http://dx.doi.org/10.1002/nem.2038.
Full textČuřík, Peter, Roderik Ploszek, and Pavol Zajac. "Practical Use of Secret Sharing for Enhancing Privacy in Clouds." Electronics 11, no. 17 (September 1, 2022): 2758. http://dx.doi.org/10.3390/electronics11172758.
Full textAsfoor, Ayman. "The Role of Psychological Capital, Sanction and Organization Security Resources in Enhancing the Security behaviour of Employees who Violate Security Policies." International Journal of Research Publication and Reviews 4, no. 8 (August 2023): 614–18. http://dx.doi.org/10.55248/gengpi.4.823.30603.
Full textWilliams, Adam D. "Multilayered Network Models for Security: Enhancing System Security Engineering with Orchestration." INSIGHT 25, no. 2 (June 2022): 44–48. http://dx.doi.org/10.1002/inst.12385.
Full textAslam, Mubeen. "Enhancing Information Security Management by STOPE View with Six Sigma Approach." International Journal of Engineering and Technology 4, no. 6 (2012): 743–46. http://dx.doi.org/10.7763/ijet.2012.v4.475.
Full textSetia, Prashant, and Sandosh S. "Enhancing Cybersecurity Defense of IoT Ecosystem Using Blockchain." Suranaree Journal of Science and Technology 30, no. 4 (October 9, 2023): 010238(1–14). http://dx.doi.org/10.55766/sujst-2023-04-e01071.
Full textANDROJNA, ANDREJ. "OBALNA STRAŽA – DEJAVNIK POVEČANJA VARNOSTI V POMORSKEM PROMETU." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2015/ ISSUE 17/1 (May 30, 2015): 63–79. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.17.1.4.
Full textSachdev, Abha, and Mohit Bhansali. "Enhancing Cloud Computing Security using AES Algorithm." International Journal of Computer Applications 67, no. 9 (April 18, 2013): 19–23. http://dx.doi.org/10.5120/11422-6766.
Full textYousif, Raghad Z., Shahab W. Kareem, and Shadan M. Abdalwahid. "Enhancing Approach for Information Security in Hadoop." Polytechnic Journal 10, no. 1 (June 30, 2020): 81–87. http://dx.doi.org/10.25156/ptj.v10n1y2020.pp81-87.
Full text