Journal articles on the topic 'Probing Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Probing Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Adams, Jefferson. "Probing the East German State Security Archives." International Journal of Intelligence and CounterIntelligence 13, no. 1 (January 2000): 21–34. http://dx.doi.org/10.1080/088506000304925.
Full textMolteni, Maria Chiara, and Vittorio Zaccaria. "A relation calculus for reasoning about t-probing security." Journal of Cryptographic Engineering 12, no. 1 (February 26, 2022): 1–14. http://dx.doi.org/10.1007/s13389-022-00286-x.
Full textBartz, Jennifer A., and Kristina Tchalova. "Probing the Opioidergic Basis of Attachment (In)security." Biological Psychiatry: Cognitive Neuroscience and Neuroimaging 6, no. 3 (March 2021): 256–58. http://dx.doi.org/10.1016/j.bpsc.2020.12.011.
Full textBiswas, Liton Kumar, M. Shafkat M. Khan, Leonidas Lavdas, and Navid Asadizanjani. "Security Assessment of Nonvolatile Memory Against Physical Probing." EDFA Technical Articles 24, no. 4 (November 1, 2022): 22–29. http://dx.doi.org/10.31399/asm.edfa.2022-4.p022.
Full textRahman, M. Tanjidur, Nusrat Farzana Dipu, Dhwani Mehta, Shahin Tajik, Mark Tehranipoor, and Navid Asadizanjani. "CONCEALING-Gate: Optical Contactless Probing Resilient Design." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (June 25, 2021): 1–25. http://dx.doi.org/10.1145/3446998.
Full textGill, Sukhpal Singh, and Arash Shaghaghi. "Security-Aware Autonomic Allocation of Cloud Resources." Journal of Organizational and End User Computing 32, no. 3 (July 2020): 15–22. http://dx.doi.org/10.4018/joeuc.2020070102.
Full textSenn, Martin. "The art of constructing (in)security: probing rhetorical strategies of securitisation." Journal of International Relations and Development 20, no. 3 (May 31, 2017): 605–30. http://dx.doi.org/10.1057/jird.2016.7.
Full textBijalwan, Anchit, Vijender Kumar Solanki, and Emmanuel Shubhakar Pilli. "BOTNET FORENSIC: ISSUES, CHALLENGES AND GOOD PRACTICES." Network Protocols and Algorithms 10, no. 2 (June 28, 2018): 28. http://dx.doi.org/10.5296/npa.v10i2.13144.
Full textLande, Dmitrii. "Construction domain model of information security by probing Google Scholar Citations service." Collection "Information technology and security" 3, no. 1 (June 30, 2015): 4–11. http://dx.doi.org/10.20535/2411-1031.2015.3.1.57678.
Full textWangdee, Wijarn, and Roy Billinton. "Probing the Intermittent Energy Resource Contributions From Generation Adequacy and Security Perspectives." IEEE Transactions on Power Systems 27, no. 4 (November 2012): 2306–13. http://dx.doi.org/10.1109/tpwrs.2012.2204281.
Full textKumar, Megha S., R. Ramanathan, M. Jayakumar, and Devendra Kumar Yadav. "Secret Key Generation Schemes for Physical Layer Security." Defence Science Journal 71, no. 4 (July 1, 2021): 545–55. http://dx.doi.org/10.14429/dsj.71.15403.
Full textWang, Daping. "An XML-based testing strategy for probing security vulnerabilities in the diameter protocol." Bell Labs Technical Journal 12, no. 3 (November 6, 2007): 79–93. http://dx.doi.org/10.1002/bltj.20251.
Full textAmir, Merav, and Hagar Kotef. "In-secure identities: On the securitization of abnormality." Environment and Planning D: Society and Space 36, no. 2 (December 17, 2017): 236–54. http://dx.doi.org/10.1177/0263775817744780.
Full textZheng, Rui, Hao Ma, Qiuyun Wang, Jianming Fu, and Zhengwei Jiang. "Assessing the Security of Campus Networks: The Case of Seven Universities." Sensors 21, no. 1 (January 5, 2021): 306. http://dx.doi.org/10.3390/s21010306.
Full textGupta, Bipin Kumar, Arun Kumar, Pawan Kumar, Jaya Dwivedi, G. N. Pandey, and Garima Kedawat. "Probing on green long persistent Eu2+/Dy3+ doped Sr3SiAl4O11 emerging phosphor for security applications." Journal of Applied Physics 117, no. 24 (June 28, 2015): 243104. http://dx.doi.org/10.1063/1.4922983.
Full textHameiri, Shahar, and Lee Jones. "Probing the links between political economy and non-traditional security: Themes, approaches and instruments." International Politics 52, no. 4 (March 20, 2015): 371–88. http://dx.doi.org/10.1057/ip.2015.1.
Full textDasgupta, Rohee. "Section III :." Jindal Journal of International Affairs 1, no. 1 (October 1, 2011): 162–63. http://dx.doi.org/10.54945/jjia.v1i1.13.
Full textAlterazi, Hassan A., Pravin R. Kshirsagar, Hariprasath Manoharan, Shitharth Selvarajan, Nawaf Alhebaishi, Gautam Srivastava, and Jerry Chun-Wei Lin. "Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization." Sensors 22, no. 16 (August 16, 2022): 6117. http://dx.doi.org/10.3390/s22166117.
Full textBou-Harb, Elias, Mourad Debbabi, and Chadi Assi. "A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities." Computer Networks 94 (January 2016): 327–43. http://dx.doi.org/10.1016/j.comnet.2015.11.004.
Full textEnnaji, Sabrine, Nabil El Akkad, and Khalid Haddouch. "i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security." International Journal of Information Security and Privacy 17, no. 1 (February 3, 2023): 1–17. http://dx.doi.org/10.4018/ijisp.317113.
Full textIndramawan, Andrian, Jacob Donald Tan, and John Tampil Purba. "Probing Into E-commerce Logistics: A Strategic Growth Option of Serbada Company." Jurnal Ilmu Manajemen & Ekonomika 10, no. 2 (September 26, 2018): 51. http://dx.doi.org/10.35384/jime.v10i2.79.
Full textLiu, Yuxin, Ming Ma, Xiao Liu, Neal N. Xiong, Anfeng Liu, and Ying Zhu. "Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security." IEEE Transactions on Network Science and Engineering 7, no. 1 (January 1, 2020): 356–72. http://dx.doi.org/10.1109/tnse.2018.2881152.
Full textDandira, Martin. "Delays in probing case irks workers, AMARA, Zimbabwe." Emerald Emerging Markets Case Studies 2, no. 8 (October 17, 2012): 1–3. http://dx.doi.org/10.1108/20450621211295596.
Full textThomas, Deborah A. "Can Black Lives Matter in a Black Country?" Social Text 40, no. 3 (September 1, 2022): 17–35. http://dx.doi.org/10.1215/01642472-9771035.
Full textBin Tarik, Farhan, Azadeh Famili, Yingjie Lao, and Judson D. Ryckman. "Robust optical physical unclonable function using disordered photonic integrated circuits." Nanophotonics 9, no. 9 (July 3, 2020): 2817–28. http://dx.doi.org/10.1515/nanoph-2020-0049.
Full textMishra, Amitabh, Thomas Reichherzer, Ezhil Kalaimannan, Norman Wilde, and Ruben Ramirez. "Trade-offs involved in the choice of cloud service configurations when building secure, scalable, and efficient Internet-of-Things networks." International Journal of Distributed Sensor Networks 16, no. 2 (February 2020): 155014772090819. http://dx.doi.org/10.1177/1550147720908199.
Full textLuo, Lan, Yue Zhang, Bryan Pearson, Zhen Ling, Haofei Yu, and Xinwen Fu. "On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring." Sensors 18, no. 12 (December 16, 2018): 4451. http://dx.doi.org/10.3390/s18124451.
Full textXu, Li Wen, Li Juan Qiao, Xun Yong Ou, and Kun Zhang. "Study of Intrusion Detection Based on Genetic Algorithm and Rule." Applied Mechanics and Materials 602-605 (August 2014): 1797–802. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.1797.
Full textAhmed, Ashfaq, Usman ,. Qais, Muhammad Dawood ,. Kakar, and Atta Muhammad. "China’s Economic Growth: Threats and Challenges to Chinese Economy and Energy Security." WSEAS TRANSACTIONS ON POWER SYSTEMS 17 (July 4, 2022): 187–95. http://dx.doi.org/10.37394/232016.2022.17.19.
Full textHu, Daiming, Bülent Tezkan, Mingxin Yue, Xiaodong Yang, Xiaoping Wu, and Guanqun Zhou. "Prediction of Conductive Anomalies Ahead of the Tunnel by the 3D-Resitivity Forward Modeling in the Whole Space." Geofluids 2021 (December 21, 2021): 1–12. http://dx.doi.org/10.1155/2021/7301311.
Full textSubathra, P., S. Sivagurunathan, and N. Ramaraj. "Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks." International Journal of Business Data Communications and Networking 6, no. 1 (January 2010): 38–57. http://dx.doi.org/10.4018/jbdcn.2010010103.
Full textAgorsah, Michael Kodjo. "A Survey Of Packet Analysis For Network Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 263–66. http://dx.doi.org/10.22624/aims/crp-bk3-p42.
Full textChen, Shuai, Yang Yin, Zheng Wang, and Fan Gui. "Low-altitude protection technology of anti-UAVs based on multisource detection information fusion." International Journal of Advanced Robotic Systems 17, no. 5 (September 1, 2020): 172988142096290. http://dx.doi.org/10.1177/1729881420962907.
Full textThoret, E., C. Gauriau, T. Andrillon, D. Pressnitzer, and D. Leger. "0293 Sleep Deprivation Affects the Acoustic Properties of Human Speech." Sleep 43, Supplement_1 (April 2020): A111. http://dx.doi.org/10.1093/sleep/zsaa056.290.
Full textShamseddine, Maha, Wassim Itani, Ali Chehab, and Ayman Kayssi. "Network Programming and Probabilistic Sketching for Securing the Data Plane." Security and Communication Networks 2018 (June 28, 2018): 1–23. http://dx.doi.org/10.1155/2018/2905730.
Full textVeale, Michael, Reuben Binns, and Lilian Edwards. "Algorithms that remember: model inversion attacks and data protection law." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 376, no. 2133 (October 15, 2018): 20180083. http://dx.doi.org/10.1098/rsta.2018.0083.
Full textAhmad, Abu Umar Faruq. "Shari'ah Parameters of Musharakah Mutanaqisah in Islamic Finance: The Experience of Australian Institutions Offering Islamic Financial Services." ISRA International Journal of Islamic Finance 3, no. 2 (December 15, 2011): 7–40. http://dx.doi.org/10.55188/ijif.v3i2.130.
Full textKalyoncu, Mehmet. "Uzbekistan and the United States." American Journal of Islam and Society 23, no. 1 (January 1, 2006): 102–5. http://dx.doi.org/10.35632/ajis.v23i1.1646.
Full textLi, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.
Full textHyder, M. F., and M. A. Ismail. "INMTD: Intent-based Moving Target Defense Framework using Software Defined Networks." Engineering, Technology & Applied Science Research 10, no. 1 (February 3, 2020): 5142–47. http://dx.doi.org/10.48084/etasr.3266.
Full textMuanenda, Yonas. "Recent Advances in Distributed Acoustic Sensing Based on Phase-Sensitive Optical Time Domain Reflectometry." Journal of Sensors 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/3897873.
Full textJanjua, Kanwal, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak, Carsten Maple, and Ikram Ud Din. "Proactive Forensics in IoT: Privacy-Aware Log-Preservation Architecture in Fog-Enabled-Cloud Using Holochain and Containerization Technologies." Electronics 9, no. 7 (July 19, 2020): 1172. http://dx.doi.org/10.3390/electronics9071172.
Full textAbdulrezzak, Sarah, and Firas Sabir. "An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers." Journal of Engineering 29, no. 2 (February 1, 2023): 164–78. http://dx.doi.org/10.31026/j.eng.2023.02.11.
Full textŠKORIĆ, BORIS. "Quantum readout of Physical Unclonable Functions." International Journal of Quantum Information 10, no. 01 (February 2012): 1250001. http://dx.doi.org/10.1142/s0219749912500013.
Full textGeissler, Erhard, and Robert Hunt Sprinkle. "Were our critics right about the Stasi?" Politics and the Life Sciences 38, no. 1 (2019): 32–61. http://dx.doi.org/10.1017/pls.2018.27.
Full textGiannelli, Paul C. "Forensic Science." Journal of Law, Medicine & Ethics 33, no. 3 (2005): 535–44. http://dx.doi.org/10.1111/j.1748-720x.2005.tb00516.x.
Full textGiannelli, Paul C. "Forensic Science." Journal of Law, Medicine & Ethics 34, no. 2 (2006): 310–19. http://dx.doi.org/10.1111/j.1748-720x.2006.00036.x.
Full textAnyaoha, Christian Okechukwu, Uyokei Uba, Ejiro Onotugoma, Semon Mande, Vernon Gracen, and Nnabue Ikenna. "Farmers’ Preferred Traits and Perceptions of Drought Stress on Rainfed Upland Rice Production across Two Rice Growing States of Nigeria." Journal of Agricultural Studies 7, no. 2 (August 19, 2019): 160. http://dx.doi.org/10.5296/jas.v7i3.15302.
Full textKumar, Abhishek, Manoj Gupta, Prakash Pitchappa, Yi Ji Tan, Nan Wang, and Ranjan Singh. "Topological sensor on a silicon chip." Applied Physics Letters 121, no. 1 (July 4, 2022): 011101. http://dx.doi.org/10.1063/5.0097129.
Full textAbudu, Ramat Tobi. "A Human Rights View of Maritime Piracy Law: Exploring the Gulf of Guinea." Groningen Journal of International Law 9, no. 1 (September 28, 2021): 1–22. http://dx.doi.org/10.21827/grojil.9.1.1-22.
Full text