Journal articles on the topic 'Security challenge'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security challenge.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Streater, K. "Cyber Security Challenge." ITNOW 52, no. 6 (November 1, 2010): 28. http://dx.doi.org/10.1093/itnow/bwq218.
Full textWaugh, William L. "Securing Mass Transit: A Challenge for Homeland Security." Review of Policy Research 21, no. 3 (May 2004): 307–16. http://dx.doi.org/10.1111/j.1541-1338.2004.00077.x.
Full textFair, C. Christine. "Pakistan's Security-Governance Challenge." Current History 110, no. 735 (April 1, 2011): 136–42. http://dx.doi.org/10.1525/curh.2011.110.735.136.
Full textSzönyi, István. "Hungary: A security challenge?" International Spectator 29, no. 1 (January 1994): 89–108. http://dx.doi.org/10.1080/03932729408458041.
Full textKurpjuhn, Thorsten. "The SME security challenge." Computer Fraud & Security 2015, no. 3 (March 2015): 5–7. http://dx.doi.org/10.1016/s1361-3723(15)30017-8.
Full textBeysenov, B. K., and A. Igisenova. "Global challenge and spiritual security." Eurasian Journal of Religious studies 2, no. 2 (2015): 28–37. http://dx.doi.org/10.26577/ejrs-2015-2-17.
Full textMcCluskey, B. "Connected cars - the security challenge." Engineering & Technology 12, no. 2 (March 1, 2017): 54–57. http://dx.doi.org/10.1049/et.2017.0205.
Full textCarroll, John E. "The Acid Challenge to Security." Bulletin of the Atomic Scientists 45, no. 8 (October 1989): 32–34. http://dx.doi.org/10.1080/00963402.1989.11459736.
Full textLafuente, Guillermo. "The big data security challenge." Network Security 2015, no. 1 (January 2015): 12–14. http://dx.doi.org/10.1016/s1353-4858(15)70009-7.
Full textEMBER, LOIS. "Diseases Pose National Security Challenge." Chemical & Engineering News 78, no. 11 (March 13, 2000): 10. http://dx.doi.org/10.1021/cen-v078n011.p010.
Full textHoving, Per. "System security: The technical challenge." Computers & Security 5, no. 1 (March 1986): 74–79. http://dx.doi.org/10.1016/0167-4048(86)90121-5.
Full textFarrant, Alex. "5G and the Security Challenge." New Electronics 51, no. 20 (November 12, 2019): 27–28. http://dx.doi.org/10.12968/s0047-9624(22)61484-6.
Full textNelson, Margaret C., Scott E. Ingram, Andrew J. Dugmore, Richard Streeter, Matthew A. Peeples, Thomas H. McGovern, Michelle Hegmon, et al. "Climate challenges, vulnerabilities, and food security." Proceedings of the National Academy of Sciences 113, no. 2 (December 28, 2015): 298–303. http://dx.doi.org/10.1073/pnas.1506494113.
Full textDhakal, Bikash. "Assessing geopolitics as Nepal's national security challenge." Unity Journal 1 (February 1, 2020): 14–20. http://dx.doi.org/10.3126/unityj.v1i0.35690.
Full textPatankar, Manoj S., and Louis Holscher. "Accessibility vs Security: The Challenge to Airport Security Systems." Security Journal 13, no. 2 (April 2000): 7–19. http://dx.doi.org/10.1057/palgrave.sj.8340046.
Full textCîrdei, Ionuț Alin, and Lucian Ispas. "Challenges to European and Euro-Atlantic Security." International conference KNOWLEDGE-BASED ORGANIZATION 28, no. 1 (June 1, 2022): 7–14. http://dx.doi.org/10.2478/kbo-2022-0002.
Full textDynon, Nicholas. "Securing Public Places: New Zealand’s Private Security Sector as a National Security Enabler." National Security Journal 1, no. 1 (October 2019): 75–92. http://dx.doi.org/10.36878/nsj201901.75.
Full textMurtaza, Mirza B. "Risk Management For Health Information Security And Privacy." American Journal of Health Sciences (AJHS) 3, no. 2 (April 2, 2012): 125–34. http://dx.doi.org/10.19030/ajhs.v3i2.6943.
Full textRiaz, Naveed, Ayesha Riaz, and Sajid Ali Khan. "Biometric template security: an overview." Sensor Review 38, no. 1 (January 15, 2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.
Full textTaranenko, Anna. "THE EU MIGRATION CRISIS AS A CHALLENGE TO EUROPEAN REGIONAL SECURITY." Politology bulletin, no. 86 (2021): 210–24. http://dx.doi.org/10.17721/2415-881x.2021.86.210-224.
Full textKaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (October 2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.
Full textLemaîTre, Pierre. "The Gorbachev challenge and European security." International Affairs 65, no. 2 (1989): 357–58. http://dx.doi.org/10.2307/2622134.
Full textPervez, Laiba, Aiza Khan, and Noor ul Ain. "Cyber Security Challenge in an Automobile." International Journal of Scientific and Research Publications (IJSRP) 10, no. 12 (December 6, 2020): 162–66. http://dx.doi.org/10.29322/ijsrp.10.12.2020.p10815.
Full textLakušić, Milovan, and Sofija Lolić. "Terrorism as a contemporary security challenge." Megatrend revija 18, no. 4 (2021): 389–400. http://dx.doi.org/10.5937/megrev2104389l.
Full textEzemenaka, Kingsley Emeka. "KIDNAPPING: A SECURITY CHALLENGE IN NIGERIA." Journal of Security and Sustainability Issues 8, no. 2 (December 29, 2018): 111–24. http://dx.doi.org/10.9770/jssi.2018.8.2(10).
Full textGarde, Hans J. "European security and the Baltic challenge." RUSI Journal 140, no. 2 (April 1995): 19–21. http://dx.doi.org/10.1080/03071849508445902.
Full textManiatakos, Michail. "Guest Editor Introduction: Embedded Security Challenge." IEEE Embedded Systems Letters 10, no. 3 (September 2018): 81–82. http://dx.doi.org/10.1109/les.2018.2829765.
Full textSommaruga, Cornelio. "The global challenge of human security." Foresight 6, no. 4 (August 2004): 208–11. http://dx.doi.org/10.1108/14636680410554674.
Full textEide, Espen Barth. "The Internal Security Challenge in Kosovo." International Spectator 35, no. 1 (January 2000): 49–63. http://dx.doi.org/10.1080/03932720008458113.
Full textLabuschagne, L., and J. H. P. Eloff. "Electronic commerce: the information‐security challenge." Information Management & Computer Security 8, no. 3 (August 1, 2000): 154–57. http://dx.doi.org/10.1108/09685220010372582.
Full textHunter, Philip. "Security vendors tackle multi-gigabit challenge." Computer Fraud & Security 2007, no. 11 (November 2007): 14–15. http://dx.doi.org/10.1016/s1361-3723(07)70154-9.
Full textGoucher, Wendy. "The challenge of security awareness training." Computer Fraud & Security 2009, no. 10 (October 2009): 15–16. http://dx.doi.org/10.1016/s1361-3723(09)70129-0.
Full textAshenden, Debi. "Information Security management: A human challenge?" Information Security Technical Report 13, no. 4 (November 2008): 195–201. http://dx.doi.org/10.1016/j.istr.2008.10.006.
Full textGold, Steve. "Meeting the biometrics payment security challenge." Biometric Technology Today 2013, no. 10 (November 2013): 5–8. http://dx.doi.org/10.1016/s0969-4765(13)70175-9.
Full textDobbie, Stuart. "Challenge of biometric security for banks." Biometric Technology Today 2020, no. 3 (March 2020): 5–7. http://dx.doi.org/10.1016/s0969-4765(20)30037-0.
Full textSmith, Martin. "Facing the challenge of IT security." Computers & Security 14, no. 5 (January 1995): 423. http://dx.doi.org/10.1016/0167-4048(95)97134-v.
Full textALBIN, CECILIA. "The Global Security Challenge to Negotiation." American Behavioral Scientist 38, no. 6 (May 1995): 921–48. http://dx.doi.org/10.1177/0002764295038006009.
Full textAL-SUWAIDI, JAMAL S. "Gulf Security and the Iranian Challenge." Security Dialogue 27, no. 3 (September 1996): 277–94. http://dx.doi.org/10.1177/0967010696027003004.
Full textMiller, S. K. "Facing the challenge of wireless security." Computer 34, no. 7 (July 2001): 16–18. http://dx.doi.org/10.1109/2.933495.
Full textHouseholder, A., K. Houle, and C. Dougherty. "Computer attack trends challenge Internet security." Computer 35, no. 4 (April 2002): sulp5—sulp7. http://dx.doi.org/10.1109/mc.2002.1012422.
Full textWONG, John. "Food Security as a New Challenge in Asia." East Asian Policy 04, no. 02 (April 2012): 103–6. http://dx.doi.org/10.1142/s1793930512000207.
Full textAdebayo, Nehemiah, Amos O. Bajeh, Micheal Arowolo, Erondu Udochuckwu, Kayode Jesujana, Mary Ajayi, Surajudeen Abdulrasaq, and John Onyemenam. "Blockchain Technology: A Panacea for IoT Security Challenge." EAI Endorsed Transactions on Internet of Things 8, no. 3 (October 4, 2022): e3. http://dx.doi.org/10.4108/eetiot.v8i3.1402.
Full textPaul, Pangkaj Chandra, John Loane, Fergal McCaffery, and Gilbert Regan. "Towards Design and Development of a Data Security and Privacy Risk Management Framework for WBAN Based Healthcare Applications." Applied System Innovation 4, no. 4 (October 12, 2021): 76. http://dx.doi.org/10.3390/asi4040076.
Full textGILL, PETER. "The Intelligence and Security Committee and the challenge of security networks." Review of International Studies 35, no. 4 (October 2009): 929–41. http://dx.doi.org/10.1017/s0260210509990362.
Full textJha, Shikha. "Impact of National Security Challenge in Development Prospect of South Asia." Unity Journal 3, no. 01 (March 6, 2022): 305–16. http://dx.doi.org/10.3126/unityj.v3i01.43334.
Full textAbd Ali, Shams Mhmood, Mohd Najwadi Yusoff, and Hasan Falah Hasan. "Redactable Blockchain: Comprehensive Review, Mechanisms, Challenges, Open Issues and Future Research Directions." Future Internet 15, no. 1 (January 12, 2023): 35. http://dx.doi.org/10.3390/fi15010035.
Full textBeck, Kate. "Smart Security?" Transportation Research Record: Journal of the Transportation Research Board 2604, no. 1 (January 2017): 37–43. http://dx.doi.org/10.3141/2604-05.
Full textPEŠEC, MOJCA. "CHINA, SECURITY CHALLENGE FOR THE EUROPEAN UNION." KONCEPT KREPITVE ODPORNOSTI DRUŽBE/THE CONCEPT OF STRENGHTENING THE RESILIENCE OF SOCIETY, VOLUME 22/ISSUE 4 (October 23, 2020): 15–30. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.22.4.1.
Full textTrager, Robert F. "The Security Governance Challenge of Emerging Technologies." Orbis 66, no. 4 (2022): 536–50. http://dx.doi.org/10.1016/j.orbis.2022.08.008.
Full textMissiroli, Antonio. "European Security Policy: The Challenge of Coherence." European Foreign Affairs Review 6, Issue 2 (June 1, 2001): 177–96. http://dx.doi.org/10.54648/356609.
Full text