Academic literature on the topic 'Security current'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security current.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security current"

1

Hwang, Yong-Woon, Im-Yeong Lee, Hwankuk Kim, Hyejung Lee, and Donghyun Kim. "Current Status and Security Trend of OSINT." Wireless Communications and Mobile Computing 2022 (February 18, 2022): 1–14. http://dx.doi.org/10.1155/2022/1290129.

Full text
Abstract:
Recently, users have used open-source intelligence (OSINT) to gather and obtain information regarding the data of interest. The advantage of using data gathered by OSINT is that security threats arising in cyberspace can be addressed. However, if a user uses data collected by OSINT for malicious purposes, information regarding the target of an attack can be gathered, which may lead to various cybercrimes, such as hacking, malware, and a denial-of-service attack. Therefore, from a cybersecurity point of view, it is important to positively use the data gathered by OSINT in a positive manner. If exploited in a negative manner, it is important to prepare countermeasures that can minimize the damage caused by cybercrimes. In this paper, the current status and security trends of OSINT will be explained. Specifically, we present security threats and cybercrimes that may occur if data gathered by OSINT are exploited by malicious users. Furthermore, to solve this problem, we propose security requirements that can be applied to the OSINT environment. The proposed security requirements are necessary for securely gathering and storing data in the OSINT environment and for securely accessing and using the data collected by OSINT. The goal of the proposed security requirements is to minimize the damage when cybercrimes occur in the OSINT environment.
APA, Harvard, Vancouver, ISO, and other styles
2

Tagarev, Todor. "Theory and Current Practice of Deterrence in International Security." Connections: The Quarterly Journal 18, no. 1-2 (2019): 5–10. http://dx.doi.org/10.11610/connections.18.1-2.00.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ponomarenko, Tetiana, Olha Prokopenko, Halyna Kuzmenko, Tetiana Kaminska, and Marharyta Luchyk. "Banking security of Ukraine: current state and ways to improve." Banks and Bank Systems 13, no. 2 (June 22, 2018): 77–88. http://dx.doi.org/10.21511/bbs.13(2).2018.07.

Full text
Abstract:
Ukrainian banking institutions conduct their activity under the influence of various risks, which create critical situations for them. In this context, banks should pay more attention to their own security. The article analyzes the theoretical approaches to the concept of “banking security”, examines the level of banking security as a component of the financial and economic security of the state, and determines the ways to improve it. Banking security was analyzed based on the data of the National Bank of Ukraine and other banks that are part of the banking system of the country.The current state of the banking system shows a decrease in the security since 2014 to the “danger zone”. This is facilitated by a great number of problem loans and foreign capital in the authorized capital of banks; the predominance of short-term lending over long-term one; continued unprofitableness and low liquidity of bank assets. Banking security was the guarantor of achieving financial security of the state. Therefore, the article outlines directions for improving the operation of banking institutions and the banking system as a whole, which will allow to improve banking security in the short term. This is, first of all, the legislative consolidation of the creditor rights protection, the expansion of the lending process, including in foreign currency, with the predomi-nance of long-term loans, the banks’ work in the direction of increasing their assets profitability, optimizing administrative costs, developing and using the latest informa¬tion technology to ensure the effective operation and information security of banks.
APA, Harvard, Vancouver, ISO, and other styles
4

Miyachi, Toshio. "Current Trends on Network Security." IEEJ Transactions on Electronics, Information and Systems 124, no. 8 (2004): 1521–26. http://dx.doi.org/10.1541/ieejeiss.124.1521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Park, J. S., and D. Dicoi. "WLAN security: Current and future." IEEE Internet Computing 7, no. 5 (September 2003): 60–65. http://dx.doi.org/10.1109/mic.2003.1232519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Syhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.

Full text
Abstract:
Food security is directly related to nutrition and public health. It concerns the availability of food needed by people, its accessibility to consumers, including financial aspects of accessibility, the food utilization in sufficient quantity and quality to ensure full life, and stability, i.e. the ability to resist the negative changes that occur in food supply chains. Food security is a causal path that begins with production and leads to consumption, going through stages of stabilization and stress management. Therefore, the aim of this paper is to consider the essence of food security and investigate its level by the analysis of world rankings. Consequently, the Global Food Security Index, which measures the level of food security in four areas – food affordability, food availability, food quality and safety, and natural resources and resiliencies considered in this paper. According to this ranking, the first three places are occupied by the countries of Western Europe – Finland, Ireland, and the Netherlands. Except European countries, top 15 countries also include Israel, Japan, the United States of America, Canada, and New Zealand. Ukraine ranks 54th out of 113 countries. Positive changes occur only in the group «quality and safety». The rest of the groups of food security indicators for Ukraine show negative trends. In particular, in the group «food availability» indicators of «food security and access policy commitments» and «political and social barriers to access» decreased by more than thirty percent comparing with the previous year. Additionally, Global Hunger Index is considered. This index is based on four indicators – undernourishment, child wasting, child stunting, and child mortality. Despite the tendency of index improvement by the regions of the world, its value is particularly dangerous for the countries of Africa South of the Sahara, and South Asia. For Ukraine, the value of this indicator is less than 5, since 2006. This fact classifies Ukraine as a low-risk area. Accordingly, the analysis shows that currently the second goal of the Sustainable Development Plan – «Zero Hunger», is unattainable by 2030.
APA, Harvard, Vancouver, ISO, and other styles
7

Syhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.

Full text
Abstract:
Food security is directly related to nutrition and public health. It concerns the availability of food needed by people, its accessibility to consumers, including financial aspects of accessibility, the food utilization in sufficient quantity and quality to ensure full life, and stability, i.e. the ability to resist the negative changes that occur in food supply chains. Food security is a causal path that begins with production and leads to consumption, going through stages of stabilization and stress management. Therefore, the aim of this paper is to consider the essence of food security and investigate its level by the analysis of world rankings. Consequently, the Global Food Security Index, which measures the level of food security in four areas – food affordability, food availability, food quality and safety, and natural resources and resiliencies considered in this paper. According to this ranking, the first three places are occupied by the countries of Western Europe – Finland, Ireland, and the Netherlands. Except European countries, top 15 countries also include Israel, Japan, the United States of America, Canada, and New Zealand. Ukraine ranks 54th out of 113 countries. Positive changes occur only in the group «quality and safety». The rest of the groups of food security indicators for Ukraine show negative trends. In particular, in the group «food availability» indicators of «food security and access policy commitments» and «political and social barriers to access» decreased by more than thirty percent comparing with the previous year. Additionally, Global Hunger Index is considered. This index is based on four indicators – undernourishment, child wasting, child stunting, and child mortality. Despite the tendency of index improvement by the regions of the world, its value is particularly dangerous for the countries of Africa South of the Sahara, and South Asia. For Ukraine, the value of this indicator is less than 5, since 2006. This fact classifies Ukraine as a low-risk area. Accordingly, the analysis shows that currently the second goal of the Sustainable Development Plan – «Zero Hunger», is unattainable by 2030.
APA, Harvard, Vancouver, ISO, and other styles
8

PASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (August 11, 2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.

Full text
Abstract:
Abstract: Each historical era corresponded to a certain type of technological revolution that produced transformations both in terms of the theory of military science and in the field of strategies, techniques, tactics and procedures for preparing and conducting the phenomenon of war. Thus, the beginning of the 21st century has been marked by major transformations of the global security environment, an environment conducive to hybrid dangers and threats that can seriously affect contemporary human society. Moreover, migration, terrorism, organized crime, the nuclear threat and pandemics are and will remain the main sources of global insecurity and major threats to global security. The persistence and rapid evolution of these phenomena motivate us to investigate the field, to analyze the sources of instability that seriously threaten the security of the human evolutionary environment and to present to the informed public a study of current threats to global security.
APA, Harvard, Vancouver, ISO, and other styles
9

GABOR, Gabriel, Doina MURESAN, Laura UNGUREANU, and Alexandru CRISTIAN. "PROMOTING SECURITY INTERESTS OF ROMANIA IN THE CURRENT GEOSTRATEGIC CONTEXT." Review of the Air Force Academy 13, no. 3 (December 16, 2015): 123–28. http://dx.doi.org/10.19062/1842-9238.2015.13.3.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.

Full text
Abstract:
AbstractAdequate income is a social determinant of health. In the United States, only Social Security beneficiaries receive inflation-protected guaranteed income. Social Security needs another 1983 compromise in which stakeholders accepted “shared pain” to avoid insolvency. We propose indexing the benefit using the chained consumer price index (CPI) for all urban consumers and providing a one-time bonus of 8% to 10% for beneficiaries in their mid-80s, when needs become greater. The chained CPI has little impact when beneficiaries start receiving benefits, but older beneficiaries need protection. The estimated 75-year savings from this restructured benefit amount to 14.2% to 18% of Social Security deficits. Modest increases in payroll taxes and maximum earnings taxed should make up most of the shortfall. Including unearned income with wages and salaries subject to the 6.2% individual tax would produce much more revenue. The discussion explores the proposal’s political feasibility, grounding in current policy and political science literature, and the role of income as a social determinant of health.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Security current"

1

Carlsson, Fredrik, and Klas-Göran Eriksson. "Comparison of security level and current consumption of security implementations for MQTT." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40760.

Full text
Abstract:
IoT is a rapidly growing area with products in the consumer, commercial and industrial market. Collecting data with multiple small and often battery-powered devices sets new challenges for both security and communication. There has been a distinct lack of a IoT specific communication protocols. The industry has had to use bulky interfaces not suitable for resource-constrained devices. MQTT is a standardised communication protocol made for the IoT industry. MQTT does however not have built-in security and it is up to the developers to implement a suitable security countermeasure. To evaluate how different security countermeasures impact MQTT in complexity, current consumption and security the following research questions are answered. How do you derive a measurement from the SEF that can be compared with a current consumption measurement? Which level of security, according to the SEF, will RSA, AES and TLS provide to MQTT when publishing a message to a broker? What level of complexity is added to MQTT when using chosen security countermeasure? Which of the analysed security countermeasure upholds an adequate security level while also having a low current consumption? To answer the above research questions an experiment approach has been used. Implementations of TLS, RSA and AES have been evaluated to measure how they affect the security level and current consumption of an MQTT publication, compared to no security countermeasures at all.Both RSA and AES had the same security level, but the current consumption for RSA was four times higher. The experiment showed that the security level is significantly higher for TLS, while it also has the highest current consumption. The security countermeasure evaluated differs greatly. TLS provides complete protections, while RSA and AES lacks authentication and does not ensure integrity and non-repudiation.Even if the current consumption for TLS is higher, the security it provides make it unreasonable to recommend any of the other security countermeasure implementations.
APA, Harvard, Vancouver, ISO, and other styles
2

Kashfi, Hamid. "Evaluation of Current Practical Attacks Against RFID Technology." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37766.

Full text
Abstract:
Radio Frequency Identification (RFID) is a technology that has been around for three decades now. It is being used in various scenarios in technologically modern societies around the world and becoming a crucial part of our daily life. But we often forget how the inner technology is designed to work, or even if it is as trustable and secure as we think. While the RFID technology and protocols involved with it has been designed with an acceptable level of security in mind, not all implementations and use cases are as secure as consumers believe. A majority of implementations and products that are deployed suffer from known and critical security issues.      This thesis work starts with an introduction to RFID standards and how the technology works. Followed by that a taxonomy of known attacks and threats affecting RFID is presented, which avoids going through too much of technical details but provides references for farther research and study for every part and attack. Then RFID security threats are reviewed from risk management point of view, linking introduced attacks to the security principle they affect. We also review (lack thereof) security standards and guidelines that can help mitigating introduced threats. Finally to demonstrate how practical and serious these threats are, three real-world case studies are presented, in which we break security of widely used RFID implementations. At the end we also review and highlight domains in RFID security that can be researched farther, and what materials we are currently missing, that can be used to raise awareness and increase security of RFID technology for consumers.      The goal of this thesis report is to familiarize readers with all of the publicly documented and known security issues of RFID technology, so that they can get a sense about the security state of their systems. Without getting involved with too much technical details about every attack vector, or going throw tens of different books and papers, readers can use this report as a comprehensive reference to educate themselves about all known attacks against RFID, published to the date of writing this report.
APA, Harvard, Vancouver, ISO, and other styles
3

Gao, Li Li. "Security in VoIP-Current Situation and Necessary Development." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7921.

Full text
Abstract:

Nowadays, VoIP is getting more and more popular. It helps company to reduce cost, extends service to remote area, produce more service opportunities, etc. Besides these advantages, VoIP also put forward security problems.

In this paper, we introduce the popular protocols in VoIP and their security mechanisms, by introducing threats to VoIP, we point out the vulnerabilities with the security mechanisms of each VoIP protocol, and give recommendation for each VoIP protocol. In the conclusion part, we evaluate the vulnerabilities of each protocol, and point out in the future, with better protocol architecture, enhanced security policies, VoIP will has a brighter future.

APA, Harvard, Vancouver, ISO, and other styles
4

Ashenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.

Full text
Abstract:
Large-scale data losses experienced across both public and private sector organisations have led to expectations that organisations will develop a culture that supports information security aims and objectives. Despite the fact that many organisations now run awareness, education and training programmes for their employees, however, information security incidents due to employee misuse of information still keep occurring. This suggests that these programmes are not working. The research presented in this thesis examines ways to better understand employees’ attitudes towards information security with a view to improving current organisational practice. The research explores whether Chief Information Security Officers are delivering organisational change for information security, before moving on to better understand employee’s attitudes and how these are translated into behaviours. The research takes a mixed-methods approach that is not often used in information security research and combines both qualitative and quantitative analytical methods, grounded in the theory of social psychology. Case studies are carried out with Chief Information Security Officers as well as at the Office of Fair Trading and Prudential plc. The research delivers a survey tool that can be used in organisations to better understand how to frame information security messages so that they achieve their aims. An expert panel of users evaluated the survey. The research concluded that end users fall into two groups – the ‘I Can Handle It Group’ and the ‘It’s Out of My Control Group’ and these substantive findings have been validated by a field experiment. By mirroring the attributions of the dominant group the field experiment demonstrates that it is possible to influence employees’ behaviour.
APA, Harvard, Vancouver, ISO, and other styles
5

Zahidi, Salman. "Biometrics - Evaluation of Current Situation." Thesis, Linköpings universitet, Informationskodning, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73230.

Full text
Abstract:
Information security has always been a topic of concern in the world as an emphasis on new techniques to secure the identity of a legitimate user is regarded as top priority. To counter such an issue, we have a traditional way of authentication factors “what you have” and “what you know” in the form of smart cards or passwords respectively. But biometrics is based on the factor “who are you” by analyzing human physical or behavioral characteristics. Biometrics has always been an efficient way of authorization and is now considered as a $1500 million industry where fingerprints dominate the biometrics while iris is quickly emerging as the most desirable form of biometric technique.The main goal of this thesis is to compare and evaluate different biometrics techniques in terms of their purpose, recognition mechanism, market value and their application areas. Since there are no defined evaluating criteria, my method of evaluation was based on a literature survey from internet, books, IEEE papers and technical surveys. Chapter 3 is focused on different biometrics techniques where I discuss them briefly but in chapter 4, I go deeper into Iris, fingerprints, facial techniques which are prominent in biometrics world. Lastly, I had a general assessment of the biometrics, their future growth and suggested specific techniques for different environment like access controls, e-commerce, national ids, and surveillance.
APA, Harvard, Vancouver, ISO, and other styles
6

Buzdugan, Maria. "Current and emerging air cargo security and facilitation issues." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99128.

Full text
Abstract:
In the wake of September 11th and following an overemphasis on passenger air travel security, the air cargo system potentially has become the primary target for terrorists. States have undertaken various regulatory approaches that involve technology and operational measures aimed at addressing the perceived security threats in the air cargo industry. This thesis presents both an overview of the potential risks and best security practices identified within several international, regional and national initiatives, including the "authorized economic operator" and "secure supply chain" mechanisms. The main challenge in designing an adequate security system appears to be ensuring that security improvements are in accord with the time-sensitive realities of air cargo industry and do not unduly interfere with trade flow. It is argued that only an international approach based on best available cargo security practices could adequately and efficiently address the current and emerging air cargo security vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
7

Qiang, Hao. "E-book Security: An Analysis of Current Protection Systems." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1876.

Full text
Abstract:

E-books have a wide range of application spheres from rich-media presentations to web site archiving, from writing to financial statement. They make publishing, storing and distributing of information quite simple. As a new publication technique, the main concern with e-books is the copyright infringement. To prevent e-books from free duplication and distribution, different security mechanisms are used in their publishing and distributing processes. By investigating and analyzing Digital Rights Management (DRM) and Electronic Book Exchange (EBX), this thesis presents some security issues that the e-book industry are or should be aware. Various security problems and possible solutions are highlighted by means of two case studies.

APA, Harvard, Vancouver, ISO, and other styles
8

Horvat, Marko. "Formal analysis of modern security protocols in current standards." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:64d55401-82e1-4fb9-ad0b-73caf2236595.

Full text
Abstract:
While research has been done in the past on evaluating standardised security protocols, most notably TLS, there is still room for improvement. Modern security protocols need to be rigorously and thoroughly analysed, ideally before they are widely deployed, so as to minimise the impact of often creative, powerful adversaries. We explore the potential vulnerabilities of modern security protocols specified in current standards, including TLS 1.2, TLS 1.3, and SSH. We introduce and formalise the threat of Actor Key Compromise (AKC), and show how this threat can and cannot be avoided in the protocol design stage. We find AKC-related and other serious security flaws in protocols from the ISO/IEC 11770 standard, find realistic exploits, and harden the protocols to ensure strong security properties. Based on our work, the ISO/IEC 11770 working group is releasing an updated version of the standard that incorporates our suggested improvements. We analyse the unilaterally and mutually authenticated modes of the TLS 1.3 Handshake and Record protocols according to revision 06 of their specification draft. We verify session key secrecy and perfect forward secrecy in both modes with respect to a powerful symbolic attacker and an unbounded number of threads. Subsequently, we model and verify the standard authenticated key exchange requirements in revision 10. We analyse a proposal for its extension and uncover a flaw in it, which directly impacts the draft of revision 11.
APA, Harvard, Vancouver, ISO, and other styles
9

Hove, Cathrine, and Marte Tårnes. "Information Security Incident Management : An Empirical Study of Current Practice." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22651.

Full text
Abstract:
An increasing use of digital solutions suggests that organizations today are more exposed to attacks than before. Recent reports show that attacks get more advanced and that attackers choose their targets more wisely. Despite preventive measures being implemented, incidents occur occasionally. This calls for effective and efficient information security incident management. Several standards and guidelines addressing incident management exist. However, few studies of current practices have been conducted. In this thesis an empirical study was conducted where organizations' incident management practices were studied. The research was conducted as a case study of three large Norwegian organizations, where the data collection methods were interviews and document studies. Our findings show that the organizations were relatively compliant with standards and guidelines for incident management, but that there was still room for improvements. We found communication, information dissemination, employee involvement, experience and allocation of responsibilities to be important factors to an effective and efficient incident management process. Finally, we contribute with recommendations for performing successful information security incident management. We recommend organizations to use standards and guidelines as a basis for incident management, conduct regular rehearsals, utilize employees as part of the sensor network in incident detection and to conduct awareness campaigns for employees.
APA, Harvard, Vancouver, ISO, and other styles
10

Yousef, Paul. "GSM-Security: A Survey and Evaluation of the Current Situation." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2273.

Full text
Abstract:

The Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world. Approximately 800 million people around the world are using GSM for different purposes, but mostly for voice communication and SMS. For GSM, like many other widely used systems, security is crucial. The security involves mechanisms used to protect the different shareholders, like subscribers and service providers. The aspects of security that this report covers are mainly anonymity, authentication and confidentiality.

The important aspects of the system that need protection are described, along with the implementation of mechanisms used for the protection. It appears that many of the very valuable aspects of GSM can be attacked.

The anonymity of a GSM user is compromised resulting in the attacker being able to observe the time, rate, length, sources or destinations of e g calls. Even tracking a subscriber’s movements becomes possible. However, a passive attack is not sufficient to perform these attacks. The attacker needs to mount an active attack using equipment offering base station functionality.

Authentication is a crucial aspect of a wireless communication system due to the nature of the medium used, i e the radio link that is available to every one and not only the legitimate entities. Even the authentication mechanisms are attacked. It is possible to clone a subscription either by having physical access to the smart card or over the air interface. Cloning a subscription over the air requires base station functionality.

The most obvious threat against communication systems is eavesdropping on conversations. The privacy of GSM conversations is protected using some version of the A5 algorithm. There are several impressive cryptanalytical attacks against these algorithms, that break the encryption and make it possible to eavesdrop in real-time. Most of these algorithms require, however, extensive computation power and unrealistic quantities of known plaintext, which make it difficult to use them in practice. Difficulties using cryptanalytical attacks to break the confidentiality of GSM calls does not mean that conversations are well protected. Loopholes in the protocols used in GSM make it possible for an outsider, with access to sufficient equipment, to eavesdrop on conversations in real-time.

In the presence of these threats and vulnerabilities it is justified to wonder whether GSM provides sufficient security for users with very valuable information to communicate. These users may be military organisations, senior management personnel in large companies etc. GSM’s current security model does note provide sufficient protection for these entities. An additional layer of security should be added to the current security model.

APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Security current"

1

Dutta, Nitul, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, and Emil Pricop. Cyber Security: Issues and Current Trends. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6597-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Current French security policy: The Gaullist legacy. New York: Greenwood Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

McCormack, Richard T. Current challenges facing the OAS. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liebman, Jeffrey B. Redistribution in the current U.S. Social Security system. Cambridge, MA: National Bureau of Economic Research, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Institute for Defence Studies and Analyses, ed. Current issues in climate change. New Delhi: Institute for Defence Studies & Analyses, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Davis, Terry Lee. Commercial Aviation Cyber Security: Current State and Essential Reading. Warrendale, PA: SAE International, 2016. http://dx.doi.org/10.4271/pt-179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Turner, Sean H. Implementing email security and tokens: Current standards, tools, and practices. Indianapolis, IN: Wiley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

McCormack, Richard T. Current challenges facing the OAS. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

McCormack, Richard T. Current challenges facing the OAS. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Current and emerging trends in cyber operations: Policy, strategy and practice. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Security current"

1

Lakshmi, Vasantha. "Current State of Security." In Beginning Security with Microsoft Technologies, 1–10. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4853-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Macbean, Alasdair I. "Achieving Food Security." In Current Issues in Development Economics, 50–68. London: Macmillan Education UK, 1991. http://dx.doi.org/10.1007/978-1-349-21587-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Baseley-Walker, Ben. "Current international space security initiatives." In The Fair and Responsible Use of Space, 109–21. Vienna: Springer Vienna, 2010. http://dx.doi.org/10.1007/978-3-211-99653-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rao, Umesh Hodeghatta, and Umesha Nayak. "Current Trends in Information Security." In The InfoSec Handbook, 325–30. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6383-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kuszewska, Agnieszka. "Current security and economic dynamics." In Law and Conflict Resolution in Kashmir, 185–98. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003196549-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gillespie, Anna. "Current Nuclear Programmes in Third World Countries." In Plutonium and Security, 133–53. London: Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-11693-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lambrinoudakis, Costas, Dimitris Gritzalis, Vassilis Tsoumas, Maria Karyda, and Spyros Ikonomopoulos. "Secure Electronic Voting: the Current Landscape." In Advances in Information Security, 101–22. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0239-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Farahmandi, Farimah, Yuanwen Huang, and Prabhat Mishra. "Trojan Detection Using Dynamic Current Analysis." In System-on-Chip Security, 189–219. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30596-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jacobs, Stuart. "Security of Current Mobile IP Solutions." In Advances in Database Technologies, 323–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-49121-7_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Karanja, Daniel D. "Securing Africa’s Food Security: Current Constraints and Future Options." In New Security Threats and Crises in Africa, 111–27. New York: Palgrave Macmillan US, 2010. http://dx.doi.org/10.1057/9780230115538_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security current"

1

Brookson, C. B. "Security in current systems." In IEE Colloquium on Security in Networks. IEE, 1995. http://dx.doi.org/10.1049/ic:19950131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"INFORMATION SECURITY PROBLEMS IN BANKING." In Current Issue of Law in the Banking Sphere. Samara State Economic University, 2019. http://dx.doi.org/10.46554/banking.forum-10.2019-21/26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rogers, Leslie A. "Current best estimates of planet populations." In SPIE Defense + Security, edited by Thomas George, Achyut K. Dutta, and M. Saif Islam. SPIE, 2016. http://dx.doi.org/10.1117/12.2223920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tamošiūnienė, Rima, and Corneliu Munteanu. "Current research approaches to economic security." In 1st International Conference on Business Management. Editorial Universitat Politècnica de València, 2015. http://dx.doi.org/10.4995/icbm.2015.1537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Jian, Huaijian Chen, Liangyi Gong, Jing Cao, and Zhaojun Gu. "The Current Research of IoT Security." In 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC). IEEE, 2019. http://dx.doi.org/10.1109/dsc.2019.00059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pattanayak, Animesh, and Matt Kirkland. "Current Cyber Security Challenges in ICS." In 2018 IEEE International Conference on Industrial Internet (ICII). IEEE, 2018. http://dx.doi.org/10.1109/icii.2018.00013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Abba, Abdullahi Lawal, Mohammed Awad, Zakaria Al-Qudah, and Abdul Halim Jallad. "Security analysis of current voting systems." In 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA). IEEE, 2017. http://dx.doi.org/10.1109/icecta.2017.8252006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Eslahi, Meisam, Maryam Var Naseri, H. Hashim, N. M. Tahir, and Ezril Hisham Mat Saad. "BYOD: Current state and security challenges." In 2014 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE, 2014. http://dx.doi.org/10.1109/iscaie.2014.7010235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"SECURITY CONSIDERATIONS IN CURRENT VOIP PROTOCOLS." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2006. http://dx.doi.org/10.5220/0002098601830191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"ASSIGNMENT OF RIGHTS FROM NOTARIAL SECURITY AGREEMENTS." In Current Issue of Law in the Banking Sphere. Samara State Economic University, 2019. http://dx.doi.org/10.46554/banking.forum-10.2019-204/208.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security current"

1

Wayne F. Boyer and Scott A. McBride. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues. Office of Scientific and Technical Information (OSTI), April 2009. http://dx.doi.org/10.2172/957512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liebman, Jeffrey. Redistribution in the Current U.S. Social Security System. Cambridge, MA: National Bureau of Economic Research, December 2001. http://dx.doi.org/10.3386/w8625.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rebo, Eero. Estonian National Security Strategy: Current and Future Challenges. Fort Belvoir, VA: Defense Technical Information Center, March 2013. http://dx.doi.org/10.21236/ada590661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rolston. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research. Office of Scientific and Technical Information (OSTI), March 2005. http://dx.doi.org/10.2172/911610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kaeo, M. Operational Security Current Practices in Internet Service Provider Environments. RFC Editor, January 2007. http://dx.doi.org/10.17487/rfc4778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rassokha, Ekaterina. LEGAL PROBLEMS OF INTERNATIONAL SECURITY IN THE CURRENT ENVIRONMEN. Intellectual Archive, August 2021. http://dx.doi.org/10.32370/iaj.2559.

Full text
Abstract:
The article reflects the main views on international security problems in the legal aspect and identified actual problems and contradictions in the application and compliance with international humanitarian law norms.
APA, Harvard, Vancouver, ISO, and other styles
7

Todd, Frank P. Current National Space Security Trends and Implications for the Future. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada401672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ferwerda, Jeremy, Nazli Choucri, and Stuart Madnick. Institutional Foundations for Cyber Security: Current Responses and New Challenges. Fort Belvoir, VA: Defense Technical Information Center, September 2010. http://dx.doi.org/10.21236/ada530584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Francois, Isabelle. Whither the Medvedev Initiative on European Security? (Transatlantic Current, no. 3). Fort Belvoir, VA: Defense Technical Information Center, December 2011. http://dx.doi.org/10.21236/ada577605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mollahan, K., and L. Nattrass. Global Security Rule Sets An Analysis of the Current Global Security Environment and Rule Sets Governing Nuclear Weapons Release. Office of Scientific and Technical Information (OSTI), September 2004. http://dx.doi.org/10.2172/15011427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography