Academic literature on the topic 'Security current'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security current.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security current"
Hwang, Yong-Woon, Im-Yeong Lee, Hwankuk Kim, Hyejung Lee, and Donghyun Kim. "Current Status and Security Trend of OSINT." Wireless Communications and Mobile Computing 2022 (February 18, 2022): 1–14. http://dx.doi.org/10.1155/2022/1290129.
Full textTagarev, Todor. "Theory and Current Practice of Deterrence in International Security." Connections: The Quarterly Journal 18, no. 1-2 (2019): 5–10. http://dx.doi.org/10.11610/connections.18.1-2.00.
Full textPonomarenko, Tetiana, Olha Prokopenko, Halyna Kuzmenko, Tetiana Kaminska, and Marharyta Luchyk. "Banking security of Ukraine: current state and ways to improve." Banks and Bank Systems 13, no. 2 (June 22, 2018): 77–88. http://dx.doi.org/10.21511/bbs.13(2).2018.07.
Full textMiyachi, Toshio. "Current Trends on Network Security." IEEJ Transactions on Electronics, Information and Systems 124, no. 8 (2004): 1521–26. http://dx.doi.org/10.1541/ieejeiss.124.1521.
Full textPark, J. S., and D. Dicoi. "WLAN security: Current and future." IEEE Internet Computing 7, no. 5 (September 2003): 60–65. http://dx.doi.org/10.1109/mic.2003.1232519.
Full textSyhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.
Full textSyhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.
Full textPASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (August 11, 2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.
Full textGABOR, Gabriel, Doina MURESAN, Laura UNGUREANU, and Alexandru CRISTIAN. "PROMOTING SECURITY INTERESTS OF ROMANIA IN THE CURRENT GEOSTRATEGIC CONTEXT." Review of the Air Force Academy 13, no. 3 (December 16, 2015): 123–28. http://dx.doi.org/10.19062/1842-9238.2015.13.3.21.
Full textBrandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.
Full textDissertations / Theses on the topic "Security current"
Carlsson, Fredrik, and Klas-Göran Eriksson. "Comparison of security level and current consumption of security implementations for MQTT." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40760.
Full textKashfi, Hamid. "Evaluation of Current Practical Attacks Against RFID Technology." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37766.
Full textGao, Li Li. "Security in VoIP-Current Situation and Necessary Development." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7921.
Full textNowadays, VoIP is getting more and more popular. It helps company to reduce cost, extends service to remote area, produce more service opportunities, etc. Besides these advantages, VoIP also put forward security problems.
In this paper, we introduce the popular protocols in VoIP and their security mechanisms, by introducing threats to VoIP, we point out the vulnerabilities with the security mechanisms of each VoIP protocol, and give recommendation for each VoIP protocol. In the conclusion part, we evaluate the vulnerabilities of each protocol, and point out in the future, with better protocol architecture, enhanced security policies, VoIP will has a brighter future.
Ashenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.
Full textZahidi, Salman. "Biometrics - Evaluation of Current Situation." Thesis, Linköpings universitet, Informationskodning, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73230.
Full textBuzdugan, Maria. "Current and emerging air cargo security and facilitation issues." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99128.
Full textQiang, Hao. "E-book Security: An Analysis of Current Protection Systems." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1876.
Full textE-books have a wide range of application spheres from rich-media presentations to web site archiving, from writing to financial statement. They make publishing, storing and distributing of information quite simple. As a new publication technique, the main concern with e-books is the copyright infringement. To prevent e-books from free duplication and distribution, different security mechanisms are used in their publishing and distributing processes. By investigating and analyzing Digital Rights Management (DRM) and Electronic Book Exchange (EBX), this thesis presents some security issues that the e-book industry are or should be aware. Various security problems and possible solutions are highlighted by means of two case studies.
Horvat, Marko. "Formal analysis of modern security protocols in current standards." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:64d55401-82e1-4fb9-ad0b-73caf2236595.
Full textHove, Cathrine, and Marte Tårnes. "Information Security Incident Management : An Empirical Study of Current Practice." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22651.
Full textYousef, Paul. "GSM-Security: A Survey and Evaluation of the Current Situation." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2273.
Full textThe Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world. Approximately 800 million people around the world are using GSM for different purposes, but mostly for voice communication and SMS. For GSM, like many other widely used systems, security is crucial. The security involves mechanisms used to protect the different shareholders, like subscribers and service providers. The aspects of security that this report covers are mainly anonymity, authentication and confidentiality.
The important aspects of the system that need protection are described, along with the implementation of mechanisms used for the protection. It appears that many of the very valuable aspects of GSM can be attacked.
The anonymity of a GSM user is compromised resulting in the attacker being able to observe the time, rate, length, sources or destinations of e g calls. Even tracking a subscriber’s movements becomes possible. However, a passive attack is not sufficient to perform these attacks. The attacker needs to mount an active attack using equipment offering base station functionality.
Authentication is a crucial aspect of a wireless communication system due to the nature of the medium used, i e the radio link that is available to every one and not only the legitimate entities. Even the authentication mechanisms are attacked. It is possible to clone a subscription either by having physical access to the smart card or over the air interface. Cloning a subscription over the air requires base station functionality.
The most obvious threat against communication systems is eavesdropping on conversations. The privacy of GSM conversations is protected using some version of the A5 algorithm. There are several impressive cryptanalytical attacks against these algorithms, that break the encryption and make it possible to eavesdrop in real-time. Most of these algorithms require, however, extensive computation power and unrealistic quantities of known plaintext, which make it difficult to use them in practice. Difficulties using cryptanalytical attacks to break the confidentiality of GSM calls does not mean that conversations are well protected. Loopholes in the protocols used in GSM make it possible for an outsider, with access to sufficient equipment, to eavesdrop on conversations in real-time.
In the presence of these threats and vulnerabilities it is justified to wonder whether GSM provides sufficient security for users with very valuable information to communicate. These users may be military organisations, senior management personnel in large companies etc. GSM’s current security model does note provide sufficient protection for these entities. An additional layer of security should be added to the current security model.
Books on the topic "Security current"
Dutta, Nitul, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, and Emil Pricop. Cyber Security: Issues and Current Trends. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6597-4.
Full textCurrent French security policy: The Gaullist legacy. New York: Greenwood Press, 1991.
Find full textMcCormack, Richard T. Current challenges facing the OAS. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.
Find full textLiebman, Jeffrey B. Redistribution in the current U.S. Social Security system. Cambridge, MA: National Bureau of Economic Research, 2001.
Find full textInstitute for Defence Studies and Analyses, ed. Current issues in climate change. New Delhi: Institute for Defence Studies & Analyses, 2014.
Find full textDavis, Terry Lee. Commercial Aviation Cyber Security: Current State and Essential Reading. Warrendale, PA: SAE International, 2016. http://dx.doi.org/10.4271/pt-179.
Full textTurner, Sean H. Implementing email security and tokens: Current standards, tools, and practices. Indianapolis, IN: Wiley, 2008.
Find full textMcCormack, Richard T. Current challenges facing the OAS. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.
Find full textMcCormack, Richard T. Current challenges facing the OAS. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.
Find full textCurrent and emerging trends in cyber operations: Policy, strategy and practice. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2015.
Find full textBook chapters on the topic "Security current"
Lakshmi, Vasantha. "Current State of Security." In Beginning Security with Microsoft Technologies, 1–10. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4853-9_1.
Full textMacbean, Alasdair I. "Achieving Food Security." In Current Issues in Development Economics, 50–68. London: Macmillan Education UK, 1991. http://dx.doi.org/10.1007/978-1-349-21587-4_4.
Full textBaseley-Walker, Ben. "Current international space security initiatives." In The Fair and Responsible Use of Space, 109–21. Vienna: Springer Vienna, 2010. http://dx.doi.org/10.1007/978-3-211-99653-9_10.
Full textRao, Umesh Hodeghatta, and Umesha Nayak. "Current Trends in Information Security." In The InfoSec Handbook, 325–30. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6383-8_16.
Full textKuszewska, Agnieszka. "Current security and economic dynamics." In Law and Conflict Resolution in Kashmir, 185–98. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003196549-19.
Full textGillespie, Anna. "Current Nuclear Programmes in Third World Countries." In Plutonium and Security, 133–53. London: Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-11693-5_8.
Full textLambrinoudakis, Costas, Dimitris Gritzalis, Vassilis Tsoumas, Maria Karyda, and Spyros Ikonomopoulos. "Secure Electronic Voting: the Current Landscape." In Advances in Information Security, 101–22. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0239-5_7.
Full textFarahmandi, Farimah, Yuanwen Huang, and Prabhat Mishra. "Trojan Detection Using Dynamic Current Analysis." In System-on-Chip Security, 189–219. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30596-3_10.
Full textJacobs, Stuart. "Security of Current Mobile IP Solutions." In Advances in Database Technologies, 323–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-49121-7_28.
Full textKaranja, Daniel D. "Securing Africa’s Food Security: Current Constraints and Future Options." In New Security Threats and Crises in Africa, 111–27. New York: Palgrave Macmillan US, 2010. http://dx.doi.org/10.1057/9780230115538_6.
Full textConference papers on the topic "Security current"
Brookson, C. B. "Security in current systems." In IEE Colloquium on Security in Networks. IEE, 1995. http://dx.doi.org/10.1049/ic:19950131.
Full text"INFORMATION SECURITY PROBLEMS IN BANKING." In Current Issue of Law in the Banking Sphere. Samara State Economic University, 2019. http://dx.doi.org/10.46554/banking.forum-10.2019-21/26.
Full textRogers, Leslie A. "Current best estimates of planet populations." In SPIE Defense + Security, edited by Thomas George, Achyut K. Dutta, and M. Saif Islam. SPIE, 2016. http://dx.doi.org/10.1117/12.2223920.
Full textTamošiūnienė, Rima, and Corneliu Munteanu. "Current research approaches to economic security." In 1st International Conference on Business Management. Editorial Universitat Politècnica de València, 2015. http://dx.doi.org/10.4995/icbm.2015.1537.
Full textZhang, Jian, Huaijian Chen, Liangyi Gong, Jing Cao, and Zhaojun Gu. "The Current Research of IoT Security." In 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC). IEEE, 2019. http://dx.doi.org/10.1109/dsc.2019.00059.
Full textPattanayak, Animesh, and Matt Kirkland. "Current Cyber Security Challenges in ICS." In 2018 IEEE International Conference on Industrial Internet (ICII). IEEE, 2018. http://dx.doi.org/10.1109/icii.2018.00013.
Full textAbba, Abdullahi Lawal, Mohammed Awad, Zakaria Al-Qudah, and Abdul Halim Jallad. "Security analysis of current voting systems." In 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA). IEEE, 2017. http://dx.doi.org/10.1109/icecta.2017.8252006.
Full textEslahi, Meisam, Maryam Var Naseri, H. Hashim, N. M. Tahir, and Ezril Hisham Mat Saad. "BYOD: Current state and security challenges." In 2014 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE, 2014. http://dx.doi.org/10.1109/iscaie.2014.7010235.
Full text"SECURITY CONSIDERATIONS IN CURRENT VOIP PROTOCOLS." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2006. http://dx.doi.org/10.5220/0002098601830191.
Full text"ASSIGNMENT OF RIGHTS FROM NOTARIAL SECURITY AGREEMENTS." In Current Issue of Law in the Banking Sphere. Samara State Economic University, 2019. http://dx.doi.org/10.46554/banking.forum-10.2019-204/208.
Full textReports on the topic "Security current"
Wayne F. Boyer and Scott A. McBride. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues. Office of Scientific and Technical Information (OSTI), April 2009. http://dx.doi.org/10.2172/957512.
Full textLiebman, Jeffrey. Redistribution in the Current U.S. Social Security System. Cambridge, MA: National Bureau of Economic Research, December 2001. http://dx.doi.org/10.3386/w8625.
Full textRebo, Eero. Estonian National Security Strategy: Current and Future Challenges. Fort Belvoir, VA: Defense Technical Information Center, March 2013. http://dx.doi.org/10.21236/ada590661.
Full textRolston. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research. Office of Scientific and Technical Information (OSTI), March 2005. http://dx.doi.org/10.2172/911610.
Full textKaeo, M. Operational Security Current Practices in Internet Service Provider Environments. RFC Editor, January 2007. http://dx.doi.org/10.17487/rfc4778.
Full textRassokha, Ekaterina. LEGAL PROBLEMS OF INTERNATIONAL SECURITY IN THE CURRENT ENVIRONMEN. Intellectual Archive, August 2021. http://dx.doi.org/10.32370/iaj.2559.
Full textTodd, Frank P. Current National Space Security Trends and Implications for the Future. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada401672.
Full textFerwerda, Jeremy, Nazli Choucri, and Stuart Madnick. Institutional Foundations for Cyber Security: Current Responses and New Challenges. Fort Belvoir, VA: Defense Technical Information Center, September 2010. http://dx.doi.org/10.21236/ada530584.
Full textFrancois, Isabelle. Whither the Medvedev Initiative on European Security? (Transatlantic Current, no. 3). Fort Belvoir, VA: Defense Technical Information Center, December 2011. http://dx.doi.org/10.21236/ada577605.
Full textMollahan, K., and L. Nattrass. Global Security Rule Sets An Analysis of the Current Global Security Environment and Rule Sets Governing Nuclear Weapons Release. Office of Scientific and Technical Information (OSTI), September 2004. http://dx.doi.org/10.2172/15011427.
Full text