To see the other types of publications on this topic, follow the link: Security current.

Dissertations / Theses on the topic 'Security current'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security current.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Carlsson, Fredrik, and Klas-Göran Eriksson. "Comparison of security level and current consumption of security implementations for MQTT." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40760.

Full text
Abstract:
IoT is a rapidly growing area with products in the consumer, commercial and industrial market. Collecting data with multiple small and often battery-powered devices sets new challenges for both security and communication. There has been a distinct lack of a IoT specific communication protocols. The industry has had to use bulky interfaces not suitable for resource-constrained devices. MQTT is a standardised communication protocol made for the IoT industry. MQTT does however not have built-in security and it is up to the developers to implement a suitable security countermeasure. To evaluate ho
APA, Harvard, Vancouver, ISO, and other styles
2

Kashfi, Hamid. "Evaluation of Current Practical Attacks Against RFID Technology." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37766.

Full text
Abstract:
Radio Frequency Identification (RFID) is a technology that has been around for three decades now. It is being used in various scenarios in technologically modern societies around the world and becoming a crucial part of our daily life. But we often forget how the inner technology is designed to work, or even if it is as trustable and secure as we think. While the RFID technology and protocols involved with it has been designed with an acceptable level of security in mind, not all implementations and use cases are as secure as consumers believe. A majority of implementations and products that a
APA, Harvard, Vancouver, ISO, and other styles
3

Gao, Li Li. "Security in VoIP-Current Situation and Necessary Development." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7921.

Full text
Abstract:
<p>Nowadays, VoIP is getting more and more popular. It helps company to reduce cost, extends service to remote area, produce more service opportunities, etc. Besides these advantages, VoIP also put forward security problems.</p><p>In this paper, we introduce the popular protocols in VoIP and their security mechanisms, by introducing threats to VoIP, we point out the vulnerabilities with the security mechanisms of each VoIP protocol, and give recommendation for each VoIP protocol. In the conclusion part, we evaluate the vulnerabilities of each protocol, and point out in the future, with better
APA, Harvard, Vancouver, ISO, and other styles
4

Ashenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.

Full text
Abstract:
Large-scale data losses experienced across both public and private sector organisations have led to expectations that organisations will develop a culture that supports information security aims and objectives. Despite the fact that many organisations now run awareness, education and training programmes for their employees, however, information security incidents due to employee misuse of information still keep occurring. This suggests that these programmes are not working. The research presented in this thesis examines ways to better understand employees’ attitudes towards information securit
APA, Harvard, Vancouver, ISO, and other styles
5

Baldo, Martina <1996&gt. "Climate change: a current challenge for global security." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19655.

Full text
Abstract:
A causa dell’allarmante aumento in quantità e velocità delle emissioni di CO2 soprattutto nel corso dell’ultimo secolo, il cambiamento climatico è stato ampiamente riconosciuto come una questione di rilevanza nazionale ed internazionale concernente quasi esclusivamente la sfera ambientale. Da più di un decennio risulta, tuttavia, evidente quanto variazioni repentine di temperatura rappresentino anche una notevole minaccia in chiave di sicurezza globale, richiedendo maggiore protezione tanto del singolo individuo quanto di un intero Stato. Difatti, attraverso l’attuazione di concrete politiche
APA, Harvard, Vancouver, ISO, and other styles
6

Zahidi, Salman. "Biometrics - Evaluation of Current Situation." Thesis, Linköpings universitet, Informationskodning, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73230.

Full text
Abstract:
Information security has always been a topic of concern in the world as an emphasis on new techniques to secure the identity of a legitimate user is regarded as top priority. To counter such an issue, we have a traditional way of authentication factors “what you have” and “what you know” in the form of smart cards or passwords respectively. But biometrics is based on the factor “who are you” by analyzing human physical or behavioral characteristics. Biometrics has always been an efficient way of authorization and is now considered as a $1500 million industry where fingerprints dominate the bio
APA, Harvard, Vancouver, ISO, and other styles
7

Qiang, Hao. "E-book Security: An Analysis of Current Protection Systems." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1876.

Full text
Abstract:
<p>E-books have a wide range of application spheres from rich-media presentations to web site archiving, from writing to financial statement. They make publishing, storing and distributing of information quite simple. As a new publication technique, the main concern with e-books is the copyright infringement. To prevent e-books from free duplication and distribution, different security mechanisms are used in their publishing and distributing processes. By investigating and analyzing Digital Rights Management (DRM) and Electronic Book Exchange (EBX), this thesis presents some security issues th
APA, Harvard, Vancouver, ISO, and other styles
8

Buzdugan, Maria. "Current and emerging air cargo security and facilitation issues." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99128.

Full text
Abstract:
In the wake of September 11th and following an overemphasis on passenger air travel security, the air cargo system potentially has become the primary target for terrorists. States have undertaken various regulatory approaches that involve technology and operational measures aimed at addressing the perceived security threats in the air cargo industry. This thesis presents both an overview of the potential risks and best security practices identified within several international, regional and national initiatives, including the "authorized economic operator" and "secure supply chain" mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
9

Horvat, Marko. "Formal analysis of modern security protocols in current standards." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:64d55401-82e1-4fb9-ad0b-73caf2236595.

Full text
Abstract:
While research has been done in the past on evaluating standardised security protocols, most notably TLS, there is still room for improvement. Modern security protocols need to be rigorously and thoroughly analysed, ideally before they are widely deployed, so as to minimise the impact of often creative, powerful adversaries. We explore the potential vulnerabilities of modern security protocols specified in current standards, including TLS 1.2, TLS 1.3, and SSH. We introduce and formalise the threat of Actor Key Compromise (AKC), and show how this threat can and cannot be avoided in the protoco
APA, Harvard, Vancouver, ISO, and other styles
10

Yousef, Paul. "GSM-Security: A Survey and Evaluation of the Current Situation." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2273.

Full text
Abstract:
<p>The Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world. Approximately 800 million people around the world are using GSM for different purposes, but mostly for voice communication and SMS. For GSM, like many other widely used systems, security is crucial. The security involves mechanisms used to protect the different shareholders, like subscribers and service providers. The aspects of security that this report covers are mainly anonymity, authentication and confidentiality. </p><p>The important aspects of the system that need protection are
APA, Harvard, Vancouver, ISO, and other styles
11

Hove, Cathrine, and Marte Tårnes. "Information Security Incident Management : An Empirical Study of Current Practice." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22651.

Full text
Abstract:
An increasing use of digital solutions suggests that organizations today are more exposed to attacks than before. Recent reports show that attacks get more advanced and that attackers choose their targets more wisely. Despite preventive measures being implemented, incidents occur occasionally. This calls for effective and efficient information security incident management. Several standards and guidelines addressing incident management exist. However, few studies of current practices have been conducted. In this thesis an empirical study was conducted where organizations&apos; incident managem
APA, Harvard, Vancouver, ISO, and other styles
12

Lensing, Daniel Paul. "Social Security: an evaluation of current problems and proposed solutions." Kansas State University, 2014. http://hdl.handle.net/2097/18219.

Full text
Abstract:
Master of Arts<br>Department of Economics<br>William F. Blankenau<br>This paper examines several different issues which could make the various Social Security programs insolvent. I evaluate each cause and how it is related to the problems experienced by each program to determine potential policy changes. I draw the majority of my data and information from peer-reviewed scholarly articles, as well as government agencies such as the Social Security Administration, Bureau of Labor Statistics, and the Congressional Research Service. Section 1 of the paper explains the history of the Social Secu
APA, Harvard, Vancouver, ISO, and other styles
13

Schmidlin, Marco. "Swiss Armed Forces XXI - the answer to current or future threats." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FSchmidlin.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Defense Decision Making and Planning))--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): Donald Abenheim. Includes bibliographical references (p. 107-115). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
14

Komissar, A. "Providing protection of institutions of banks under current conditions." Thesis, Сумський державний університет, 2013. http://essuir.sumdu.edu.ua/handle/123456789/33555.

Full text
Abstract:
The research is caused by the spread of malicious attacks on material objects and money banks, as well as the need to find forms and methods of protecting banks and forming them into a safe mode of their activity. Bank security is a state of stable life at which the implementation of basic interests and priorities of the bank, to protect it from internal and external destabilizing factors, regardless of operating conditions. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/33555
APA, Harvard, Vancouver, ISO, and other styles
15

Iheagwara, Charles M. "The strategic implications of the current Internet design for cyber security." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/67554.

Full text
Abstract:
Thesis (S.M. in Engineering and Management)--Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, 2011.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 87-89).<br>In the last two decades, the Internet system has evolved from a collection point of a few networks to a worldwide interconnection of millions of networks and users who connect to transact virtually all kinds of business. The evolved network system is also known as Cyberspace. The use of Cyberspace is now greatly expanded to all fields of human e
APA, Harvard, Vancouver, ISO, and other styles
16

Busato, Marco <1995&gt. "The State of Strict Transport Security: Current Deployment and Correct Configuration." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19274.

Full text
Abstract:
Nowadays, the topic of security has become a popular issue due to the contemporary digital society in constant development. Thus, HTTPS only is not enough in order to ensure a high security level (e.g. feeling protected while surfing the net). Therefore, a new mechanism has increased its employment: the Strict Transport Security, which enhances the security between a user agent and a server. In this thesis, it will be defined the best application of this system by observing the common settings over the internet and the reason why it is preferable declaring some directives and carry out its cur
APA, Harvard, Vancouver, ISO, and other styles
17

Gregson-Green, Lucy E. "Resilience, security, and the railway station : a unique case study of the current and future resilience to security threats." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/33411.

Full text
Abstract:
Major railway stations in England and Wales are highly networked and open locations, frequently crowded, and are vulnerable to criminal and terrorist activities. Successive Government policies and agendas have sought to lessen this susceptibility, by promoting the understanding of and the application of resilience and security measures. Thus, the complex stakeholders are responsibilised (Garland, 1996) and urged to integrate and merge resilience, crime prevention and counter-terrorism measures into their governance, and operational policies and agendas. The aim of this research is to determine
APA, Harvard, Vancouver, ISO, and other styles
18

Nilsson, Sebastian. "The Current State of DDoS Defense." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3933.

Full text
Abstract:
A DDoS attack is an attempt to bring down a machine connected to the Internet. This is done by having multiple computers repeatedly sending requests to tie up a server making it unable to answer legitimate requests. DDoS attacks are currently one of the biggest security threats on the internet according to security experts. We used a qualitative interview with experts in IT security to gather data to our research. We found that most companies are lacking both in knowledge and in their protection against DDoS attacks. The best way to minimize this threat would be to build a system with redundan
APA, Harvard, Vancouver, ISO, and other styles
19

Whalen, Timothy J. "Human factors in Coast Guard Computer Security - an analysis of current awareness and potential techniques to improve security program viability." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA397600.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, June 2001.<br>Thesis advisor(s): Irvine, Cynthia E. ; Brinkley, Douglas E. "June 2001". Includes bibliographical references (p. 103-104). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
20

Довга, Любов Вікторівна, Любовь Викторовна Довга, and Liubov Viktorivna Dovha. "Current trends and management features of the regions ecologicaly safe development." Thesis, Sumy State University, 2016. http://essuir.sumdu.edu.ua/handle/123456789/45312.

Full text
Abstract:
The current state of the environment, without exception, all regions of Ukraine is characterized by accelerated industrial growth, deterioration of the natural environment, rapid consumption of resources reproducible excess capacity of natural systems of the Earth, lack of financial resources and a relatively small set of methods of financing ecologically events. That is why the analysis of international experience of economics incentives construction is necessary for ecologically activities.
APA, Harvard, Vancouver, ISO, and other styles
21

Graham, Janice M. "Current development and prospects for the future : French security policy in a changing world." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/28087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Azhar, Mahmood Javed. "Duty-Cycle Based Physical Unclonable Functions (PUFs) for Hardware Security Applications." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7470.

Full text
Abstract:
Duty cycle and frequency are important characteristics of periodic signals that are exploited to develop a variety of application circuits in IC design. Controlling the duty cycle and frequency provides a method to develop adaptable circuits for a variety of applications. These applications range from stable on-chip clock generation circuits, on-chip voltage regulation circuits, and Physical unclonable functions for hardware security applications. Ring oscillator circuits that are developed with CMOS inverter circuits provide a simple, versatile fle
APA, Harvard, Vancouver, ISO, and other styles
23

Lundberg, Karl Johan. "Investigating the current state of securityfor small sized web applications." Thesis, Linköpings universitet, Databas och informationsteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-89160.

Full text
Abstract:
It is not uncommon to read about hacker attacks in the newspaper today. The hackers are targeting governments and enterprises, and motives vary. It may be political or economic reasons, or just to gain reputation. News about smaller systems is, unsurprisingly, not as common. Does this mean that security is less relevant of smaller systems? This report investigates the threat model of smaller web applications, to answer that very question.Different attacks are described in the detail needed for explaining their threat but the intention is not to teach the reader to write secure code. The report
APA, Harvard, Vancouver, ISO, and other styles
24

Wählisch, Matthias [Verfasser]. "Measuring and Implementing Internet Backbone Security : Current Challenges, Upcoming Deployment, and Future Trends / Matthias Wählisch." Berlin : Freie Universität Berlin, 2016. http://d-nb.info/1084634392/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Rosenberg, Magdalena. "Survival Time : A Survey on the Current Survival Time for an Unprotected Public System." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23199.

Full text
Abstract:
Survival Time, what exactly does the term imply and what is the best method to measure it? Several experts within the field of Internet security have used the term; some has gone further and presented statistical facts on the survival time throughout the years. This bachelor thesis aim to present a universal definition of the term and further on measure the current survival time for a given unprotected system. By the deployment of a decoy, data will be captured and collected through port monitoring. Mainly focus will lie on building a time curve presenting the estimated time for an unprotected
APA, Harvard, Vancouver, ISO, and other styles
26

Neibaur, Elena E. "Sustainability Analysis of Domestic Rainwater Harvesting Systems for Current and Future Water Security in Rural Mexico." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2245.

Full text
Abstract:
Rainwater harvesting, the act of capturing and storing rain, is an ancient practice that is increasingly utilized today by communities to address water supply needs. This thesis examines whether domestic rainwater harvesting systems (DRWHS) can be a sustainable solution as defined by social, water quality, and technical feasibility for water security in semi-arid, rural environments. For this study, 50 surveys and 17 stored rainwater analyses were conducted in San Jose Xacxamayo, Mexico, in conjunction with my Peace Corps work of implementing 82 DRWHS. Results showed that all DRWHS were social
APA, Harvard, Vancouver, ISO, and other styles
27

Kozicka, Marta [Verfasser]. "Policies for Food Security in India: An Assessment of Current Policies and Reform Options / Marta Kozicka." Bonn : Universitäts- und Landesbibliothek Bonn, 2016. http://d-nb.info/1118720881/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

McClellan, Kevin K. "Are the U.S. Navy's current procedures for responding to homeland defense and security tasking adequately designed?" Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FMcClellan.pdf.

Full text
Abstract:
Thesis (M. A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2009.<br>Thesis Advisor(s): McMaster, Michael T. ; Dahl, Erik. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Homeland defense, Homeland Security, maritime homeland defense, Maritime Homeland Security, joint, Navy, command and control, Northern Command, NORTHCOM, defense support of civil authorities. Includes bibliographical references (p. 69-74). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
29

Schreck, Thomas [Verfasser], and Felix [Gutachter] Freiling. "IT Security Incident Response: Current State, Emerging Problems, and New Approaches / Thomas Schreck ; Gutachter: Felix Freiling." Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2018. http://d-nb.info/1150966696/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Rubio, Castro Ana María. "Current challenges in legal and political thought." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/118447.

Full text
Abstract:
The article analyses the theoretical debates on equality and justice that represent the structural and institutional dimension of politics within the framework of a rigid constitutionality of fundamental rights as well as the changes in process to which law and politics are subject in Spain as a consequence of the globalization of economic production and of culture. The actions carried out by the Spanish government in recent years justify us in speaking about the return of the old socio-economic hierarchies and of the clear obstacles to the development of alternative legal-political thinking.
APA, Harvard, Vancouver, ISO, and other styles
31

Kalyani, Radha Padma. "A nonlinear optimization approach for UPFC power flow control and voltage security." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.mst.edu/thesis/pdf/Kalyani_completeThesis_09007dcc80438f59.pdf.

Full text
Abstract:
Thesis (Ph. D.)--University of Missouri--Rolla, 2007.<br>Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed November 29, 2007) Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
32

Skora, Patrick W. "Analysis of security sector reform in post-conflict Sierra Leone a comparison of current versus historical capabilities /." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FSkora.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Middle East, South Asia, Sub-Saharan Africa))--Naval Postgraduate School, March 2010.<br>Thesis Advisor(s): Lawson, Letitia. Second Reader: Mensch, Eugene M. "March 2010." Description based on title screen as viewed on April 23, 2010. Author(s) subject terms: Sierra Leone, Post-Conflict, Security Sector Reform, SSR, RSLAF, SLP, Police, Sierra Leone military. Includes bibliographical references (p. 49-60). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
33

Cruz, Victor F. "Utilizing current commercial-off-the-shelf facial-recognition and public live video streaming to enhance national security." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43898.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>The nation’s security depends in part on proactive approaches and methods to evolving technologies for identifying persons of interest, enemies of state (foreign and domestic), potential acts of terrorism, and foreign intelligence. Currently, state and federal entities operate passive surveillance technologies with biometrics to identify and curtail national security threats, so as to act within the confines of the Act for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism. Howe
APA, Harvard, Vancouver, ISO, and other styles
34

Uino, Siiri. "What is the situation in Finland’s and Sweden’s security policy and what are their choices with it? : Analyses of the security policy from the past years in Finland and Sweden and about their current challenges." Thesis, Linnéuniversitetet, Institutionen för statsvetenskap (ST), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-56280.

Full text
Abstract:
The current situation in the world has forced many states to have a look at their security policy in a more demanding way. The instability around the world has become harder to prevent and for the states to protect their citizens, which requires efficient work from the states. Therefore, this paper is going to have a look at the security policy that Finland and Sweden are performing currently, to give us understanding of their current situation. To do that, it is necessary to have a look at their backgrounds as well. The aim of this paper is to understand security policies of these countries,
APA, Harvard, Vancouver, ISO, and other styles
35

Gamarra, Vílchez Leopoldo. "Balance of the Labor Policy of the Current Government." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/118483.

Full text
Abstract:
This paper analyzes the employment policy of the current Peruvian government. We begin with some considerations on the economic and social context of the period 2011-2015 and specifically on the concept of precariousness in employment. Then we analyze the most important changes in labor and social security matters; finally, we will discuss some proposals for concrete measures regarding the search for solution of the problems addressed.<br>El presente trabajo se propone analizar la política laboral del actual Gobierno peruano. Empezaremos con algunas consideraciones sobre el contexto económico
APA, Harvard, Vancouver, ISO, and other styles
36

Sumner, Kristine. "AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING BIOMETRIC TECHNOLOGY FO." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2475.

Full text
Abstract:
The terrorist attacks of September 11, 2001 propelled the issue of aviation security to the forefront of the U.S. domestic agenda. Although hundreds of individual airports exist in the U.S., the travel activities at each of these airports combine to holistically comprise an aviation system that represents a significant portion of the U.S. social and economic infrastructure. Disruption at one airport resulting from a criminal act, such as terrorism, could exert detrimental effects upon the aviation system and U.S national security (9/11 Commission, 2004). Each U.S. airport is individually respo
APA, Harvard, Vancouver, ISO, and other styles
37

Berg, Anthon, and Felicia Svantesson. "Is your electric vehicle plotting against you? : An investigation of the ISO 15118 standard and current security implementations." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44918.

Full text
Abstract:
Electric vehicles are revolutionizing the way we travel. Climate change and policies worldwide are pushing the vehicle market towards a more sustainable future through electric vehicles. However, can these solutions be considered safe and secure? Because of the entirely new attack vector that is charging, many new security concerns are present in this new type of vehicle that did not exist in combustion engine vehicles. Here, a literature study of the current situation surrounding electric vehicle charging and the ISO 15118 standard is presented. In addition to this, a risk analysis of current
APA, Harvard, Vancouver, ISO, and other styles
38

Dike, Samuel Chisa. "Legislating security of supply of petroleum resources in Nigeria : current practice, new direction and lessons from Brazil, Norway and the UK." Thesis, University of Aberdeen, 2014. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=211108.

Full text
Abstract:
Security of supply of petroleum is a serious challenge in Nigeria that seems to lack any known legal remedy. It is a paradox that Nigeria is experiencing inadequate supply of petroleum resources for domestic consumption despite the abundance of oil and gas reserves in the country. Past efforts in the search for solutions through which to address this challenge have largely been political, quick fixes and episodic in nature. This research aims to address this challenge by looking for a possible solution towards the direction of the law-Petroleum Act 1969, which fundamentally regulates the indus
APA, Harvard, Vancouver, ISO, and other styles
39

Papadaki, Evangelia. "What amendments need to be made to the current EU legal framework to better address the security obligations of data controllers?" Thesis, University of Southampton, 2018. https://eprints.soton.ac.uk/421046/.

Full text
Abstract:
The overall objective of this thesis is to identify the gaps in the current EU legal framework surrounding the security obligations of data controllers and make recommendations to help advance the discussions around the possible ways of effectively addressing the problem of cyber insecurity. The thesis adopts an interdisciplinary approach to data security, which involves legal analysis enriched with considerations from the fields of Computer Science and Managerial Economics. In response to the rapidly changing landscape of emerging technologies, which challenges the conventional thinking of re
APA, Harvard, Vancouver, ISO, and other styles
40

Meyer, Ross H. "SOF regional engagement : an analysis of the effectiveness of current attempts to shape future battlefields /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMeyer.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

SHARIF, AMIR. "Analysis of Best Current Practices to Assist Native App Developers with Secure OAuth/OIDC Implementations." Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1050122.

Full text
Abstract:
OAuth 2.0 and OpenID Connect are two of the most widely used protocols to support secure and frictionless access delegation and single sign-on login solutions, which have been extensively integrated within web and mobile native applications. While securing the OAuth and OpenID Connect implementations within the web applications is widely investigated, this is not true for mobile native applications due to their peculiarities compared to web applications. Given that, we investigate the availability of necessary information to mobile native application developers. Our investigation reveals that
APA, Harvard, Vancouver, ISO, and other styles
42

Bjoerkan, Maren. "International displacement and state compliance with international human rights standards: the current protection of internally displaced persons' right to physical security in Nigeria." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/28030.

Full text
Abstract:
There are approximately 65.3 million forcibly displaced people in the world. A large majority of these people are internally displaced. Of the 40.8 million internally displaced persons' (IDPs) worldwide, Nigeria had a total of 1,955,000 IDPs at the end of 2016. Consequently, Nigeria is among the countries with the highest number of displaced persons globally. A wide range of political, economic, social, and environmental factors, including poverty, corruption, and internal armed conflict, affect the population in Nigeria and contribute to internal instability. Thus, as Nigeria represents a com
APA, Harvard, Vancouver, ISO, and other styles
43

Dóša, Vladimír. "Výstavba datových center." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2011. http://www.nusl.cz/ntk/nusl-223046.

Full text
Abstract:
This thesis presents and describes new global trends among build and operation of datacenters. Further it contains practical application of particular examples, and the theory is supplemented by new findings from given field.
APA, Harvard, Vancouver, ISO, and other styles
44

Šumberák, David. "Přístrojový transformátor proudu 12kV, 4000//5/5A." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220954.

Full text
Abstract:
This master´s thesis describes the development proposal and production of instrument current transformer in one turn primary winding with 4000//5/5 A transfer. The thesis involves a theoretical analysis, a numerical calculation, a developmental 3D model, corresponding simulations and a standard testing of the transformers. There is a complete written description of measuring current transformer cycle from the development to the production. The transformer development and production works were collaborated with the company KPB Intra s.r.o. The company engages in development, production and sale
APA, Harvard, Vancouver, ISO, and other styles
45

Rensema, Dirk-Jan. "The Current State of Progressive Web Apps : A study on the performance, compatibility, consistency, security and privacy, and user and business impact of progressive web apps." Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-78904.

Full text
Abstract:
Since the late 80s the web has been evolving through new standards, added functionality, device performance and improved user experience. Websites evolved from static information to what is now known as web apps in which web technologies started to replace regular native programs and apps, as web apps slowly started offering similar functionality and performance, with the added benefit of being cross-platform. Over time, even more functionality and improvements were added to the web apps which, with the right combination, made them progressively become more like apps. In 2015, this combination
APA, Harvard, Vancouver, ISO, and other styles
46

Williams, Todd Austin. "Then and now a comparsion of the attacks of December 7, 1941 and September 11, 2001 as seen in the New York Times with an analysis of the construction of the current threat to the National Security /." Ohio : Ohio University, 2003. http://www.ohiolink.edu/etd/view.cgi?ohiou1060033786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Банникова, Ю. С., та J. S. Bannikova. "Совершенствование государственного аудита в системе финансовой безопасности России на примере Счетной палаты : магистерская диссертация". Master's thesis, б. и, 2020. http://hdl.handle.net/10995/94150.

Full text
Abstract:
Магистерская диссертация посвящена направлениям совершенствования государственного аудита в системе финансовой безопасности России на примере Счетной палаты. Выпускная квалификационная работа состоит из введения, трех глав, заключения, списка использованных источников и приложений. В первой главе рассмотрены теоретические аспекты финансовой безопасности государства, выявлены актуальные угрозы. Во второй главе проведен анализ и дана оценка деятельности Счетной палаты за 2017 – 2019 годы. В третьей главе предложены пути повышения эффективности деятельности Счетной палаты.<br>The master's thesis
APA, Harvard, Vancouver, ISO, and other styles
48

Yehorova, Victoria, and Вікторія Олександрівна Єгорова. "Controllers (PLC) safety (safety relay). Overview. Primary requirements. Features of the application." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/50754.

Full text
Abstract:
1. When to use multi-function safety relays. URL: https://www.controleng.com/articles/when-to-use-multi-function-safety-relays/ (Last accessed: 18.01.2021). 2. Machine Safety Design: Safety Relays Versus a Single Safety Controller. URL: http://www.stitcs.com/en/Safety/Safety_Relay_vs_Safety_Controller.pdf (Last accessed: 18.01.2021). 3. Safety relay versus safety PLC: safety control architecture. URL: http://www.instrumentation.co.za/article.aspx?pklarticleid=2066 . (Last accessed: 18.01.2021). 4. Evolving from safety relays to safety PLCs. URL: https://www.processonline.com.au/content/safe
APA, Harvard, Vancouver, ISO, and other styles
49

Suchomel, Lukáš. "Analýza kritických míst v silniční dopravě v okrese Ústí nad Orlicí." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2017. http://www.nusl.cz/ntk/nusl-316993.

Full text
Abstract:
The aim of this dissertation is to propose adjustments of five chosen locations leading to increase safety and to improve financial requirements. Problematic locations can be found in the region of Ústí nad Orlicí. The work contains three variants to improve every area.
APA, Harvard, Vancouver, ISO, and other styles
50

Hromek, Lukáš. "Posouzení a vyhodnocení bezpečnosti u el. strojů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242123.

Full text
Abstract:
This thesis is focused on the security and improving of electrical rotating machines service life, especially asynchronous motors. Work includes a description of the most common disorders, short description of the asynchronous motor cage casting, analysis of provided decommissioned motors with photo documentation. The last part of this thesis is focused to vibrodiagnostic of asynchronous motor with simulated imbalance and motor emplacement by laser.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!