Journal articles on the topic 'Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures." Indian Journal of Applied Research 4, no. 4 (October 1, 2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.
Full textD'souza, Jason John, and Seeza Franklin. "Li-Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.
Full textMcCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (May 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Full textGupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar, and Mohinder Singh. "Networking and Security Measures." DESIDOC Bulletin of Information Technology 24, no. 2 (March 1, 2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.
Full textRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (November 2002): 1. http://dx.doi.org/10.1145/763944.763945.
Full textRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (November 2002): 1. http://dx.doi.org/10.1145/763948.763945.
Full textStanton, Ray. "Weighing up security measures." Computer Fraud & Security 2006, no. 1 (January 2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.
Full textWood, Charles Cresson. "Floppy diskette security measures." Computers & Security 4, no. 3 (September 1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.
Full textLi, Yan. "Network Security Protection Measures." Advanced Materials Research 971-973 (June 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.
Full textValera, Jasmine P., and Sunguk Lee. "Security Measures in Overcoming Mobile IPv6 Security Issues." International Journal of Database Theory and Application 9, no. 7 (July 31, 2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.
Full textKhabirov, Artur Ilfarovich, and Gulnara Mullanurovna Khamitova. "Security Measures and Liability Measures in Loan Agreements." Journal of Politics and Law 12, no. 5 (August 31, 2019): 1. http://dx.doi.org/10.5539/jpl.v12n5p1.
Full textChristin, Nicolas. "The effectiveness of security measures." Communications of the ACM 65, no. 9 (September 2022): 92. http://dx.doi.org/10.1145/3547132.
Full textGupta, Anish, Vimal Bibhu, and Rashid Hussain. "Security Measures in Data Mining." International Journal of Information Engineering and Electronic Business 4, no. 3 (July 1, 2012): 34–39. http://dx.doi.org/10.5815/ijieeb.2012.03.05.
Full textUffen, Jörg, and Michael H. Breitner. "Management of Technical Security Measures." International Journal of Social and Organizational Dynamics in IT 3, no. 1 (January 2013): 14–31. http://dx.doi.org/10.4018/ijsodit.2013010102.
Full textCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (March 1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Full textKeenan, Debra Palmer, Christine Olson, James C. Hersey, and Sondra M. Parmer. "Measures of Food Insecurity/Security." Journal of Nutrition Education 33 (September 2001): S49—S58. http://dx.doi.org/10.1016/s1499-4046(06)60069-9.
Full textTREMBLAY, JEAN-FRANÇOIS. "SECURITY MEASURES IMPEDE U.S. VISITS." Chemical & Engineering News 81, no. 11 (March 17, 2003): 40–41. http://dx.doi.org/10.1021/cen-v081n011.p040.
Full textFeher, Ben, Lior Sidi, Asaf Shabtai, Rami Puzis, and Leonardas Marozas. "WebRTC security measures and weaknesses." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.092138.
Full textMarozas, Leonardas, Asaf Shabtai, Rami Puzis, Ben Feher, and Lior Sidi. "WebRTC security measures and weaknesses." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.10013302.
Full textJ A, Smitha, Rakshith G Raj, Sumanth J Samuel, and Pramath P Yaji. "Security Measures of Textual Data." International Journal of Innovative Research in Information Security 9, no. 03 (June 23, 2023): 55–60. http://dx.doi.org/10.26562/ijiris.2023.v0903.01.
Full textKhan, Koffka. "Securing Immersive Realms: A Review of Security Measures in 360-Degree Virtual Reality Video Streaming." International Journal of Science and Research (IJSR) 12, no. 12 (December 5, 2023): 727–33. http://dx.doi.org/10.21275/sr231208045505.
Full textGadre, Monica. "Data Security in Cloud Security Attacks and Preventive Measures." International Journal for Research in Applied Science and Engineering Technology 6, no. 3 (March 31, 2018): 529–36. http://dx.doi.org/10.22214/ijraset.2018.3085.
Full textKaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (October 2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.
Full textPopescu, Mirona Ana Maria, Andreea Barbu, Petronela Cristina Simion, and Georgiana Moiceanu. "Research on Data Security Measures in Romania." Proceedings of the International Conference on Business Excellence 18, no. 1 (June 1, 2024): 3277–83. http://dx.doi.org/10.2478/picbe-2024-0267.
Full textSTUDENÁ, Jana. "Relation of freedom and security in measures of crisis management." Scientific Papers of Silesian University of Technology. Organization and Management Series 2017, no. 110 (2017): 179–90. http://dx.doi.org/10.29119/1641-3466.2017.110.17.
Full textS Kale, Rakesh. "The Vulnerabilities, Threats and Counter measures in Wireless Network Security." International Journal of Science and Research (IJSR) 12, no. 4 (April 5, 2023): 1218–20. http://dx.doi.org/10.21275/mr23419121210.
Full textTorres, C. G., M. E. Turner, J. R. Harkess, and G. R. Istre. "Security measures for AIDS and HIV." American Journal of Public Health 81, no. 2 (February 1991): 210–11. http://dx.doi.org/10.2105/ajph.81.2.210.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textDamoah, Dominic, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-Sam, and Brighter Agyeman. "Improving Security Measures on Grid Computing." International Journal of Computer Applications 83, no. 9 (December 18, 2013): 6–11. http://dx.doi.org/10.5120/14474-2490.
Full textRudakova, O. Yu, T. A. Rudakova, and I. N. Sannikova. "Spatial measures for ensuring economic security." National Interests: Priorities and Security 16, no. 1 (January 16, 2020): 44–59. http://dx.doi.org/10.24891/ni.16.1.44.
Full textPevnev, Volodimir, and Serhii Kapchynskyi. "DATABASE SECURITY: THREATS AND PREVENTIVE MEASURES." Advanced Information Systems 2, no. 1 (May 27, 2018): 69–72. http://dx.doi.org/10.20998/2522-9052.2018.1.13.
Full textBenjamin, John, G. Sirmans, and Emily Zietz. "Security Measures and the Apartment Market." Journal of Real Estate Research 14, no. 3 (January 1, 1997): 347–58. http://dx.doi.org/10.1080/10835547.1997.12090900.
Full textFUJITA, Shintaro, and Kenji SAWADA. "Security Measures Technology for Control Systems." Journal of The Institute of Electrical Engineers of Japan 142, no. 4 (April 1, 2022): 212–14. http://dx.doi.org/10.1541/ieejjournal.142.212.
Full textLittlewood, Bev, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid, and Dieter Gollmann. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (April 1, 1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Full textWalsh, Matthew, and William Streilein. "Security Measures for Safeguarding the Bioeconomy." Health Security 18, no. 4 (August 1, 2020): 313–17. http://dx.doi.org/10.1089/hs.2020.0029.
Full textSchuldt, Alison. "Security measures at the nuclear pore." Nature Cell Biology 6, no. 2 (February 2004): 91. http://dx.doi.org/10.1038/ncb0204-91.
Full textSchroden, Jonathan J. "Measures for Security in a Counterinsurgency." Journal of Strategic Studies 32, no. 5 (October 2009): 715–44. http://dx.doi.org/10.1080/01402390903189394.
Full textAlessi, Dario R., and Yogesh Kulathu. "Security measures of a master regulator." Nature 497, no. 7448 (May 2013): 193–94. http://dx.doi.org/10.1038/nature12101.
Full textKITAURA, Shigeru, and Sumiaki OHOTUYAMA. "Verification about security measures for derailment." Proceedings of the Transportation and Logistics Conference 2017.26 (2017): 1018. http://dx.doi.org/10.1299/jsmetld.2017.26.1018.
Full textAndrews, Christine. "Improving data security measures in business." Computer Fraud & Security 2009, no. 8 (August 2009): 8–10. http://dx.doi.org/10.1016/s1361-3723(09)70099-5.
Full textHorak, O. J. "Means and Measures for Data Security." IFAC Proceedings Volumes 22, no. 19 (December 1989): 1–6. http://dx.doi.org/10.1016/s1474-6670(17)52787-1.
Full textCollinson, Helen. "Win 95 security measures mollify users." Computers & Security 15, no. 2 (January 1996): 125–26. http://dx.doi.org/10.1016/0167-4048(96)89336-9.
Full textCieśla, Rafał. "Security measures in combating document falsifiers." Nowa Kodyfikacja Prawa Karnego 44 (December 29, 2017): 41–53. http://dx.doi.org/10.19195/2084-5065.44.4.
Full textSahoo, Chinmayee. "Cloud Computing And Its Security Measures." International Journal of Electronics Engineering and Applications VIII, no. I (June 1, 2020): 10. http://dx.doi.org/10.30696/ijeea.viii.i.2020.10-19.
Full textAlfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (November 2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.
Full textGeorgieva, Natasha, and Hadji Krsteski. "Anti-corruption measures for corporate security." Journal of Process Management. New Technologies 5, no. 2 (2017): 75–82. http://dx.doi.org/10.5937/jouproman5-13490.
Full textSaarnio, Juha, and Neeli R. Prasad. "Foolproof Security Measures and Challenges Within." Wireless Personal Communications 29, no. 1/2 (April 2004): 1–3. http://dx.doi.org/10.1023/b:wire.0000037572.29470.27.
Full textChatterjee, Samrat, Stephen C. Hora, and Heather Rosoff. "Portfolio Analysis of Layered Security Measures." Risk Analysis 35, no. 3 (December 8, 2014): 459–75. http://dx.doi.org/10.1111/risa.12303.
Full textАндрей Викторович, Борисов,. "Criminological measures to ensure transport security." Вестник Московской академии Следственного комитета Российской Федерации, no. 3(33) (September 1, 2022): 76–86. http://dx.doi.org/10.54217/2588-0136.2022.33.3.007.
Full textO’shea, Timothy C. "The efficacy of home security measures." American Journal of Criminal Justice 24, no. 2 (March 2000): 155–67. http://dx.doi.org/10.1007/bf02887589.
Full text