Journal articles on the topic 'Security object'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security object.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Helmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (September 1, 2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.
Full textBAI, YUN, and YAN ZHANG. "ARTIFICIAL INTELLIGENCE IN DATABASE SECURITY." International Journal of Pattern Recognition and Artificial Intelligence 18, no. 01 (February 2004): 3–17. http://dx.doi.org/10.1142/s0218001404003022.
Full textFarid, Miftah, and Ajeng Ayu Adhisty. "STATE ACTION AS AN INDIVIDUAL SECURITY THREAT IN CASE OF CYBERCRIME SECURITIZATION." Jurnal Pertahanan 5, no. 3 (December 2, 2019): 77. http://dx.doi.org/10.33172/jp.v5i3.589.
Full textThuraisingham, Bhavani, Ravi Sandhu, and T. C. Ting. "Security for object-oriented systems." ACM SIGPLAN OOPS Messenger 5, no. 2 (April 1994): 77–78. http://dx.doi.org/10.1145/260304.260325.
Full textKusumah, Angga, and Aryani Witasari. "Law Enforcement on Fiducian Security Objects Due to Withdrawal of Fiducia Security Objects." Law Development Journal 3, no. 1 (March 7, 2021): 38. http://dx.doi.org/10.30659/ldj.3.1.38-43.
Full textHama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (June 2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.
Full textAli Andre, Julfikar. "SISTEM SECURITY WEBCAM DENGAN MENGGUNAKAN MICROSOFT VISUAL BASIC (6.0)." Rabit : Jurnal Teknologi dan Sistem Informasi Univrab 1, no. 2 (July 10, 2016): 46–58. http://dx.doi.org/10.36341/rabit.v1i2.23.
Full textFeng, Dan, Junjian Chen, Jingning Liu, and Zhikun Wang. "BLESS: Object level encryption security for object-based storage system." Mathematical and Computer Modelling 55, no. 1-2 (January 2012): 188–97. http://dx.doi.org/10.1016/j.mcm.2011.02.024.
Full textOleynik, P. P., and S. M. Salibekyan. "Model of security for object-oriented and object-attributed applications." Proceedings of the Institute for System Programming of the RAS 28, no. 3 (2016): 35–50. http://dx.doi.org/10.15514/ispras-2016-28(3)-3.
Full textOlha, SONIUK. "CONCEPTUAL AND CATEGORICAL APPARATUS OF SECURITY SCIENCE." Foreign trade: economics, finance, law 117, no. 4 (September 10, 2021): 85–95. http://dx.doi.org/10.31617/zt.knute.2021(117)08.
Full textFairthorne, Belinda. "Security in CORBA distributed object systems." Information Security Technical Report 1, no. 2 (January 1996): 56–63. http://dx.doi.org/10.1016/s1363-4127(97)89357-0.
Full textMatvejevs, Aleksandrs. "PUBLIC SECURITY – OBJECT OF POLICE PROTECTION." Administrative and Criminal Justice 1, no. 74 (June 30, 2016): 17. http://dx.doi.org/10.17770/acj.v1i74.2885.
Full textGasperoni, Franco. "Safety, security, and object-oriented programming." ACM SIGBED Review 3, no. 4 (October 2006): 15–26. http://dx.doi.org/10.1145/1183088.1183092.
Full textSZWARC, Krzysztof. "SECURITY AS AN OBJECT OF MANAGEMENT." National Security Studies 10, no. 1 (November 7, 2016): 131–45. http://dx.doi.org/10.37055/sbn/129843.
Full textRavi, Anusha. "Abandoned Object Detection." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 4541–45. http://dx.doi.org/10.22214/ijraset.2021.36006.
Full textLiao, W., C. Yang, M. Ying Yang, and B. Rosenhahn. "SECURITY EVENT RECOGNITION FOR VISUAL SURVEILLANCE." ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences IV-1/W1 (May 30, 2017): 19–26. http://dx.doi.org/10.5194/isprs-annals-iv-1-w1-19-2017.
Full textMeng, Zhichao, Man Zhang, and Hongxian Wang. "CNN with Pose Segmentation for Suspicious Object Detection in MMW Security Images." Sensors 20, no. 17 (September 2, 2020): 4974. http://dx.doi.org/10.3390/s20174974.
Full textLiu, Chenlu, Di Jiang, Weiyang Lin, and Luis Gomes. "Robot Grasping Based on Stacked Object Classification Network and Grasping Order Planning." Electronics 11, no. 5 (February 25, 2022): 706. http://dx.doi.org/10.3390/electronics11050706.
Full textКістол, Анастасія Анатоліївна. "SOCIAL SYSTEM AS AN OBJECT OF SECURITY." Economies' Horizons, no. 1(1) (April 28, 2015): 75–78. http://dx.doi.org/10.31499/2616-5236.1(1).2015.141214.
Full textThuraisingham, Bhavani. "Integrating object-oriented technology and security technology." ACM SIGPLAN Notices 28, no. 10 (October 1993): 304. http://dx.doi.org/10.1145/167962.165909.
Full textSilverstone, Roger. "Television, ontological security and the transitional object." Media, Culture & Society 15, no. 4 (October 1993): 573–98. http://dx.doi.org/10.1177/016344393015004004.
Full textThuraisingham, M. B. "Mandatory security in object-oriented database systems." ACM SIGPLAN Notices 24, no. 10 (October 1989): 203–10. http://dx.doi.org/10.1145/74878.74899.
Full textSivanantham, S., N. Nitin Paul, and R. Suraj Iyer. "OBJECT TRACKING ALGORITHM IMPLEMENTATION FOR SECURITY APPLICATIONS." Far East Journal of Electronics and Communications 16, no. 1 (February 2, 2016): 1–13. http://dx.doi.org/10.17654/ec016010001.
Full textKumarSaini, Dinesh. "Security Concerns of Object Oriented Software Architectures." International Journal of Computer Applications 40, no. 11 (December 29, 2012): 41–48. http://dx.doi.org/10.5120/5012-7334.
Full textBenantar, M., B. Blakley, and A. J. Nadalin. "Approach to object security in Distributed SOM." IBM Systems Journal 35, no. 2 (1996): 192–203. http://dx.doi.org/10.1147/sj.352.0192.
Full textRoy, O. M. "Security as an Object of Public Administration." Management Science 8, no. 1 (March 20, 2018): 52–61. http://dx.doi.org/10.26794/2304-022x-2018-8-1-52-61.
Full textAshby, Victoria, and Linda Schlipper. "Security standards for object data management systems." Computer Standards & Interfaces 13, no. 1-3 (October 1991): 297–302. http://dx.doi.org/10.1016/0920-5489(91)90037-z.
Full textSuryani, Vera, Selo Sulistyo, and Widyawan Widyawan. "Trust-Based Privacy for Internet of Things." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (October 1, 2016): 2396. http://dx.doi.org/10.11591/ijece.v6i5.9678.
Full textSuryani, Vera, Selo Sulistyo, and Widyawan Widyawan. "Trust-Based Privacy for Internet of Things." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (October 1, 2016): 2396. http://dx.doi.org/10.11591/ijece.v6i5.pp2396-2402.
Full textHu, Chang Ming, Jian Hua Yang, and Bin Qi Guo. "Comparative Study of the Housing Security Object Definition Methods." Applied Mechanics and Materials 501-504 (January 2014): 2593–600. http://dx.doi.org/10.4028/www.scientific.net/amm.501-504.2593.
Full textAlodia, Delvina, and Endang Pandamdari. "PERLINDUNGAN HUKUM BAGI KREDITUR DALAM HAL DEBITOR MENYEWAKAN OBJEK JAMINAN FIDUSIA KEPADA PIHAK KE TIGA (ANALISIS KASUS PUTUSAN MAHKAMAH AGUNG NOMOR 1271 K/PDT/2016)." Jurnal Hukum Adigama 1, no. 1 (July 31, 2018): 1453. http://dx.doi.org/10.24912/adigama.v1i1.2218.
Full textWeerasena, H. H., P. B. S. Bandara, J. R. B. Kulasekara, B. M. B. Dassanayake, U. A. A. Niroshika, and P. R. Wijenayake. "Dynamic Object Path Detection in a Network of Surveillance Cameras." Journal of Computer Science 1, no. 1 (October 7, 2013): 11–19. http://dx.doi.org/10.31357/jcs.v1i1.1104.
Full textBoichuk, V. Yu. "Generic, specific and direct object of a crime under the Article 330 of the Criminal Code of Ukraine." Bulletin of Kharkiv National University of Internal Affairs 83, no. 4 (December 28, 2018): 19–27. http://dx.doi.org/10.32631/v.2018.4.02.
Full textMakarenko, Sergey, and Gleb Smirnov. "Selection Method of Test Cyber Attacks that Ensure the Rational Completeness of the Penetration Testing of a Critical Information Infrastructure Object." Voprosy kiberbezopasnosti, no. 6(46) (2021): 12–25. http://dx.doi.org/10.21681/2311-3456-2021-6-12-25.
Full textAnwar, Tasniem. "Unfolding the Past, Proving the Present: Social Media Evidence in Terrorism Finance Court Cases." International Political Sociology 14, no. 4 (March 20, 2020): 382–98. http://dx.doi.org/10.1093/ips/olaa006.
Full textSalman, Rahmi, Thorsten Schultze, and Ingolf Willms. "Performance Enhancement of UWB Material Characterization and Object Recognition for Security Robots." Journal of Electrical and Computer Engineering 2010 (2010): 1–6. http://dx.doi.org/10.1155/2010/314695.
Full textRadzievskyi, Rostyslav, Valerii Plisko, and Valentyn Bondarenko. "PROFESSIONAL TRAINING OF SECURITY GUARDS ON THE BASIS OF SYSTEM MODULAR PROJECT OF OBJECT PROTECTION." Science and Education 2020, no. 3 (March 2020): 109–17. http://dx.doi.org/10.24195/2414-4665-2020-3-16.
Full textRen, Sheng, Jianqi Li, Tianyi Tu, Yibo Peng, and Jian Jiang. "Towards Efficient Video Detection Object Super-Resolution with Deep Fusion Network for Public Safety." Security and Communication Networks 2021 (May 22, 2021): 1–14. http://dx.doi.org/10.1155/2021/9999398.
Full textWang, Qi, and Guang Feng Zhang. "MMW Radiometric Image Feature Extraction for Security Inspection." Applied Mechanics and Materials 236-237 (November 2012): 999–1003. http://dx.doi.org/10.4028/www.scientific.net/amm.236-237.999.
Full textShi, Yuxuan, Yue Fan, Siqi Xu, Yue Gao, and Ran Gao. "Object Detection by Attention-Guided Feature Fusion Network." Symmetry 14, no. 5 (April 26, 2022): 887. http://dx.doi.org/10.3390/sym14050887.
Full textWiryadharma, Erick, and Moh Saleh. "Due to the Financing Company’s Capital as a Fidusian Recipient of Fidusian Security Objectives." International Journal of Multicultural and Multireligious Understanding 8, no. 7 (July 8, 2021): 19. http://dx.doi.org/10.18415/ijmmu.v8i7.2875.
Full textRomanovska, Y. A. "City as an Object of Socio-Economic Security." Problems of Economy 3, no. 41 (2019): 171–77. http://dx.doi.org/10.32983/2222-0712-2019-3-171-177.
Full textThuraisingham, Bhavani, T. C. Ting, Peter Sell, Ravi Sandhu, and Thomas Keefe. "Integrating security technology and object-oriented technology (panel)." ACM SIGPLAN OOPS Messenger 5, no. 2 (April 1994): 59–61. http://dx.doi.org/10.1145/260304.260320.
Full textChen, Weishi, Qunyu Xu, Huansheng Ning, Taosheng Wang, and Jing Li. "Foreign object debris surveillance network for runway security." Aircraft Engineering and Aerospace Technology 83, no. 4 (July 5, 2011): 229–34. http://dx.doi.org/10.1108/00022661111138648.
Full textGuinier, Daniel. "Object-oriented software for auditing information systems security." ACM SIGSAC Review 10, no. 4 (October 15, 1992): 22–30. http://dx.doi.org/10.1145/152399.152404.
Full textAlam, Mahtab. "Object oriented software security: goal questions metrics approach." International Journal of Information Technology 12, no. 1 (April 20, 2018): 175–79. http://dx.doi.org/10.1007/s41870-018-0189-x.
Full textVaradharajan, Vijay, and Stewart Black. "Multilevel security in a distributed object-oriented system." Computers & Security 10, no. 1 (February 1991): 51–68. http://dx.doi.org/10.1016/0167-4048(91)90056-j.
Full textYankovskaya, Yuliya, Tamara Datciuk, Lidiia Kondratieva, and Rashid Mangushev. "Structure, adaptability and security of an architectural object." E3S Web of Conferences 164 (2020): 05007. http://dx.doi.org/10.1051/e3sconf/202016405007.
Full textPAVLIUTIN, Yu M. "ECONOMIC SECURITY AS AN OBJECT OF PUBLIC ADMINISTRATION." Law and Society 2, no. 6-2 (2020): 99–105. http://dx.doi.org/10.32842/2078-3736/2020.6.2.2.15.
Full textZhang, Yanhai, and Yaoiwu Wang. "Behavior Analysis on the Security Object of the Public Rental Housing." Open Construction and Building Technology Journal 9, no. 1 (September 15, 2015): 233–37. http://dx.doi.org/10.2174/1874836801509010233.
Full text