Journal articles on the topic 'Security Suite'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security Suite.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Khare, Ruda, and Prof Nandana Prabhu. "Security Suite for IT and Telecom Industries." IOSR Journal of Computer Engineering 18, no. 04 (April 2016): 85–89. http://dx.doi.org/10.9790/0661-1804048589.
Full textSampangi, Raghav V. "A Security Suite for Wireless Body Area Networks." International Journal of Network Security & Its Applications 4, no. 1 (January 31, 2012): 97–116. http://dx.doi.org/10.5121/ijnsa.2012.4110.
Full textBoone, Adam. "Cyber-security must be a C-suite priority." Computer Fraud & Security 2017, no. 2 (February 2017): 13–15. http://dx.doi.org/10.1016/s1361-3723(17)30015-5.
Full textBellovin, S. M. "Security problems in the TCP/IP protocol suite." ACM SIGCOMM Computer Communication Review 19, no. 2 (April 1989): 32–48. http://dx.doi.org/10.1145/378444.378449.
Full textNikeshin, A., N. Pakulin, and V. Shnitman. "Test Suite development for verification of TLS security protocol." Proceedings of the Institute for System Programming of RAS 23 (2012): 387–404. http://dx.doi.org/10.15514/ispras-2012-23-22.
Full textYang, Wenze, Felix Kogan, and Wei Guo. "An Ongoing Blended Long-Term Vegetation Health Product for Monitoring Global Food Security." Agronomy 10, no. 12 (December 9, 2020): 1936. http://dx.doi.org/10.3390/agronomy10121936.
Full textFourney, Robert S., and Austin D. Hanson. "Torbit: Design of an open source security flaw measurement suite." Journal of Computational Methods in Sciences and Engineering 9, s2 (July 30, 2009): S137—S147. http://dx.doi.org/10.3233/jcm-2009-0242.
Full textZaba, Stefek. "Cryptographic security in the internet protocol suite: Practice and proposals." Information Security Technical Report 2, no. 2 (January 1997): 54–73. http://dx.doi.org/10.1016/s1363-4127(97)81329-5.
Full textKent, S. "Comments on “security problems in the TCP/IP protocol suite”." ACM SIGCOMM Computer Communication Review 19, no. 3 (July 1989): 10–19. http://dx.doi.org/10.1145/74674.74675.
Full textAmigorena, François. "Does your C-suite really understand the benefits of IT security?" Computer Fraud & Security 2015, no. 11 (November 2015): 18–20. http://dx.doi.org/10.1016/s1361-3723(15)30104-4.
Full textYeşiltepe, Mirsat, Beyza Yılmaz, Özge Yeni, and Muhammet Kurulay. "Sort of Turkey's top 20 banks by cipher suite value." Global Journal of Computer Science 5, no. 2 (December 31, 2015): 74. http://dx.doi.org/10.18844/gjcs.v5i2.181.
Full textYu, Su, and Jon J. Brewster. "Study of Security of Virtual Host Based on XML." Advanced Materials Research 566 (September 2012): 367–74. http://dx.doi.org/10.4028/www.scientific.net/amr.566.367.
Full textRiadi, Imam, Herman, and Aulyah Zakilah Ifani. "Optimasi Keamanan Web Server terhadap Serangan Broken Authentication Menggunakan Teknologi Blockchain." JISKA (Jurnal Informatika Sunan Kalijaga) 6, no. 3 (September 22, 2021): 139–48. http://dx.doi.org/10.14421/jiska.2021.6.3.139-148.
Full textTschofenig, Hannes, and Emmanuel Baccelli. "Cyberphysical Security for the Masses: A Survey of the Internet Protocol Suite for Internet of Things Security." IEEE Security & Privacy 17, no. 5 (September 2019): 47–57. http://dx.doi.org/10.1109/msec.2019.2923973.
Full textCafferty, Elizabeth. "Remarks by Elizabeth Cafferty." Proceedings of the ASIL Annual Meeting 112 (2018): 146–50. http://dx.doi.org/10.1017/amp.2019.109.
Full textAlhaj, Abdullah A. "Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)." International Journal of Cloud Applications and Computing 4, no. 1 (January 2014): 45–49. http://dx.doi.org/10.4018/ijcac.2014010104.
Full textShepherd, Laura J. "The paradox of prevention in the Women, Peace and Security agenda." European Journal of International Security 5, no. 3 (September 30, 2020): 315–31. http://dx.doi.org/10.1017/eis.2020.15.
Full textLopez-Ramos, Juan Antonio, Joachim Rosenthal, Davide Schipani, and Reto Schnyder. "Group key management based on semigroup actions." Journal of Algebra and Its Applications 16, no. 08 (August 9, 2016): 1750148. http://dx.doi.org/10.1142/s0219498817501481.
Full textLara, Evangelina, Leocundo Aguilar, Jesús García, and Mauricio Sanchez. "A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices." Sensors 18, no. 10 (October 4, 2018): 3326. http://dx.doi.org/10.3390/s18103326.
Full textZapico, Florence, Josefina Dizon, Edwino Fernando, Teresita Borromeo, Kenneth McNally, and Jose Hernandez. "Upland Rice: Cultural Keystone Species in a Philippine Traditional Agroecosystem." Asian Journal of Agriculture and Development 17, no. 2 (December 1, 2020): 93–105. http://dx.doi.org/10.37801/ajad2020.17.2.6.
Full textCalix, Ricardo A., Sumendra B. Singh, Tingyu Chen, Dingkai Zhang, and Michael Tu. "Cyber Security Tool Kit (CyberSecTK): A Python Library for Machine Learning and Cyber Security." Information 11, no. 2 (February 11, 2020): 100. http://dx.doi.org/10.3390/info11020100.
Full textUkil, Arijit, Soma Bandyopadhyay, Abhijan Bhattacharyya, Arpan Pal, and Tulika Bose. "Lightweight security scheme for IoT applications using CoAP." International Journal of Pervasive Computing and Communications 10, no. 4 (October 28, 2014): 372–92. http://dx.doi.org/10.1108/ijpcc-01-2014-0002.
Full textShoemaker, Dan, Gregory Laidlaw, and Anne Kohnke. "POSITIONING CYBERSECURITY IN THE C-SUITE: HOW TO BUILD A JOINT SECURITY OPERATIONS CENTER." EDPACS 60, no. 6 (November 26, 2019): 1–7. http://dx.doi.org/10.1080/07366981.2019.1691139.
Full textHwan Ju, Seung, and Hee Suk Seo. "Design Key Management System for DLMS/COSEM Standard-based Smart Metering." International Journal of Engineering & Technology 7, no. 3.34 (September 1, 2018): 554. http://dx.doi.org/10.14419/ijet.v7i3.34.19380.
Full textBader, Ansam Sabah, Shaymaa Hameed, and Maisa’a Abid Ali K. "Key Generation based on Henon map and Lorenz system." Al-Mustansiriyah Journal of Science 31, no. 1 (March 1, 2020): 41. http://dx.doi.org/10.23851/mjs.v31i1.734.
Full textNugrahtama, Aghnia Luthfy, and Yogha Restu Pramadi. "Implementation of salsa20 stream cipher algorithm as an alternative cipher suite SSL-VPN for VOIP security." IOP Conference Series: Materials Science and Engineering 508 (May 2, 2019): 012132. http://dx.doi.org/10.1088/1757-899x/508/1/012132.
Full textNikeshin, A. V., N. V. Pakulin, and V. Z. Shnitman. "Development of a test suite for the verification of implementations of the IPsec v2 security protocol." Programming and Computer Software 37, no. 1 (January 2011): 26–40. http://dx.doi.org/10.1134/s0361768811010038.
Full textMamun, Md Selim Al, and Fatema Akhter. "Pseudo Random Binary Sequence Based on Cyclic Difference Set." Symmetry 12, no. 8 (July 22, 2020): 1202. http://dx.doi.org/10.3390/sym12081202.
Full textAkgul, Akif, Omer Faruk Boyraz, Karthikeyan Rajagopal, Emre Guleryuz, Mustafa Zahid Yildiz, and Mustafa Kutlu. "An unforced megastable chaotic oscillator and its application on protecting electrophysiological signals." Zeitschrift für Naturforschung A 75, no. 12 (November 18, 2020): 1025–37. http://dx.doi.org/10.1515/zna-2020-0222.
Full textMasih, Jolly, Amita Sharma, Leena Patel, and Shruthi Gade. "Indicators of Food Security in Various Economies of World." Journal of Agricultural Science 9, no. 3 (February 13, 2017): 254. http://dx.doi.org/10.5539/jas.v9n3p254.
Full textYakut, Selman, Taner Tuncer, and Ahmet Bedri Özer. "A New Secure and Efficient Approach for TRNG and Its Post-Processing Algorithms." Journal of Circuits, Systems and Computers 29, no. 15 (May 21, 2020): 2050244. http://dx.doi.org/10.1142/s0218126620502448.
Full textSong, Ling, Yi Tu, Danping Shi, and Lei Hu. "Security analysis of Subterranean 2.0." Designs, Codes and Cryptography 89, no. 8 (June 1, 2021): 1875–905. http://dx.doi.org/10.1007/s10623-021-00892-6.
Full textMuhammad, Aina’u Shehu, and Fatih Özkaynak. "SIEA: Secure Image Encryption Algorithm Based on Chaotic Systems Optimization Algorithms and PUFs." Symmetry 13, no. 5 (May 8, 2021): 824. http://dx.doi.org/10.3390/sym13050824.
Full textSrinivaas, Charrith. "A Design Implementation and Comparative Analysis of Advanced Encryption Standard (AES) Algorithm Using Verilog HDL." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 20, 2021): 1876–79. http://dx.doi.org/10.22214/ijraset.2021.36731.
Full textLambic, Dragan, and Mladen Nikolic. "New pseudo-random number generator based on improved discrete-space chaotic map." Filomat 33, no. 8 (2019): 2257–68. http://dx.doi.org/10.2298/fil1908257l.
Full textRaghavendran, R., and B. Ragupathi. "Update Checker: Increasing Virtual Machine Security in Cloud Environments." Applied Mechanics and Materials 513-517 (February 2014): 1268–73. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1268.
Full textBlinowski, Grzegorz J. "Practical Aspects of Physical and MAC Layer Security in Visible Light Communication Systems." International Journal of Electronics and Telecommunications 62, no. 1 (March 1, 2016): 7–13. http://dx.doi.org/10.1515/eletel-2016-0001.
Full textZajac, Pavol, and Peter Špaček. "Preventing Potential Backdoors in Bike Algorithm." Tatra Mountains Mathematical Publications 73, no. 1 (August 1, 2019): 179–93. http://dx.doi.org/10.2478/tmmp-2019-0013.
Full textCaiza Méndez, Diego Gustavo, Andrés Santiago Cisneros Barahona, Pablo Martí Méndez Naranjo, and Henry Mauricio Villa Yánez. "Implementación de un prototipo como sistema detector de intrusos para detectar ataques dirigidos al protocolo ipv6 desarrollado con herramientas open source." Cumbres 3, no. 2 (December 30, 2017): 129–41. http://dx.doi.org/10.48190/cumbres.v3n2a12.
Full textBabb, Casey, and Alex Wilner. "Passwords, pistols, and power plants: An assessment of physical and digital threats targeting Canada’s energy sector." International Journal: Canada's Journal of Global Policy Analysis 74, no. 4 (December 2019): 518–36. http://dx.doi.org/10.1177/0020702019895263.
Full textLi, Hao, Tianhao Xiezhang, Cheng Yang, Lianbing Deng, and Peng Yi. "Secure Video Surveillance Framework in Smart City." Sensors 21, no. 13 (June 28, 2021): 4419. http://dx.doi.org/10.3390/s21134419.
Full textZakaria, Nur Hafiza, Azuan Ahmad, Azni Haslizan Ab Halim, and Farida Hazwani Mohd Ridzuan. "SECURITY ANALYSIS BETWEEN STATIC AND DYNAMIC S-BOXES IN BLOCK CIPHERS." Journal of Information System and Technology Management 6, no. 20 (March 15, 2021): 10–16. http://dx.doi.org/10.35631/jistm.620002.
Full textPikuza, M. O., and S. Yu Mikhnevich. "Testing a hardware random number generator using NIST statistical test suite." Doklady BGUIR 19, no. 4 (July 1, 2021): 37–42. http://dx.doi.org/10.35596/1729-7648-2021-19-4-37-42.
Full textSodhi, Gurpreet Kour, Gurjot Singh Gaba, Lavish Kansal, Mohamed El Bakkali, and Faisel Em Tubbal. "Implementation of message authentication code using DNA-LCG key and a novel hash algorithm." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 1 (February 1, 2019): 352. http://dx.doi.org/10.11591/ijece.v9i1.pp352-358.
Full textTuholske, Cascade, Kwaw Andam, Jordan Blekking, Tom Evans, and Kelly Caylor. "Comparing measures of urban food security in Accra, Ghana." Food Security 12, no. 2 (January 23, 2020): 417–31. http://dx.doi.org/10.1007/s12571-020-01011-4.
Full textYakut, Selman, Taner Tuncer, and Ahmet Bedri Ozer. "Secure and Efficient Hybrid Random Number Generator Based on Sponge Constructions for Cryptographic Applications." Elektronika ir Elektrotechnika 25, no. 4 (August 7, 2019): 40–46. http://dx.doi.org/10.5755/j01.eie.25.4.23969.
Full textEcarot, Thibaud, Benoît Fraikin, Luc Lavoie, Mark McGilchrist, and Jean-François Ethier. "A Sensitive Data Access Model in Support of Learning Health Systems." Computers 10, no. 3 (February 26, 2021): 25. http://dx.doi.org/10.3390/computers10030025.
Full textPiedra, Antonio, An Braeken, and Abdellah Touhafi. "Extending the IEEE 802.15.4 Security Suite with a Compact Implementation of the NIST P-192/B-163 Elliptic Curves." Sensors 13, no. 8 (July 29, 2013): 9704–28. http://dx.doi.org/10.3390/s130809704.
Full textKhan, Usman Ali, and Sang Sun Lee. "Multi-Layer Problems and Solutions in VANETs: A Review." Electronics 8, no. 2 (February 11, 2019): 204. http://dx.doi.org/10.3390/electronics8020204.
Full textGao, Tianhan, Nan Guo, Kangbin Yim, and Qianyi Wang. "PPS: A privacy-preserving security scheme for multi-operator wireless mesh networks with enhanced user experience." Computer Science and Information Systems 11, no. 3 (2014): 975–99. http://dx.doi.org/10.2298/csis130917060g.
Full text