Journal articles on the topic 'Security threats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security threats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Isokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain." Teisė 122 (March 30, 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.
Full textPASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (August 11, 2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.
Full textJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (December 20, 2013): 6. http://dx.doi.org/10.33317/ssurj.v3i1.62.
Full textSaptono, Edy, Ribka Keiza, and Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia." Technium Social Sciences Journal 23 (September 9, 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.
Full textSyomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.
Full textSyed, Farzana Zaheer, and Saba Javed. "Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan." International Journal of Social Sciences and Management 4, no. 4 (October 30, 2017): 267–74. http://dx.doi.org/10.3126/ijssm.v4i4.18503.
Full textPendergrass, John C., Karen Heart, C. Ranganathan, and V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine." International Journal of Healthcare Information Systems and Informatics 9, no. 4 (October 2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.
Full textKarpavičiūtė, Ieva. "Securitization and Lithuania’s National Security Change." Lithuanian Foreign Policy Review 36, no. 1 (December 20, 2017): 9–33. http://dx.doi.org/10.1515/lfpr-2017-0005.
Full textHojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (August 1, 2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.
Full textصادق, بارزان. "Internal Security Threats on the Kurdistan Region – Iraq." Journal for Political and Security Studies 3, no. 6 (December 1, 2020): 84–130. http://dx.doi.org/10.31271/jopss.10040.
Full textSmirnov, R. A., and S. N. Novikov. "Research on Information Security Risk Assessment Techniques." Interexpo GEO-Siberia 6 (May 18, 2022): 250–57. http://dx.doi.org/10.33764/2618-981x-2022-6-250-257.
Full textKoper-Staszowska, Wioletta. "Security versus Threat – Interrelations." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 3 (October 30, 2018): 22–25. http://dx.doi.org/10.5604/01.3001.0012.7517.
Full textSmalii, O. B. "A general description of threats to european security at the threshold of the 21st century." Legal horizons, no. 21 (2020): 148–52. http://dx.doi.org/10.21272/legalhorizons.2020.i21.p148.
Full textYarovenko, Hanna. "Evaluating the threat to national information security." Problems and Perspectives in Management 18, no. 3 (September 9, 2020): 195–210. http://dx.doi.org/10.21511/ppm.18(3).2020.17.
Full textMeland, Per Håkon, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, and Paolo Giorgini. "Threat Analysis in Goal-Oriented Security Requirements Modelling." International Journal of Secure Software Engineering 5, no. 2 (April 2014): 1–19. http://dx.doi.org/10.4018/ijsse.2014040101.
Full textLe, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (March 30, 2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Full textDervišević, Tarik, Sabina Baraković, and Jasmina Baraković Husić. "Case Study: Security of System for Remote Management of Windows." B&H Electrical Engineering 14, no. 2 (December 1, 2020): 4–12. http://dx.doi.org/10.2478/bhee-2020-0007.
Full textJenab, Kouroush, Sam Khoury, and Kim LaFevor. "Flow-Graph and Markovian Methods for Cyber Security Analysis." International Journal of Enterprise Information Systems 12, no. 1 (January 2016): 59–84. http://dx.doi.org/10.4018/ijeis.2016010104.
Full textMalviya, Deepak Kumar, and Umesh Kumar Lilhore. "Survey on Security Threats in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-3, Issue-1 (December 31, 2018): 1222–26. http://dx.doi.org/10.31142/ijtsrd19172.
Full textPolikanov, Dmitry. "Russia’s Perception and Hierarchy of Security Threats." Connections: The Quarterly Journal 04, no. 2 (2005): 85–91. http://dx.doi.org/10.11610/connections.04.2.11.
Full textGuchua, Alika, and Thornike Zedelashvili. "Cyberwar as a Phenomenon of Asymmetric Threat and Cyber-Nuclear Security Threats." Історико-політичні проблеми сучасного світу, no. 40 (December 15, 2019): 50–57. http://dx.doi.org/10.31861/mhpi2019.40.50-57.
Full textJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "2 Wireless Security Threats." Sir Syed Research Journal of Engineering & Technology 1, no. 1 (December 20, 2013): 6. http://dx.doi.org/10.33317/ssurj.v1i1.62.
Full textKopczewski, Marian, Zbigniew Ciekanowski, Julia Nowicka, and Katarzyna Bakalarczyk-Burakowska. "Security threats in cyberspace." Scientific Journal of the Military University of Land Forces 205, no. 3 (September 23, 2022): 415–26. http://dx.doi.org/10.5604/01.3001.0016.0040.
Full textBahgat, Gawdat. "Oil security: Potential threats." Contemporary Security Policy 19, no. 2 (August 1998): 71–90. http://dx.doi.org/10.1080/13523269808404191.
Full textVelinov, Nikola, and Stephan Janouch. "Combating Evolving Security Threats." New Electronics 53, no. 10 (May 26, 2020): 22–23. http://dx.doi.org/10.12968/s0047-9624(22)61260-4.
Full textGould, David. "Organizational Resilience Approaches to Cyber Security." International Journal of Smart Education and Urban Society 9, no. 4 (October 2018): 53–62. http://dx.doi.org/10.4018/ijseus.2018100105.
Full textKaduszkiewicz, Marcin. "The National Map of Security Threats as a tool to monitor security and public order." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 31, no. 31 (September 28, 2018): 81–92. http://dx.doi.org/10.5604/01.3001.0012.8596.
Full textTkachuk, Natalia. "Analytical Component in Institutional Providing of Ukraine National Security Risks and Threats Assessment." Information Security of the Person, Society and State, no. 28-30 (December 15, 2020): 38–44. http://dx.doi.org/10.51369/2707-7276-2020-(1-3)-5.
Full textSuroto, Suroto. "WLAN Security: Threats And Countermeasures." JOIV : International Journal on Informatics Visualization 2, no. 4 (June 27, 2018): 232. http://dx.doi.org/10.30630/joiv.2.4.133.
Full textTheron, Julien. "Networks of Threats: Interconnection, Interaction, Intermediation." Journal of Strategic Security 14, no. 3 (October 2021): 45–69. http://dx.doi.org/10.5038/1944-0472.14.3.1942.
Full textSun, Lei, Qin Sheng Du, and Lu Tan. "Cloud Security Threats Distribution Technology Research." Applied Mechanics and Materials 727-728 (January 2015): 934–36. http://dx.doi.org/10.4028/www.scientific.net/amm.727-728.934.
Full textKovpak, Olena. "TOOLS OF COUNTERACTION OF BUDGET SECTOR DEVELOPMENT THREATS." Economic Analysis, no. 27(3) (2017): 31–36. http://dx.doi.org/10.35774/econa2017.03.031.
Full textIlvonen, Ilona, and Pasi Virtanen. "Preparing for Cyber Threats with Information Security Policies." International Journal of Cyber Warfare and Terrorism 3, no. 4 (October 2013): 22–31. http://dx.doi.org/10.4018/ijcwt.2013100103.
Full textJ., Waweru, and Dr Anita Kiamba. "Wildlife Security and International Relations." International Journal of Research and Innovation in Social Science 06, no. 10 (2022): 720–24. http://dx.doi.org/10.47772/ijriss.2022.61035.
Full textGreaves, Wilfrid. "Climate change and security in Canada." International Journal: Canada's Journal of Global Policy Analysis 76, no. 2 (June 2021): 183–203. http://dx.doi.org/10.1177/00207020211019325.
Full textRizal, Muhamad, and Yanyan Yani. "Cybersecurity Policy and Its Implementation in Indonesia." JAS (Journal of ASEAN Studies) 4, no. 1 (August 9, 2016): 61. http://dx.doi.org/10.21512/jas.v4i1.967.
Full textMelnyk, Dmytro. "Current Threats to the National Security of Ukraine in the Field of Information: Issues of dentification and Counteraction." Information Security of the Person, Society and State, no. 31-33 (December 20, 2021): 16–27. http://dx.doi.org/10.51369/2707-7276-2021-(1-3)-2.
Full textZeng, Min, Chuanzhou Dian, and Yaoyao Wei. "Risk Assessment of Insider Threats Based on IHFACS-BN." Sustainability 15, no. 1 (December 28, 2022): 491. http://dx.doi.org/10.3390/su15010491.
Full textEl-Bakkouri, N., and T. Mazri. "SECURITY THREATS IN SMART HEALTHCARE." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIV-4/W3-2020 (November 23, 2020): 209–14. http://dx.doi.org/10.5194/isprs-archives-xliv-4-w3-2020-209-2020.
Full textJoseph, Juliet Eileen. "SADC and ECOWAS’S peace and security architecture preparedness and the COVID-19 pandemic." EUREKA: Social and Humanities, no. 1 (January 28, 2022): 16–30. http://dx.doi.org/10.21303/2504-5571.2022.002248.
Full textBabenko, Aleksey, and Svetlana Kozunova. "The Model of Information Security Threat Profile of Corporate Information System." NBI Technologies, no. 1 (August 2018): 6–11. http://dx.doi.org/10.15688/nbit.jvolsu.2018.1.1.
Full textZoidov, K. Kh, and E. N. Zimenkova. "On Threats to the Economic Security of the Republic of Crimea." Economics and Management, no. 9 (November 7, 2019): 23–33. http://dx.doi.org/10.35854/1998-1627-2019-9-23-33.
Full textAntonova, Olena. "MAIN THREATS TO THE FORMATION OF THE SECURITY SYSTEM OF BANKS CREDIT ACTIVITIES." Actual Problems of Economics 1, no. 223 (January 22, 2020): 55–72. http://dx.doi.org/10.32752/1993-6788-2020-1-223-55-72.
Full textZhang, Shuqin, Guangyao Bai, Hong Li, Peipei Liu, Minzhi Zhang, and Shujun Li. "Multi-Source Knowledge Reasoning for Data-Driven IoT Security." Sensors 21, no. 22 (November 15, 2021): 7579. http://dx.doi.org/10.3390/s21227579.
Full textWENDT, Jan A. "CRITICAL ASSESSMENT OF THE OPERATION OF THE STATE SECURITY SYSTEMS IN POLAND." Revista Română de Geografie Politică 24, no. 2 (December 30, 2022): 74–81. http://dx.doi.org/10.30892/rrgp.242105-360.
Full textFebriana, Henny, Dewi Sartika Br Ginting, Fuzy Yustika Manik, and Mahyuddin. "The Applied Aproach Impact Information Security For Government and Company (A Review)." Data Science: Journal of Computing and Applied Informatics 6, no. 1 (March 21, 2022): 45–54. http://dx.doi.org/10.32734/jocai.v6.i1-7935.
Full textForca, Božidar, Dragoljub Sekulović, and Igor Vukonjanski. "Actual Challenges, Risks and Security Safety." Security science journal 1, no. 1 (July 31, 2020): 65–83. http://dx.doi.org/10.37458/ssj.1.1.6.
Full textZharkov, Grigory, and Vadim Shevtsov. "Analysis of Information Threats to Industrial Security." NBI Technologies, no. 2 (December 2020): 6–10. http://dx.doi.org/10.15688/nbit.jvolsu.2020.2.1.
Full textHENTZ, JAMES J. "The Southern African security order: regional economic integration and security among developing states." Review of International Studies 35, S1 (February 2009): 189–213. http://dx.doi.org/10.1017/s0260210509008481.
Full textBojanić, Dragan. "The theoretical and methodological analysis of challenges, risks and threats in modern theory of national security." Vojno delo 74, no. 2 (2022): 1–17. http://dx.doi.org/10.5937/vojdelo2202001b.
Full text