Literatura académica sobre el tema "ENHANCING SECURITY"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "ENHANCING SECURITY".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "ENHANCING SECURITY"
J, Stephen y Vidyavati Ramteke. "Enhancing Security Issues in Online Games". Journal of Advanced Research in Dynamical and Control Systems 12, n.º 8 (19 de agosto de 2020): 95–103. http://dx.doi.org/10.5373/jardcs/v12i8/20202451.
Texto completoHaedar Akib,, Lutfi Saefullah, Husain Syam, Hamsu Abdul Gani,. "ENHANCING MARITIME SECURITY COOPERATION". Psychology and Education Journal 58, n.º 2 (10 de febrero de 2021): 4769–75. http://dx.doi.org/10.17762/pae.v58i2.2868.
Texto completoShonola, Shaibu Adekunle y Mike Joy. "Enhancing Mobile Learning Security". International Journal on Integrating Technology in Education 5, n.º 3 (30 de septiembre de 2016): 01–15. http://dx.doi.org/10.5121/ijite.2016.5301.
Texto completoHudson, R. B. "Enhancing Elderly Financial Security". Public Policy & Aging Report 19, n.º 3 (1 de junio de 2009): 2. http://dx.doi.org/10.1093/ppar/19.3.2.
Texto completoPangalos, G., M. Khair y L. Bozios. "Enhancing medical database security". Journal of Medical Systems 18, n.º 4 (agosto de 1994): 159–71. http://dx.doi.org/10.1007/bf00996700.
Texto completoWilkinson, Paul. "Enhancing global aviation security?" Terrorism and Political Violence 10, n.º 3 (septiembre de 1998): 147–66. http://dx.doi.org/10.1080/09546559808427475.
Texto completoArazi, B. "Enhancing Security with Nanotechnology". Computer 39, n.º 10 (octubre de 2006): 106–7. http://dx.doi.org/10.1109/mc.2006.338.
Texto completovan der Meer, Sico. "Enhancing International Cyber Security". Security and Human Rights 26, n.º 2-4 (7 de diciembre de 2015): 193–205. http://dx.doi.org/10.1163/18750230-02602004.
Texto completoHnamte, Vanlalruata, Jamal Hussain, Samuel Lalmuanawma, Chhakchhuak Lalrinawma y Lalchhanhima Hmar. "Enhancing Secured Network Slicer for Cloud Security Systems". Indian Journal Of Science And Technology 16, sp1 (3 de octubre de 2023): 179–91. http://dx.doi.org/10.17485/ijst/v16sp1.msc25.
Texto completoModares, Hero, Amirhossein Moravejosharieh, Rosli Bin Salleh y Jaime Lloret. "Enhancing Security in Mobile IPv6". ETRI Journal 36, n.º 1 (1 de febrero de 2014): 51–61. http://dx.doi.org/10.4218/etrij.14.0113.0177.
Texto completoTesis sobre el tema "ENHANCING SECURITY"
Zhang, Linfan y Shuang Zheng. "Enhancing QR Code Security". Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-14145.
Texto completoYue, Chuan. "Enhancing Web Browsing Security". W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623575.
Texto completoH, Fruchter Nathaniel. "Enhancing ISP-consumer security notifications". Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122916.
Texto completoThesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2019
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 79-85).
Security notification schemes hold great promise for improving both consumer cybersecurity and general network health as malware and other sources of malicious activity are becoming more prevalent on home networks. For example, botnets of Internet of Things devices engage in denial of service (DoS) attacks and ransomware holds data on personal and commercial systems hostage. Many of these threats are relatively opaque for an end user. An end user may not know that their smart device is participating in a DoS attack at all, unless they notice a protracted slowdown in network speeds. An upstream network provider like a consumer ISP has more visibility into the issue. Due to their privileged position, ISPs often have more data about the status of a malware infection, denial of service attack, or other malicious activity. This extra information can be of great benefit for the purposes of notification. For instance, an ISP may be able to notify a customer that a device on their network is being used for a DoS attackor that they see communication with a server involved in distributing ransomware. ISPs and other organizations that try and implement these schemes often run into a set of questions: How do I get the right data to power the notification? How do I ensure the user trusts the notification? Can I ensure the notification is not spoofed? Is there an optimal way to present the notification? How do I make sure a user takes the proper remedial action? This thesis presents a framework for new notification schemes to answer these questions by examining four key elements of a notification: form, delivery, and content. It also proposes multi-factor verification, a novel scheme to address trust and spoofing issues within a notification scheme. Finally, it provides a model for a new ISP-user security notification scheme within the context of the United States market and policy landscape.
by Nathaniel H. Fruchter.
S.M. in Technology and Policy
S.M.inTechnologyandPolicy Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program
Mohammed, Ali, Sachin Sama y Majeed Mohammed. "Enhancing Network Security in Linux Environment". Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17144.
Texto completoLiu, Ying. "Enhancing security for XML Web services". Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27531.
Texto completoKadhum, Hamza. "Enhancing Zigbee Security for Industrial Implementation". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279559.
Texto completoZigbee nätverk är ett populärt val vid uppsättning av ett nätverk med låg strömförbrukning. Zigbees användningsområde är olika men den är väldigt populär inom industriell områdesövervakning och hemautomation. Däremot har Zigbees säkerhet varit en nackdel, då det har framkommit att den inte möter kraven för industriell användning. Arbetet kom till genom ett samarbete med Ericsson och KTH för att undersöka Zigbee nätverks implementation och säkerhet. Arbetet bearbetar olika säkerhetslösningar för Zigbee nätverk och hur den kan implementeras för att uppnå långtidsanvändning utan batteribyte. Säkerhetslösningar bygger på public-key samt symmetric key kryptografi algoritmer för att förbättra och öka Zigbees säkerhet genom autentisering och tillåtelse av noder som ansluter sig till nätverket. Nätverkets konfiguration för långtidsanvändning redovisas genom att jämföra olika polling tidsintervaller mellan meddelanden. Långtidsanvändning utan batteribyte är viktigt för att nätverket kommer implementeras i ett avlägset område som är svåråtkomlig. Arbetet redovisar och jämföra olika lösningar för att öka säkerheten för Zigbee nätverk. Den optimala lösningen för att uppnå autentisering samt tillåtelse av noder som ansluter sig uppnås med nyckel skapande genom secret-splitting metoden. Metoden följer NIST rekommendationer och anses vara säker, därav uppfyller den kraven för industriell implementation. Nätverkets säkerhet ökar samt bibehåller ett nätverk med låg strömförbrukning.
Makkar, Ankush. "Enhancing IoT Security Using 5G Capabilities". Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85109.
Texto completoFekete, Florian. "Civil-military relations : enhancing international security". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FFekete.pdf.
Texto completoThesis advisor(s): Donald Abenheim, Karen Guttieri. Includes bibliographical references (p. 65-70). Also available online.
Kirkham, E. y C. Flew. "Strengthening embargoes and enhancing human security". Thesis, International Alert, Saferworld and University of Bradford, Department of Peace Studies, Centre for International Co-operation and Security, 2003. http://hdl.handle.net/10454/4275.
Texto completoArms embargoes are one of the principal tools of states in seeking to prevent, limit and bring an end to armed conflict and human rights abuses. Despite the frequency with which arms embargoes have been imposed, there are significant problems with their implementation. Pressure is therefore growing for the international governmental community to act in order to ensure that the political commitment embodied by the imposition of arms embargoes is matched by the commitment to ensure their rigorous enforcement and to achieve enhanced human security on the ground. Increasing the effectiveness of arms embargoes is a specific aim of the United Nations Programme of Action for Preventing and Combating the Illicit Trade in Small Arms and Light Weapons in All Its Aspects1 which specifically calls upon states "To take appropriate measures, including all legal or administrative means, against any activity that violates a United Nations Security Council arms embargo in accordance with the Charter of the United Nations".2 Accordingly, within the context of the implementation of the UN PoA, the overall aim of this paper is to explore ways in which the international community can act in order to strengthen the impact of arms embargoes and enhance human security. It will begin by examining the purposes, processes and effects relating to arms embargoes, with particular attention to those agreed at international (UN) level, and by highlighting issues of concern in each regard. An overview of the main issues and challenges facing implementation of arms embargoes will include the elaboration of three case-study examples showing the impact of UN arms embargoes on the availability of arms and on human security and a further five that illustrate the dilemmas faced by states in seeking to implement arms embargoes. Priority areas for attention in any international effort to strengthen the effectiveness of arms embargoes will be followed by more extensive proposals for enhancing international embargo regimes within the context of implementing the UN PoA. Whilst it is recognised that the UN PoA contains measures that relate only to the illicit trade in small arms and light weapons (SALW), if implemented fully, many of these would serve to strengthen the international apparatus of control, information exchange and provision of assistance relating to arms proliferation and misuse as a whole. In turn, this would greatly enhance the implementation of UN arms embargoes. Therefore, as well as providing an opportunity for reviewing progress on implementing the PoA, the first Biennial Meeting of States in July 2003 is clearly a major opportunity for states to address a number of the pressing challenges facing states in the implementation of UN embargoes.
Lee, Man Hee. "Architectural support for enhancing security in clusters". [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2889.
Texto completoLibros sobre el tema "ENHANCING SECURITY"
Cuthbertson, Ian M. y David Robertson. Enhancing European Security. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7.
Texto completoShultz, George Pratt. Enhancing diplomatic security. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1986.
Buscar texto completoRowny, Edward L. SDI, enhancing security and stability. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.
Buscar texto completoRowny, Edward L. SDI, enhancing security and stability. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.
Buscar texto completoRowny, Edward L. SDI, enhancing security and stability. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.
Buscar texto completoRao, Vemuri V., ed. Enhancing computer security with smart technology. Boca Raton, FL: Auerbach Publications, 2005.
Buscar texto completoUnited States. Congressional Budget Office., ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Buscar texto completoUnited States. Congressional Budget Office., ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Buscar texto completoUnited States. Congressional Budget Office, ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Buscar texto completoUnited States. Congressional Budget Office, ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Buscar texto completoCapítulos de libros sobre el tema "ENHANCING SECURITY"
Coffin, David. "Enhancing Security". En Expert Oracle and Java Security, 267–328. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3832-4_11.
Texto completoCuthbertson, Ian M. y David Robertson. "Security Through Behavioral Modification". En Enhancing European Security, 186–206. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_11.
Texto completoCuthbertson, Ian M. y David Robertson. "Introduction". En Enhancing European Security, 3–21. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_1.
Texto completoCuthbertson, Ian M. y David Robertson. "Arms Control and All That". En Enhancing European Security, 166–85. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_10.
Texto completoCuthbertson, Ian M. y David Robertson. "Combining Control and Enhancement". En Enhancing European Security, 207–16. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_12.
Texto completoCuthbertson, Ian M. y David Robertson. "Why Was INF Needed, and Would It Have Been Used?" En Enhancing European Security, 23–35. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_2.
Texto completoCuthbertson, Ian M. y David Robertson. "Conventional Force Imbalances: How to Count, and Can We Count?" En Enhancing European Security, 36–53. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_3.
Texto completoCuthbertson, Ian M. y David Robertson. "Conventional Force Imbalances: The Numbers". En Enhancing European Security, 54–66. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_4.
Texto completoCuthbertson, Ian M. y David Robertson. "Is There a Special European Interest in European Security?" En Enhancing European Security, 67–106. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_5.
Texto completoCuthbertson, Ian M. y David Robertson. "Is There a Pan-European Special Interest?" En Enhancing European Security, 107–25. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_6.
Texto completoActas de conferencias sobre el tema "ENHANCING SECURITY"
Zisiadis, Dimitris, Spyros Kopsidas, Argyris Varalis y Leandros Tassiulas. "Enhancing WPS security". En 2012 IFIP Wireless Days (WD). IEEE, 2012. http://dx.doi.org/10.1109/wd.2012.6402836.
Texto completoFall, Moustapha, Chris Chuvalas, Nolan Warning, Max Rabiee y Carla Purdy. "Enhancing SCADA System Security". En 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2020. http://dx.doi.org/10.1109/mwscas48704.2020.9184532.
Texto completoSingh, Arun Kumar, Shefalika Ghosh Samaddar y Arun K. Misra. "Enhancing VPN security through security policy management". En 2012 1st International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2012. http://dx.doi.org/10.1109/rait.2012.6194494.
Texto completoPriyanka, S. Sharon y B. Nagajayanthi. "Enhancing security in Bluetooth networks". En 2014 International Conference on Science Engineering and Management Research (ICSEMR). IEEE, 2014. http://dx.doi.org/10.1109/icsemr.2014.7043560.
Texto completoTamaki, Kiyoshi. "Enhancing implementation security of QKD". En Quantum Technologies and Quantum Information Science, editado por Mark T. Gruneisen, Miloslav Dusek y John G. Rarity. SPIE, 2017. http://dx.doi.org/10.1117/12.2280737.
Texto completoThomson, I. R. "Performance enhancing proxies and security". En IP over Satellite - The Next Generation: MPLS, VPN and DRM Delivered Services. IEE, 2003. http://dx.doi.org/10.1049/ic:20030055.
Texto completoKetel, Mohammed. "Enhancing BYOD Security Through SDN". En SoutheastCon 2018. IEEE, 2018. http://dx.doi.org/10.1109/secon.2018.8479230.
Texto completoFarinholt, Jacob M. y James E. Troupe. "Enhancing QKD security with weak measurements". En SPIE Security + Defence, editado por Mark T. Gruneisen, Miloslav Dusek y John G. Rarity. SPIE, 2016. http://dx.doi.org/10.1117/12.2241059.
Texto completoDulski, R., P. Powalisz, M. Kastek y P. Trzaskawka. "Enhancing image quality produced by IR cameras". En Security + Defence, editado por David A. Huckridge y Reinhard R. Ebert. SPIE, 2010. http://dx.doi.org/10.1117/12.864979.
Texto completoChaudhry, Yuvraj Singh, Upasana Sharma y Ajay Rana. "Enhancing Security Measures of AI Applications". En 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9197790.
Texto completoInformes sobre el tema "ENHANCING SECURITY"
Rowny, Edward L. SDI: Enhancing Security and Stability. Fort Belvoir, VA: Defense Technical Information Center, marzo de 1988. http://dx.doi.org/10.21236/ada351518.
Texto completoPregenzer, A. L. Enhancing regional security agreements through cooperative monitoring. Office of Scientific and Technical Information (OSTI), mayo de 1995. http://dx.doi.org/10.2172/79720.
Texto completoYunus, Sarıkaya y Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, julio de 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19167.
Texto completoYunus, Sarıkaya y Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, julio de 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19168.
Texto completoAlbek, Aminuddin. The ASEAN Political-Security Community: Enhancing Defense Cooperation. Fort Belvoir, VA: Defense Technical Information Center, diciembre de 2015. http://dx.doi.org/10.21236/ad1009058.
Texto completoResearch Institute (IFPRI), International Food Policy. Increasing agricultural productivity and enhancing food security in Africa. Washington, DC: International Food Policy Research Institute, 2012. http://dx.doi.org/10.2499/9780896297937.
Texto completoFritz, Tucker. Enhancing Reliability of Classified Shipments Between the Nuclear Security Enterprise. Office of Scientific and Technical Information (OSTI), marzo de 2020. http://dx.doi.org/10.2172/1764607.
Texto completoBarbeau, Sean. Enhancing Transit Safety and Security with Wireless Detection and Communication Technologies. Tampa, FL: University of South Florida, noviembre de 2008. http://dx.doi.org/10.5038/cutr-nctr-rr-2007-02.
Texto completoCruz, Alfredo, Jeff Duffany y Alexander Lopez. Enhancing Research in Networking & System Security, and Forensics, in Puerto Rico. Fort Belvoir, VA: Defense Technical Information Center, marzo de 2015. http://dx.doi.org/10.21236/ada622717.
Texto completoFuller, Rob. Resilience in Pakistan: Evaluation of enhancing food security and resilience of small-scale farmers. Oxfam GB, febrero de 2015. http://dx.doi.org/10.21201/2015.344180.
Texto completo