Artículos de revistas sobre el tema "Security threats"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Security threats".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Isokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain." Teisė 122 (March 30, 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.
Texto completoA. K. Bagdat and Z. M. Alimzhanova. "INFORMATION SECURITY THREATS FOR INTEGRATION SYSTEMS." Bulletin of Toraighyrov University. Physics & Mathematics series, no. 4.2024 (December 30, 2024): 20–29. https://doi.org/10.48081/dfqb8925.
Texto completoPrayuda, Rendi, Fitrisia Munir, Riezki Adma Jayandi, Dini Tiara Sasmi, Cifebrima Suyastri, and Rio Sundari. "The Global Pandemic of COVID-19 as a Non-Traditional Security Threat in Indonesia." Andalas Journal of International Studies (AJIS) 11, no. 1 (May 30, 2022): 63. http://dx.doi.org/10.25077/ajis.11.1.63-77.2022.
Texto completoPASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (August 11, 2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.
Texto completoTanvir Rahman Akash, Nusrat Jahan Sany, Lamia Akter, and Sanjida Akter Sarna. "Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights." Journal of Computer Science and Technology Studies 7, no. 4 (May 12, 2025): 248–63. https://doi.org/10.32996/jcsts.2025.7.3.90.
Texto completoSaddam RA, Angga Pranata, Sugiono, Rizki Zulanggara, Nur Halimah, Sri Nur H, Rosdiana SM, Nurhalim, and Aprina Handayani. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (June 30, 2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.
Texto completoJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (December 20, 2013): 6. http://dx.doi.org/10.33317/ssurj.v3i1.62.
Texto completoPOPESCU, Eliza-Elena. "VoIP Security Threats." International Journal of Information Security and Cybercrime 13, no. 1 (June 28, 2024): 66–70. http://dx.doi.org/10.19107/ijisc.2024.01.06.
Texto completoJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (December 20, 2013): 6. http://dx.doi.org/10.33317/ssurj.62.
Texto completoSaptono, Edy, Ribka Keiza, and Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia." Technium Social Sciences Journal 23 (September 9, 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.
Texto completoSyomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.
Texto completoSliusarenko, Iryna. "Essentiality and Classification of International Security Threats at the Global Level (Based on Resolutions of the UN General Assembly First Committee, 2014–2021)." International Relations: Theory and Practical Aspects, no. 13 (June 26, 2024): 57–70. https://doi.org/10.31866/2616-745X.13.2024.306861.
Texto completoAyub, Kamran, and Roushdy Alshawa. "Threat Modelling and Security Enhancements in Wireless Body Area Networks for Smart Healthcare." Journal of Robotics and Automation Research 5, no. 3 (December 31, 2024): 01–08. https://doi.org/10.33140/jrar.05.03.09.
Texto completoSyed, Farzana Zaheer, and Saba Javed. "Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan." International Journal of Social Sciences and Management 4, no. 4 (October 30, 2017): 267–74. http://dx.doi.org/10.3126/ijssm.v4i4.18503.
Texto completoPendergrass, John C., Karen Heart, C. Ranganathan, and V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine." International Journal of Healthcare Information Systems and Informatics 9, no. 4 (October 2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.
Texto completoKarpavičiūtė, Ieva. "Securitization and Lithuania’s National Security Change." Lithuanian Foreign Policy Review 36, no. 1 (December 20, 2017): 9–33. http://dx.doi.org/10.1515/lfpr-2017-0005.
Texto completoBeladiya, Vandan, and Mihir Sontakke. "Cyber Security SOC Analyst." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (March 31, 2025): 2409–12. https://doi.org/10.22214/ijraset.2025.67835.
Texto completoAlbarrak, Khalied M. "Securing the Future of Web-Enabled IoT: A Critical Analysis of Web of Things Security." Applied Sciences 14, no. 23 (November 23, 2024): 10867. http://dx.doi.org/10.3390/app142310867.
Texto completoSri, Kanth Mandru. "Explainable AI for Endpoint Security Threat Analysis." European Journal of Advances in Engineering and Technology 11, no. 1 (January 31, 2024): 56–63. https://doi.org/10.5281/zenodo.13325168.
Texto completoSmirnov, R. A., and S. N. Novikov. "Research on Information Security Risk Assessment Techniques." Interexpo GEO-Siberia 6 (May 18, 2022): 250–57. http://dx.doi.org/10.33764/2618-981x-2022-6-250-257.
Texto completoHojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (August 1, 2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.
Texto completoBatham, Diksha, Ghanshyam Prasad Dubey, Mohini Sharma, Shailendra Mourya, Ashish Singh, and Anushka Sharma. "Mobile Security – Light on Security Threats." International Journal of Emerging Technology and Advanced Engineering 14, no. 2 (June 22, 2024): 25–34. https://doi.org/10.46338/ijetae0224_04.
Texto completoMuliński, Tomasz. "ICT security in revenue administration - incidents, security incidents - detection, response, resolve." Studia Informatica. System and information technology 27, no. 2 (January 11, 2023): 75–93. http://dx.doi.org/10.34739/si.2022.27.04.
Texto completoTanwar, Prof Rakesh. "Cyber Security Challenges." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (January 31, 2025): 564–66. https://doi.org/10.22214/ijraset.2025.66263.
Texto completoصادق, بارزان. "Internal Security Threats on the Kurdistan Region – Iraq." Journal for Political and Security Studies 3, no. 6 (December 1, 2020): 84–130. http://dx.doi.org/10.31271/jopss.10040.
Texto completoKoper-Staszowska, Wioletta. "Security versus Threat – Interrelations." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 3 (October 30, 2018): 22–25. http://dx.doi.org/10.5604/01.3001.0012.7517.
Texto completoBiehun, Anatolii, Olha Osypova, Maksym Plakhtii, and Oleksandr Urdenko. "The analysis of external and internal threats of electronic ticket functioning at entertainment events." Modeling and Information Systems in Economics, no. 101 (December 1, 2021): 20–31. https://doi.org/10.33111/mise.101.3.
Texto completoAliyu Yauri, Bashir, and Joshua Abah. "Mitigating Security Threats in Virtualized Environments." International Journal of Scientific Engineering and Research 3, no. 5 (May 27, 2015): 86–92. https://doi.org/10.70729/ijser15175.
Texto completoBari, Ahamed Basha Abdul. "Healthcare Facilities and Cyber Security Threats." Chettinad Health City Medical Journal 11, no. 04 (December 31, 2022): 1. http://dx.doi.org/10.24321/2278.2044.202232.
Texto completoJaźwiński, Ireneusz. "Economic Security Threats. Determinants of State Functioning and Economic Policy." Przegląd Strategiczny, no. 16 (January 22, 2024): 77–88. http://dx.doi.org/10.14746/ps.2023.1.6.
Texto completoGuchua, Alika, and Thornike Zedelashvili. "Cyberwar as a Phenomenon of Asymmetric Threat and Cyber-Nuclear Security Threats." Історико-політичні проблеми сучасного світу, no. 40 (December 15, 2019): 50–57. http://dx.doi.org/10.31861/mhpi2019.40.50-57.
Texto completoSmalii, O. B. "A general description of threats to european security at the threshold of the 21st century." Legal horizons, no. 21 (2020): 148–52. http://dx.doi.org/10.21272/legalhorizons.2020.i21.p148.
Texto completoMeland, Per Håkon, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, and Paolo Giorgini. "Threat Analysis in Goal-Oriented Security Requirements Modelling." International Journal of Secure Software Engineering 5, no. 2 (April 2014): 1–19. http://dx.doi.org/10.4018/ijsse.2014040101.
Texto completoDervišević, Tarik, Sabina Baraković, and Jasmina Baraković Husić. "Case Study: Security of System for Remote Management of Windows." B&H Electrical Engineering 14, no. 2 (December 1, 2020): 4–12. http://dx.doi.org/10.2478/bhee-2020-0007.
Texto completoYarovenko, Hanna. "Evaluating the threat to national information security." Problems and Perspectives in Management 18, no. 3 (September 9, 2020): 195–210. http://dx.doi.org/10.21511/ppm.18(3).2020.17.
Texto completoJenab, Kouroush, Sam Khoury, and Kim LaFevor. "Flow-Graph and Markovian Methods for Cyber Security Analysis." International Journal of Enterprise Information Systems 12, no. 1 (January 2016): 59–84. http://dx.doi.org/10.4018/ijeis.2016010104.
Texto completoLe, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (March 30, 2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Texto completoWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (November 1, 2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.pp258-267.
Texto completoWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (November 1, 2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.p258-267.
Texto completoWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (November 1, 2023): 258–67. https://doi.org/10.11591/csit.v4i3.pp258-267.
Texto completoКлимов, Д. В. "External threats to enterprise security." Экономика и предпринимательство, no. 2(115) (May 6, 2020): 805–7. http://dx.doi.org/10.34925/eip.2020.115.2.161.
Texto completoIhor, Ya. Kulyniak, H. Bondarenko Yuliia, and I. Zhygalo Ivan. "Theoretical aspects of the essence and relationship between the shadow economy and the financial and economic security of the state." Economic journal Odessa polytechnic university 1, no. 11 (January 28, 2020): 29–39. https://doi.org/10.5281/zenodo.3975502.
Texto completoGould, David. "Organizational Resilience Approaches to Cyber Security." International Journal of Smart Education and Urban Society 9, no. 4 (October 2018): 53–62. http://dx.doi.org/10.4018/ijseus.2018100105.
Texto completoAbhiram reddy bommareddy. "AI-Enhanced Microservice Security in Cloud-Based Financial Platforms: A Case Study of AWS Implementation." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (December 5, 2024): 1268–79. https://doi.org/10.32628/cseit241061171.
Texto completoMaher, Zulfikar Ahmed, Ali Ghulam, Muhammad Yaqoob Koondhar, Iftekhar Ahmed Mahar, and Mansoor Hyder. "Security Based SCURM Process (SUBSCRUM) For Secure Agile Development." VFAST Transactions on Software Engineering 12, no. 3 (September 8, 2024): 138–46. http://dx.doi.org/10.21015/vtse.v12i3.1893.
Texto completoSri, Kanth Mandru. "Explainable AI for Endpoint Security Threat Analysis." European Journal of Advances in Engineering and Technology 11, no. 1 (January 31, 2024): 56–63. https://doi.org/10.5281/zenodo.13253288.
Texto completoShammugam, Inthrani, Ganthan Narayana Samy, Pritheega Magalingam, Nurazean Maarop, Sundresan Perumal, and Shanmugam6 Bharanidharan. "Information security threats encountered by Malaysian public sector data centers." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (March 1, 2021): 1820–29. https://doi.org/10.11591/ijeecs.v21.i3.pp1820-1829.
Texto completoJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "2 Wireless Security Threats." Sir Syed Research Journal of Engineering & Technology 1, no. 1 (December 20, 2013): 6. http://dx.doi.org/10.33317/ssurj.v1i1.62.
Texto completoKopczewski, Marian, Zbigniew Ciekanowski, Julia Nowicka, and Katarzyna Bakalarczyk-Burakowska. "Security threats in cyberspace." Scientific Journal of the Military University of Land Forces 205, no. 3 (September 23, 2022): 415–26. http://dx.doi.org/10.5604/01.3001.0016.0040.
Texto completoBahgat, Gawdat. "Oil security: Potential threats." Contemporary Security Policy 19, no. 2 (August 1998): 71–90. http://dx.doi.org/10.1080/13523269808404191.
Texto completo