Littérature scientifique sur le sujet « ENHANCING SECURITY »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « ENHANCING SECURITY ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "ENHANCING SECURITY"

1

J, Stephen, et Vidyavati Ramteke. « Enhancing Security Issues in Online Games ». Journal of Advanced Research in Dynamical and Control Systems 12, no 8 (19 août 2020) : 95–103. http://dx.doi.org/10.5373/jardcs/v12i8/20202451.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Haedar Akib,, Lutfi Saefullah, Husain Syam, Hamsu Abdul Gani,. « ENHANCING MARITIME SECURITY COOPERATION ». Psychology and Education Journal 58, no 2 (10 février 2021) : 4769–75. http://dx.doi.org/10.17762/pae.v58i2.2868.

Texte intégral
Résumé :
Seaborne trade is an important component of world trade by which, Indonesia’s water becomes very important and vital in contributing to the world economy. Notwithstanding the strategic meaning of Indonesian water to the World, Indonesian water is still the full responsibility of Indonesia. Indonesia has made substantial and sustained efforts to maintain the safety and security of its sea lanes of communication by updating paper charts, installing navigational aids, broadcasting maritime hazards and weather forecasts, and patrolling certain areas. These efforts show that Indonesia, somewhat, has undertaken its obligations in taking care of the international community interests. Nevertheless, user states and other ships which use chokepoints within Indonesia’ water and derive significant benefits within sometimes do not realize as such. Therefore, this article on the results of normative research aims to explain the need to increase maritime security cooperation as a precondition for achieving the common goals of countries that utilize Indonesian waters and surrounding countries as a route of transportation, trade, cultural exchange, science and civilization.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Shonola, Shaibu Adekunle, et Mike Joy. « Enhancing Mobile Learning Security ». International Journal on Integrating Technology in Education 5, no 3 (30 septembre 2016) : 01–15. http://dx.doi.org/10.5121/ijite.2016.5301.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Hudson, R. B. « Enhancing Elderly Financial Security ». Public Policy & ; Aging Report 19, no 3 (1 juin 2009) : 2. http://dx.doi.org/10.1093/ppar/19.3.2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Pangalos, G., M. Khair et L. Bozios. « Enhancing medical database security ». Journal of Medical Systems 18, no 4 (août 1994) : 159–71. http://dx.doi.org/10.1007/bf00996700.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Wilkinson, Paul. « Enhancing global aviation security ? » Terrorism and Political Violence 10, no 3 (septembre 1998) : 147–66. http://dx.doi.org/10.1080/09546559808427475.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Arazi, B. « Enhancing Security with Nanotechnology ». Computer 39, no 10 (octobre 2006) : 106–7. http://dx.doi.org/10.1109/mc.2006.338.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

van der Meer, Sico. « Enhancing International Cyber Security ». Security and Human Rights 26, no 2-4 (7 décembre 2015) : 193–205. http://dx.doi.org/10.1163/18750230-02602004.

Texte intégral
Résumé :
Cyber aggression is an increasing threat to international security and stability. While national policies intended to deter cyber aggression may offer some solution in the short term, their effects in the long term are doubtful. National cyber-deterrence policies entail the risk of an on-going cyber arms race and a cycle of escalation between potential cyber opponents. Diplomacy may offer fewer results in the short term, but it is more promising in the long term. Confidence-building measures and international norms and values may not be easy to reach, but in the end they could be more effective (and cheaper) than a single focus on national cyber-deterrence strategies. In the long term, cooperation between states to establish confidence and commonly accepted norms of behaviour in cyber space are the most promising ways available to achieve enduring cyber security and stability. Enhancing interstate co-operation, transparency and predictability of behaviour in cyberspace will reduce the risks of misperception, escalation and conflict.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Hnamte, Vanlalruata, Jamal Hussain, Samuel Lalmuanawma, Chhakchhuak Lalrinawma et Lalchhanhima Hmar. « Enhancing Secured Network Slicer for Cloud Security Systems ». Indian Journal Of Science And Technology 16, sp1 (3 octobre 2023) : 179–91. http://dx.doi.org/10.17485/ijst/v16sp1.msc25.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Modares, Hero, Amirhossein Moravejosharieh, Rosli Bin Salleh et Jaime Lloret. « Enhancing Security in Mobile IPv6 ». ETRI Journal 36, no 1 (1 février 2014) : 51–61. http://dx.doi.org/10.4218/etrij.14.0113.0177.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "ENHANCING SECURITY"

1

Zhang, Linfan, et Shuang Zheng. « Enhancing QR Code Security ». Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-14145.

Texte intégral
Résumé :
Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come after. We also give an objective evaluation on the outcome in comparison to existing QR products. They are based on the purpose of enhancing QR code security and aim to interpret how we have tackle the specified problems meanwhile to suggest possible further work for bringing security of QR code to a higher level.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Yue, Chuan. « Enhancing Web Browsing Security ». W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623575.

Texte intégral
Résumé :
Web browsing has become an integral part of our lives, and we use browsers to perform many important activities almost everyday and everywhere. However, due to the vulnerabilities in Web browsers and Web applications and also due to Web users' lack of security knowledge, browser-based attacks are rampant over the Internet and have caused substantial damage to both Web users and service providers. Enhancing Web browsing security is therefore of great need and importance.;This dissertation concentrates on enhancing the Web browsing security through exploring and experimenting with new approaches and software systems. Specifically, we have systematically studied four challenging Web browsing security problems: HTTP cookie management, phishing, insecure JavaScript practices, and browsing on untrusted public computers. We have proposed new approaches to address these problems, and built unique systems to validate our approaches.;To manage HTTP cookies, we have proposed an approach to automatically validate the usefulness of HTTP cookies at the client-side on behalf of users. By automatically removing useless cookies, our approach helps a user to strike an appropriate balance between maximizing usability and minimizing security risks. to protect against phishing attacks, we have proposed an approach to transparently feed a relatively large number of bogus credentials into a suspected phishing site. Using those bogus credentials, our approach conceals victims' real credentials and enables a legitimate website to identify stolen credentials in a timely manner. to identify insecure JavaScript practices, we have proposed an execution-based measurement approach and performed a large-scale measurement study. Our work sheds light on the insecure JavaScript practices and especially reveals the severity and nature of insecure JavaScript inclusion and dynamic generation practices on the Web. to achieve secure and convenient Web browsing on untrusted public computers, we have proposed a simple approach that enables an extended browser on a mobile device and a regular browser on a public computer to collaboratively support a Web session. A user can securely perform sensitive interactions on the mobile device and conveniently perform other browsing interactions on the public computer.
Styles APA, Harvard, Vancouver, ISO, etc.
3

H, Fruchter Nathaniel. « Enhancing ISP-consumer security notifications ». Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122916.

Texte intégral
Résumé :
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2019
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 79-85).
Security notification schemes hold great promise for improving both consumer cybersecurity and general network health as malware and other sources of malicious activity are becoming more prevalent on home networks. For example, botnets of Internet of Things devices engage in denial of service (DoS) attacks and ransomware holds data on personal and commercial systems hostage. Many of these threats are relatively opaque for an end user. An end user may not know that their smart device is participating in a DoS attack at all, unless they notice a protracted slowdown in network speeds. An upstream network provider like a consumer ISP has more visibility into the issue. Due to their privileged position, ISPs often have more data about the status of a malware infection, denial of service attack, or other malicious activity. This extra information can be of great benefit for the purposes of notification. For instance, an ISP may be able to notify a customer that a device on their network is being used for a DoS attackor that they see communication with a server involved in distributing ransomware. ISPs and other organizations that try and implement these schemes often run into a set of questions: How do I get the right data to power the notification? How do I ensure the user trusts the notification? Can I ensure the notification is not spoofed? Is there an optimal way to present the notification? How do I make sure a user takes the proper remedial action? This thesis presents a framework for new notification schemes to answer these questions by examining four key elements of a notification: form, delivery, and content. It also proposes multi-factor verification, a novel scheme to address trust and spoofing issues within a notification scheme. Finally, it provides a model for a new ISP-user security notification scheme within the context of the United States market and policy landscape.
by Nathaniel H. Fruchter.
S.M. in Technology and Policy
S.M.inTechnologyandPolicy Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program
Styles APA, Harvard, Vancouver, ISO, etc.
4

Mohammed, Ali, Sachin Sama et Majeed Mohammed. « Enhancing Network Security in Linux Environment ». Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17144.

Texte intégral
Résumé :
Designing a secured network is the most important task in any enterprise or organization development. Securing a network mainly involves applying policies and procedures to protect different network devices from unauthorized access. Servers such as web servers, file servers, mail servers, etc., are the important devices in a network. Therefore, securing these servers is the first and foremost step followed in every security implementation mechanism. To implement this, it is very important to analyse and study the security mechanisms provided by the operating system. This makes it easier for security implementation in a network. This thesis work demonstrates the tasks needed to enhance the network security in Linux environment. The various security modules existing in Linux makes it different from other operating systems. The security measures which are mainly needed to enhance the system security are documented as a baseline for practical implementation. After analysing the security measures for implementing network security, it is important to understand the role of network monitoring tools and Linux inbuilt log management in maintaining the security of a network. This is accomplished by presenting a detailed discussion on network monitoring tools and log management in Linux. In order to test the network security, a network is designed using Linux systems by configuring different servers and application firewall for packet filtering. The security measures configured on each server to enhance its security are presented as part of the implementation. The results obtained while an unauthorized user accessing the servers from the external network are also documented along with attack information retrieved by different network monitoring tools and Linux inbuilt log messages.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Liu, Ying. « Enhancing security for XML Web services ». Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27531.

Texte intégral
Résumé :
The XML-based interoperable characteristics make enhancing security for XML Web Services a lot different from that of the traditional network-based applications. SSL VPN gateways are usually used to provide security for traditional network-based applications, but not for Web Services. This thesis presents an integrated security solution for securing both traditional network-based applications and Web Services. The integrated security solution includes a VPN framework and a Web Services framework. Considering that we have already had an SSL VPN gateway developed by our lab, we take it as the motherboard of the solution and the VPN server of the gateway as the security functional part of the VPN framework. As the highlight of this thesis project, a Web Services security component, also the security functional part of the Web Services framework, has been developed, implemented and integrated with the SSL VPN gateway to get the integrated security solution. The problem of applying ECC over binary fields for XML security, SOAP message security and Web Services security to make the Web Services security component share the same set of ECC keys with the VPN server on the gateway has been studied. Tools for reading ECC keys and certificates from the BUL's key files have been developed. Methods to adopt the ECC key files to ensure security of Web Services have also been developed. To the best of our knowledge, there is no previous work on adopting ECC keys over binary fields for Web Services security. The integrated security solution we present in this thesis is the prototype of a network device that has functions of three gateways: a VPN gateway, a Web Services security gateway and a Web Services gateway.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Kadhum, Hamza. « Enhancing Zigbee Security for Industrial Implementation ». Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279559.

Texte intégral
Résumé :
Zigbee network is a popular choice for deploying low power personal area network (LoWPAN). The application areas vary but the most popular are industrial area monitoring and home automation. But Zigbee has been identified to have weak security and is not applicable for industrial implementation. This paper is collaboration with Ericsson to investigate Zigbee network security and implementation. This paper will cover security solutions for Zigbee and touch on how to configure Zigbee network such that it can operate for a long period of time without battery changes. The security solutions will demonstrate how public-key respective symmetric key algorithm can be used for enhancing Zigbee security such that it provide authentication and authorization of joining devices while maintaining confidentiality and integrity of the network communication. Security solutions will also take regards to the power consumption of each proposed solution. For the network configuration part of the thesis, it will present node lifetime for different network configuration, i.e. how polling period between each message will affect the total cur- rent consumption of a node and how the joining procedure, depending on the security solution will affect the total node lifetime. Achieving longer node lifetime is desired because it is assumed that the network will be deployed in remote and unfavorable areas. The result of this paper compares different solutions for enhancing the security. Further, it concludes that Zigbee security with authentication and authorization of joining devices is reached through secret-splitting key establishment - which is the best solution. This is possible while maintaining low power consumption in the network.
Zigbee nätverk är ett populärt val vid uppsättning av ett nätverk med låg strömförbrukning. Zigbees användningsområde är olika men den är väldigt populär inom industriell områdesövervakning och hemautomation. Däremot har Zigbees säkerhet varit en nackdel, då det har framkommit att den inte möter kraven för industriell användning. Arbetet kom till genom ett samarbete med Ericsson och KTH för att undersöka Zigbee nätverks implementation och säkerhet. Arbetet bearbetar olika säkerhetslösningar för Zigbee nätverk och hur den kan implementeras för att uppnå långtidsanvändning utan batteribyte. Säkerhetslösningar bygger på public-key samt symmetric key kryptografi algoritmer för att förbättra och öka Zigbees säkerhet genom autentisering och tillåtelse av noder som ansluter sig till nätverket. Nätverkets konfiguration för långtidsanvändning redovisas genom att jämföra olika polling tidsintervaller mellan meddelanden. Långtidsanvändning utan batteribyte är viktigt för att nätverket kommer implementeras i ett avlägset område som är svåråtkomlig. Arbetet redovisar och jämföra olika lösningar för att öka säkerheten för Zigbee nätverk. Den optimala lösningen för att uppnå autentisering samt tillåtelse av noder som ansluter sig uppnås med nyckel skapande genom secret-splitting metoden. Metoden följer NIST rekommendationer och anses vara säker, därav uppfyller den kraven för industriell implementation. Nätverkets säkerhet ökar samt bibehåller ett nätverk med låg strömförbrukning.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Makkar, Ankush. « Enhancing IoT Security Using 5G Capabilities ». Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85109.

Texte intégral
Résumé :
Internet of Things (IoT) is an ecosystem comprises CT (Communication Technology),IT (Information Technology) and sometime OT (Operational Technologies) wheredifferent machines and devices can interact with each other and exchange useful datawhich can be processed using different IoT applications to take decisions and performrequired actions. Number of IoT devices and IoT networks are growing exponentially.Security is of utmost importance and without proper security implementation, IoTNetworks with billions of devices will be hacked and used as botnets which can createdisaster. The new IoT use cases cannot be realized using the current communicationtechnologies due to the QoS (Quality of Service) and business requirements. 5Gnetwork are designed keeping IoT use cases in mind and with the development of 5Gnetwork, it will be easier to implement more secured IoT network and enable differentIoT use cases which are not feasible today.To build the future IoT networks with 5G, it’s important to study and understand 5Gsecurity features. Security is perceived as one of the most important considerationwhile building IoT solutions and to implement 5G network for IoT solutions require anoverall understanding of 5G security features. In the thesis, work have been done toidentify the gap in the current research with respect to 5G security features anddescribe 5G features that will enhance IoT security. After identifying key 5G securityfeatures, the implementation of the identified 5G security features will be describedwith the 5G based smart grid and smart factory use cases. The key finding is howdifferent 5G security capabilities secure IoT communication and another importantfinding is that not all security capabilities are applicable to all IoT use cases. Hence,security capabilities to be used based on the 5G use case requirement.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Fekete, Florian. « Civil-military relations : enhancing international security ». Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FFekete.pdf.

Texte intégral
Résumé :
Thesis (M.A. in International Security and Civil-Military Relations)--Naval Postgraduate School, March 2003.
Thesis advisor(s): Donald Abenheim, Karen Guttieri. Includes bibliographical references (p. 65-70). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Kirkham, E., et C. Flew. « Strengthening embargoes and enhancing human security ». Thesis, International Alert, Saferworld and University of Bradford, Department of Peace Studies, Centre for International Co-operation and Security, 2003. http://hdl.handle.net/10454/4275.

Texte intégral
Résumé :
yes
Arms embargoes are one of the principal tools of states in seeking to prevent, limit and bring an end to armed conflict and human rights abuses. Despite the frequency with which arms embargoes have been imposed, there are significant problems with their implementation. Pressure is therefore growing for the international governmental community to act in order to ensure that the political commitment embodied by the imposition of arms embargoes is matched by the commitment to ensure their rigorous enforcement and to achieve enhanced human security on the ground. Increasing the effectiveness of arms embargoes is a specific aim of the United Nations Programme of Action for Preventing and Combating the Illicit Trade in Small Arms and Light Weapons in All Its Aspects1 which specifically calls upon states "To take appropriate measures, including all legal or administrative means, against any activity that violates a United Nations Security Council arms embargo in accordance with the Charter of the United Nations".2 Accordingly, within the context of the implementation of the UN PoA, the overall aim of this paper is to explore ways in which the international community can act in order to strengthen the impact of arms embargoes and enhance human security. It will begin by examining the purposes, processes and effects relating to arms embargoes, with particular attention to those agreed at international (UN) level, and by highlighting issues of concern in each regard. An overview of the main issues and challenges facing implementation of arms embargoes will include the elaboration of three case-study examples showing the impact of UN arms embargoes on the availability of arms and on human security and a further five that illustrate the dilemmas faced by states in seeking to implement arms embargoes. Priority areas for attention in any international effort to strengthen the effectiveness of arms embargoes will be followed by more extensive proposals for enhancing international embargo regimes within the context of implementing the UN PoA. Whilst it is recognised that the UN PoA contains measures that relate only to the illicit trade in small arms and light weapons (SALW), if implemented fully, many of these would serve to strengthen the international apparatus of control, information exchange and provision of assistance relating to arms proliferation and misuse as a whole. In turn, this would greatly enhance the implementation of UN arms embargoes. Therefore, as well as providing an opportunity for reviewing progress on implementing the PoA, the first Biennial Meeting of States in July 2003 is clearly a major opportunity for states to address a number of the pressing challenges facing states in the implementation of UN embargoes.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Lee, Man Hee. « Architectural support for enhancing security in clusters ». [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2889.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "ENHANCING SECURITY"

1

Cuthbertson, Ian M., et David Robertson. Enhancing European Security. London : Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Shultz, George Pratt. Enhancing diplomatic security. Washington, D.C : U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1986.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Rowny, Edward L. SDI, enhancing security and stability. Washington, D.C : U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Rowny, Edward L. SDI, enhancing security and stability. Washington, D.C : U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Rowny, Edward L. SDI, enhancing security and stability. Washington, D.C : U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Rao, Vemuri V., dir. Enhancing computer security with smart technology. Boca Raton, FL : Auerbach Publications, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

United States. Congressional Budget Office., dir. Enhancing U.S. security through foreign aid. Washington, D.C : Congress of the U.S., Congressional Budget Office., 1994.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

United States. Congressional Budget Office., dir. Enhancing U.S. security through foreign aid. Washington, D.C : Congress of the U.S., Congressional Budget Office., 1994.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

United States. Congressional Budget Office, dir. Enhancing U.S. security through foreign aid. Washington, D.C : Congress of the U.S., Congressional Budget Office., 1994.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

United States. Congressional Budget Office, dir. Enhancing U.S. security through foreign aid. Washington, D.C : Congress of the U.S., Congressional Budget Office., 1994.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "ENHANCING SECURITY"

1

Coffin, David. « Enhancing Security ». Dans Expert Oracle and Java Security, 267–328. Berkeley, CA : Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3832-4_11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Cuthbertson, Ian M., et David Robertson. « Security Through Behavioral Modification ». Dans Enhancing European Security, 186–206. London : Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Cuthbertson, Ian M., et David Robertson. « Introduction ». Dans Enhancing European Security, 3–21. London : Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Cuthbertson, Ian M., et David Robertson. « Arms Control and All That ». Dans Enhancing European Security, 166–85. London : Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_10.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Cuthbertson, Ian M., et David Robertson. « Combining Control and Enhancement ». Dans Enhancing European Security, 207–16. London : Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Cuthbertson, Ian M., et David Robertson. « Why Was INF Needed, and Would It Have Been Used ? » Dans Enhancing European Security, 23–35. London : Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Cuthbertson, Ian M., et David Robertson. « Conventional Force Imbalances : How to Count, and Can We Count ? » Dans Enhancing European Security, 36–53. London : Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Cuthbertson, Ian M., et David Robertson. « Conventional Force Imbalances : The Numbers ». Dans Enhancing European Security, 54–66. London : Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Cuthbertson, Ian M., et David Robertson. « Is There a Special European Interest in European Security ? » Dans Enhancing European Security, 67–106. London : Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Cuthbertson, Ian M., et David Robertson. « Is There a Pan-European Special Interest ? » Dans Enhancing European Security, 107–25. London : Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "ENHANCING SECURITY"

1

Zisiadis, Dimitris, Spyros Kopsidas, Argyris Varalis et Leandros Tassiulas. « Enhancing WPS security ». Dans 2012 IFIP Wireless Days (WD). IEEE, 2012. http://dx.doi.org/10.1109/wd.2012.6402836.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Fall, Moustapha, Chris Chuvalas, Nolan Warning, Max Rabiee et Carla Purdy. « Enhancing SCADA System Security ». Dans 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2020. http://dx.doi.org/10.1109/mwscas48704.2020.9184532.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Singh, Arun Kumar, Shefalika Ghosh Samaddar et Arun K. Misra. « Enhancing VPN security through security policy management ». Dans 2012 1st International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2012. http://dx.doi.org/10.1109/rait.2012.6194494.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Priyanka, S. Sharon, et B. Nagajayanthi. « Enhancing security in Bluetooth networks ». Dans 2014 International Conference on Science Engineering and Management Research (ICSEMR). IEEE, 2014. http://dx.doi.org/10.1109/icsemr.2014.7043560.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Tamaki, Kiyoshi. « Enhancing implementation security of QKD ». Dans Quantum Technologies and Quantum Information Science, sous la direction de Mark T. Gruneisen, Miloslav Dusek et John G. Rarity. SPIE, 2017. http://dx.doi.org/10.1117/12.2280737.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Thomson, I. R. « Performance enhancing proxies and security ». Dans IP over Satellite - The Next Generation : MPLS, VPN and DRM Delivered Services. IEE, 2003. http://dx.doi.org/10.1049/ic:20030055.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Ketel, Mohammed. « Enhancing BYOD Security Through SDN ». Dans SoutheastCon 2018. IEEE, 2018. http://dx.doi.org/10.1109/secon.2018.8479230.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Farinholt, Jacob M., et James E. Troupe. « Enhancing QKD security with weak measurements ». Dans SPIE Security + Defence, sous la direction de Mark T. Gruneisen, Miloslav Dusek et John G. Rarity. SPIE, 2016. http://dx.doi.org/10.1117/12.2241059.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Dulski, R., P. Powalisz, M. Kastek et P. Trzaskawka. « Enhancing image quality produced by IR cameras ». Dans Security + Defence, sous la direction de David A. Huckridge et Reinhard R. Ebert. SPIE, 2010. http://dx.doi.org/10.1117/12.864979.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Chaudhry, Yuvraj Singh, Upasana Sharma et Ajay Rana. « Enhancing Security Measures of AI Applications ». Dans 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9197790.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "ENHANCING SECURITY"

1

Rowny, Edward L. SDI : Enhancing Security and Stability. Fort Belvoir, VA : Defense Technical Information Center, mars 1988. http://dx.doi.org/10.21236/ada351518.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Pregenzer, A. L. Enhancing regional security agreements through cooperative monitoring. Office of Scientific and Technical Information (OSTI), mai 1995. http://dx.doi.org/10.2172/79720.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Yunus, Sarıkaya, et Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, juillet 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19167.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Yunus, Sarıkaya, et Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, juillet 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19168.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Albek, Aminuddin. The ASEAN Political-Security Community : Enhancing Defense Cooperation. Fort Belvoir, VA : Defense Technical Information Center, décembre 2015. http://dx.doi.org/10.21236/ad1009058.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Research Institute (IFPRI), International Food Policy. Increasing agricultural productivity and enhancing food security in Africa. Washington, DC : International Food Policy Research Institute, 2012. http://dx.doi.org/10.2499/9780896297937.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Fritz, Tucker. Enhancing Reliability of Classified Shipments Between the Nuclear Security Enterprise. Office of Scientific and Technical Information (OSTI), mars 2020. http://dx.doi.org/10.2172/1764607.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Barbeau, Sean. Enhancing Transit Safety and Security with Wireless Detection and Communication Technologies. Tampa, FL : University of South Florida, novembre 2008. http://dx.doi.org/10.5038/cutr-nctr-rr-2007-02.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Cruz, Alfredo, Jeff Duffany et Alexander Lopez. Enhancing Research in Networking & ; System Security, and Forensics, in Puerto Rico. Fort Belvoir, VA : Defense Technical Information Center, mars 2015. http://dx.doi.org/10.21236/ada622717.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Fuller, Rob. Resilience in Pakistan : Evaluation of enhancing food security and resilience of small-scale farmers. Oxfam GB, février 2015. http://dx.doi.org/10.21201/2015.344180.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie