Letteratura scientifica selezionata sul tema "Security measures"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Security measures".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Security measures"

1

Dr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures". Indian Journal of Applied Research 4, n. 4 (1 ottobre 2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

D'souza, Jason John, e Seeza Franklin. "Li-Fi Security Issues and its Measures". International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (30 giugno 2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

McCathie, Andy. "Internet security fears prompt IT security measures". Network Security 2000, n. 5 (maggio 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Gupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar e Mohinder Singh. "Networking and Security Measures". DESIDOC Bulletin of Information Technology 24, n. 2 (1 marzo 2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Rushinek, Avi, e Sara Rushinek. "E-commerce security measures". Ubiquity 2002, November (novembre 2002): 1. http://dx.doi.org/10.1145/763944.763945.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Rushinek, Avi, e Sara Rushinek. "E-commerce security measures". Ubiquity 2002, November (novembre 2002): 1. http://dx.doi.org/10.1145/763948.763945.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Stanton, Ray. "Weighing up security measures". Computer Fraud & Security 2006, n. 1 (gennaio 2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Wood, Charles Cresson. "Floppy diskette security measures". Computers & Security 4, n. 3 (settembre 1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Li, Yan. "Network Security Protection Measures". Advanced Materials Research 971-973 (giugno 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.

Testo completo
Abstract (sommario):
Safety is the premise of network operation, network security is not only a single point of security, but the safety of the information network, need to be done from various solid protection. Analyzed the current form and face all kinds of LAN network security threats and network security precautions, technology, this paper expounds the LAN the importance of the current network security in our lives.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Valera, Jasmine P., e Sunguk Lee. "Security Measures in Overcoming Mobile IPv6 Security Issues". International Journal of Database Theory and Application 9, n. 7 (31 luglio 2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Tesi sul tema "Security measures"

1

Paul, Philip Christopher. "Microelectronic security measures". Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611689.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

King-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems". Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.

Testo completo
Abstract (sommario):
The phrase 'Internet of Things' refers to the pervasive instrumentation of physical objects with sensors and actuators, and the connection of those sensors and actuators to the Internet. These sensors and actuators are generally based on similar hardware as, and have similar capabilities to, wireless sensor network nodes. However, they operate in a completely different network environment: wireless sensor network nodes all generally belong to a single entity, whereas Internet of Things endpoints can belong to different, even competing, ones. This difference has profound implications for the design of security mechanisms in these environments. Wireless sensor network security is generally focused on defence against attack by external parties. On the Internet of Things, such an insider/outsider distinction is impossible; every entity is both an endpoint for legitimate communications, and a possible source of attack. We argue that that under such conditions, the centralised models that underpin current networking standards and protocols for embedded systems are simply not appropriate, because they require such an insider/outsider distinction. This thesis serves as an exposition in the design of decentralised security mechanisms, applied both to applications, which must perform access control, and networks, which must guarantee communications security. It contains three main contributions. The first is a threat model for Internet of Things networks. The second is BottleCap, a capability-based access control module, and an exemplar of decentralised security architecture at the application layer. The third is StarfishNet, a network-layer protocol for Internet of Things wireless networks, and a similar exemplar of decentralised security architecture at the network layer. Both are evaluated with microbenchmarks on prototype implementations; StarfishNet's association protocol is additionally validated using formal verification in the protocol verification tool Tamarin.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Santos, Alvaro K. "Economic aspects of airport security measures". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366334.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Kavuluru, Ramakanth. "ANALYSIS OF SECURITY MEASURES FOR SEQUENCES". UKnowledge, 2009. http://uknowledge.uky.edu/gradschool_diss/735.

Testo completo
Abstract (sommario):
Stream ciphers are private key cryptosystems used for security in communication and data transmission systems. Because they are used to encrypt streams of data, it is necessary for stream ciphers to use primitives that are easy to implement and fast to operate. LFSRs and the recently invented FCSRs are two such primitives, which give rise to certain security measures for the cryptographic strength of sequences, which we refer to as complexity measures henceforth following the convention. The linear (resp. N-adic) complexity of a sequence is the length of the shortest LFSR (resp. FCSR) that can generate the sequence. Due to the availability of shift register synthesis algorithms, sequences used for cryptographic purposes should have high values for these complexity measures. It is also essential that the complexity of these sequences does not decrease when a few symbols are changed. The k-error complexity of a sequence is the smallest value of the complexity of a sequence obtained by altering k or fewer symbols in the given sequence. For a sequence to be considered cryptographically ‘strong’ it should have both high complexity and high error complexity values. An important problem regarding sequence complexity measures is to determine good bounds on a specific complexity measure for a given sequence. In this thesis we derive new nontrivial lower bounds on the k-operation complexity of periodic sequences in both the linear and N-adic cases. Here the operations considered are combinations of insertions, deletions, and substitutions. We show that our bounds are tight and also derive several auxiliary results based on them. A second problem on sequence complexity measures useful in the design and analysis of stream ciphers is to determine the number of sequences with a given fixed (error) complexity value. In this thesis we address this problem for the k-error linear complexity of 2n-periodic binary sequences. More specifically: 1. We characterize 2n-periodic binary sequences with fixed 2- or 3-error linear complexity and obtain the counting function for the number of such sequences with fixed k-error linear complexity for k = 2 or 3. 2. We obtain partial results on the number of 2n-periodic binary sequences with fixed k-error linear complexity when k is the minimum number of changes required to lower the linear complexity.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Mohsen, Rabih. "Quantitative measures for code obfuscation security". Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/55180.

Testo completo
Abstract (sommario):
In this thesis we establish a quantitative framework to measure and study the security of code obfuscation, an effective software protection method that defends software against malicious reverse engineering. Despite the recent positive result by Garg et al.[GGH+13] that shows the possibility of obfuscating using indistinguishability obfuscation definition, code obfuscation has two major challenges: firstly, the lack of theoretical foundation that is necessary to define and reason about code obfuscation security; secondly, it is an open problem whether there exists security metrics that measure and certify the current state-of-the-art of code obfuscation techniques. To address these challenges, we followed a research methodology that consists of the following main routes: a formal approach to build a theory that captures, defines and measures the security of code obfuscation, and an experimental approach that provides empirical evidence about the soundness and validity of the proposed theory and metrics. To this end, we propose Algorithmic Information Theory, known as Kolmogorov complexity, as a theoretical and practical model to define, study, and measure the security of code obfuscation. We introduce the notion of unintelligibility, an intuitive way to define code obfuscation, and argue that it is not sufficient to capture the security of code obfuscation. We then present a more powerful security definition that is based on the algorithmic mutual information, and show that is able to effectively capture code obfuscation security. We apply our proposed definition to prove the possibility of obtaining security in code obfuscation under reasonable assumptions. We model adversaries with deobfuscation capabilities that explicitly realise the required properties for a successful deobfuscation attack. We build a quantitative model that comprises a set of security metrics, which are derived from our proposed theory and based on lossless compression, aiming to measure the quality of code obfuscation security. We propose normalised information distance NID as a metric to measure code obfuscation resilience, and establish the relation between our security definition and the normalised information distance. We show that if the security conditions for code obfuscations are satisfied (the extreme case) then the NID tends to be close to one, which is the maximum value that can be achieved. Finally, we provide an experimental evaluation to provide empirical validation for the proposed metrics. Our results show that the proposed measures are positively correlated with the degree of obfuscation resilience to an attacker using decompilers, i.e. the percentage of the clear code that was not recovered by an attacker, which indicates a positive relationship with the obfuscation resilience factor.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Cachin, Christian. "Entropy measures and unconditional security in cryptography /". [S.l.] : [s.n.], 1997. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=12187.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Rastogi, Rahul. "Information security service management : a service management approach to information security management". Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.

Testo completo
Abstract (sommario):
In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the organization. While some of the policies and controls are of a purely technical nature, many depend upon the actions of end-users. However, end-users are known to exhibit both compliant and noncompliant behaviours in respect of these information security policies and controls in the organization. Non-compliant information security behaviours of end-users have the potential to lead to information security breaches. Non-compliance thus needs to be controlled. The discipline of information security and its management have evolved over the years. However, the discipline has retained the technology-driven nature of its origin. In this context, the discipline has failed to adequately appreciate the role played by the end-users and the complexities of their behaviour, as it relates to information security policies and controls. The pervasive information security management philosophy is that of treating end-users as the enemy. Compliance is sought to be achieved through awareness programs, rewards, punishments and evermore strict policies and controls. This has led to a bureaucratic information security management approach. The philosophy of treating end-users as the enemy has had an adverse impact on information security in the organization. It can be said that rather than curbing non-compliance by end-users, the present-day bureaucratic approach to information security management has contributed to non-compliance. This thesis calls this the end-user crisis. This research aims at resolving this crisis by identifying an improved approach to information security management in the organization. This research has applied the service management approach to information security management. The resultant Information Security Service Management (ISSM) views end-users as assets and resources, and not as enemies. The central idea of ISSM is that the end-user is to be treated as a customer, whose needs are to be satisfied. This research presents ISSM. This research also presents the various components of ISSM to aid in its implementation in an organization.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Acharya, Gautam. "Legal aspects of aviation security measures taken at airports". Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98600.

Testo completo
Abstract (sommario):
Aviation and the internet are two conveniences without which the modern world would almost grind to a halt given our current dependence levels (on them). If both were to suddenly vanish, mankind would be thrown back to the late 19th century reminiscent of a world which was once a smaller place.
Aviation plays a critical role in our daily life transporting man and material over vast distances in a relatively short period of time. A vital cog in this wheel is the airport that 'facilitates' the safe loading, unloading, take-off and landing of aircraft.
For some time now, aircraft have been the target of various terrorist groups and militant factions seeking to make a point to the world in the most dramatic fashion possible. To maintain the security of civil aviation, laws have been promulgated (both nationally and internationally) to ensure that the perpetrators (of the crime) when caught, will be adequately punished and in a manner that will deter others from committing crimes against civil aviation. However this law-making process (in large part initiated by the International Civil Aviation Organization) has not sufficiently addressed airports and the security therein.
This paper seeks to examine---and in some cases suggest improvements to---aviation security laws at large, with a specific emphasis on airports. It is believed that a more comprehensive set of laws governing aviation security would result in greater efficacy of airport security procedures thus reducing the need for prospective judicial intervention and concomitant lengthy court proceedings.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Cioranu, Adrian Gabriel. "Facilitation versus security". Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99131.

Testo completo
Abstract (sommario):
The aviation industry is undeniably playing a very significant role in our day-to-day life. A vast and inter-connected web of flights ensures swift passenger travel and cargo traffic. However, in the name of security, otherwise intrinsic technicalities tend now not only to hinder on further development of aviation facilitation but also take over and lead towards the exact opposite result. What are the current measures taken by the international community to streamline passenger travel? What are the new initiatives which ought to be implemented? How is the future of aviation facilitation going to look like? How is it going to affect air travel and what legal implications is it rising? Throughout this thesis we will present the legal framework applicable to aviation facilitation and discuss the main initiatives that are being considered by ICAO and IATA in this respect. While Facilitation and Security should be considered as "two faces of the same coin", in reality they appear to "compete" against each other. Hence, we will provide our arguments in support of this theory.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Naude, Kevin Alexander. "Assessing program code through static structural similarity". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.

Testo completo
Abstract (sommario):
Learning to write software requires much practice and frequent assessment. Consequently, the use of computers to assist in the assessment of computer programs has been important in supporting large classes at universities. The main approaches to the problem are dynamic analysis (testing student programs for expected output) and static analysis (direct analysis of the program code). The former is very sensitive to all kinds of errors in student programs, while the latter has traditionally only been used to assess quality, and not correctness. This research focusses on the application of static analysis, particularly structural similarity, to marking student programs. Existing traditional measures of similarity are limiting in that they are usually only effective on tree structures. In this regard they do not easily support dependencies in program code. Contemporary measures of structural similarity, such as similarity flooding, usually rely on an internal normalisation of scores. The effect is that the scores only have relative meaning, and cannot be interpreted in isolation, ie. they are not meaningful for assessment. The SimRank measure is shown to have the same problem, but not because of normalisation. The problem with the SimRank measure arises from the fact that its scores depend on all possible mappings between the children of vertices being compared. The main contribution of this research is a novel graph similarity measure, the Weighted Assignment Similarity measure. It is related to SimRank, but derives propagation scores from only the locally optimal mapping between child vertices. The resulting similarity scores may be regarded as the percentage of mutual coverage between graphs. The measure is proven to converge for all directed acyclic graphs, and an efficient implementation is outlined for this case. Attributes on graph vertices and edges are often used to capture domain specific information which is not structural in nature. It has been suggested that these should influence the similarity propagation, but no clear method for doing this has been reported. The second important contribution of this research is a general method for incorporating these local attribute similarities into the larger similarity propagation method. An example of attributes in program graphs are identifier names. The choice of identifiers in programs is arbitrary as they are purely symbolic. A problem facing any comparison between programs is that they are unlikely to use the same set of identifiers. This problem indicates that a mapping between the identifier sets is required. The third contribution of this research is a method for applying the structural similarity measure in a two step process to find an optimal identifier mapping. This approach is both novel and valuable as it cleverly reuses the similarity measure as an existing resource. In general, programming assignments allow a large variety of solutions. Assessing student programs through structural similarity is only feasible if the diversity in the solution space can be addressed. This study narrows program diversity through a set of semantic preserving program transformations that convert programs into a normal form. The application of the Weighted Assignment Similarity measure to marking student programs is investigated, and strong correlations are found with the human marker. It is shown that the most accurate assessment requires that programs not only be compared with a set of good solutions, but rather a mixed set of programs of varying levels of correctness. This research represents the first documented successful application of structural similarity to the marking of student programs.
Gli stili APA, Harvard, Vancouver, ISO e altri

Libri sul tema "Security measures"

1

Wayne, Joanna. Security measures. Toronto: Harlequin, 2005.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Wayne, Joanna. Security Measures. Toronto, Ontario: Harlequin, 2005.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Hakim, Simon. Commercial security: Burglary patterns and security measures. Washington, DC (1801 K St., NW, Suite 1203L, Washington 20006-1301): Security Industry Association, 1994.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Parsons, Brinckerhoff Quade &. Douglas. Transportation security. Washington, D.C: Transportation Research Board, 2006.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Berger, David L. Industrial security. 2a ed. Boston, Mass: Butterworth Heinemann, 1999.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Corporation, Science Applications International. Security Measures for Ferry Systems. Washington, D.C.: Transportation Research Board, 2006. http://dx.doi.org/10.17226/13927.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Oram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Oram, Andrew. Beautiful security. Sebastopol, Calif: O'Reilly, 2009.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

United States. Federal Transit Administration., United States. Federal Highway Administration., National Research Council (U.S.). Transportation Research Board., National Cooperative Highway Research Program., Transit Cooperative Research Program, Transit Development Corporation e American Association of State Highway and Transportation Officials., a cura di. Transportation security. Washington, D.C: Transportation Research Board, 2006.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Halleen, Gary. Security monitoring with Cisco security MARS. Indianapolis, Ind: Cisco Press, 2007.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Capitoli di libri sul tema "Security measures"

1

Combs, Cynthia C. "Security Measures". In Terrorism in the Twenty-First Century, 386–419. 9a ed. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003211594-17.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Thompson, Eric C. "Selecting Security Measures". In Building a HIPAA-Compliant Cybersecurity Program, 27–51. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3060-2_3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Das, Satya P. "Security". In Economics of Terrorism and Counter-Terrorism Measures, 369–407. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96577-8_8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Brauner, Florian. "Acceptance of Security Measures". In Securing Public Transportation Systems, 33–113. Wiesbaden: Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-15306-9_4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

McLean, John. "Quantitative Measures of Security". In Dependable Computing and Fault-Tolerant Systems, 223–26. Vienna: Springer Vienna, 1995. http://dx.doi.org/10.1007/978-3-7091-9396-9_18.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Smoke, Richard. "Crisis Control Measures". In Nuclear Strategy and World Security, 28–39. London: Palgrave Macmillan UK, 1985. http://dx.doi.org/10.1007/978-1-349-17878-0_4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Martin, Paul. "In-trust measures". In Insider Risk and Personnel Security, 89–104. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-11.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Martin, Paul. "Pre-trust measures". In Insider Risk and Personnel Security, 76–88. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-10.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Beck, Adrian, e Andrew Willis. "Existing Security Measures: An Audit". In Crime and Security, 97–123. London: Palgrave Macmillan UK, 2006. http://dx.doi.org/10.1057/9780230377868_5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Combs, Cynthia C. "Security Measures: A Frail Defense". In Terrorism in the Twenty-First Century, 332–60. Eighth Edition. | New York : Routledge, 2018. | “First edition published by Pearson Education, Inc. 1997”—T.p. verso. | “Seventh edition published by Pearson Education, Inc. 2012 and Routledge 2016”—T.p. verso.: Routledge, 2017. http://dx.doi.org/10.4324/9781315617053-13.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Security measures"

1

Zheng, Xiaoxia. "Computer network security and measures". In Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

"Microarchitectures undo software security measures". In 2015 IEEE Hot Chips 27 Symposium (HCS). IEEE, 2015. http://dx.doi.org/10.1109/hotchips.2015.7477472.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Bramson, Aaron L. "Methodology for building confidence measures". In Defense and Security, a cura di Belur V. Dasarathy. SPIE, 2004. http://dx.doi.org/10.1117/12.542398.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Gupta, Sanyuj Singh, Abha Thakral e Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures". In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441710.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Gupta, Sanyuj Singh, Abha Thakral e Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures". In 2018 12th International Conference on Communications (COMM). IEEE, 2018. http://dx.doi.org/10.1109/iccomm.2018.8430168.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Liu, Shuiyin, Yi Hong e Emanuele Viterbo. "On measures of information theoretic security". In 2014 IEEE Information Theory Workshop (ITW). IEEE, 2014. http://dx.doi.org/10.1109/itw.2014.6970843.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Chaudhry, Yuvraj Singh, Upasana Sharma e Ajay Rana. "Enhancing Security Measures of AI Applications". In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9197790.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Gong, Guo-quan, Shuang Qiang e Jun Wang. "Information security measures and regulation research". In 2009 International Conference on Management Science and Engineering (ICMSE). IEEE, 2009. http://dx.doi.org/10.1109/icmse.2009.5317613.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Dadhich, Piyanka, M. C. Govil, Kamlesh Dutta, R. B. Patel e B. P. Singh. "Security Measures to Protect Mobile Agents". In INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10). AIP, 2010. http://dx.doi.org/10.1063/1.3526218.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Singh, Jagwinder, e Navneet Kaur. "Cloud computing: Security measures and applications". In ETLTC-ICETM2023 INTERNATIONAL CONFERENCE PROCEEDINGS: ICT Integration in Technical Education & Entertainment Technologies and Management. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0172172.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "Security measures"

1

Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), febbraio 1989. http://dx.doi.org/10.2172/6137987.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Santos, Ramon G. Confidence-Building Measures in Philippine Security. Fort Belvoir, VA: Defense Technical Information Center, maggio 1998. http://dx.doi.org/10.21236/ada345450.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Nathanson, David. Security and Stability Operations Measures of Effectiveness. Fort Belvoir, VA: Defense Technical Information Center, febbraio 2005. http://dx.doi.org/10.21236/ada464303.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Kelly, Luke. Evidence on Measures to Address Security in Camp Settings. Institute of Development Studies, marzo 2021. http://dx.doi.org/10.19088/k4d.2021.052.

Testo completo
Abstract (sommario):
This rapid literature review finds that authorities use a range of methods to reduce insecurity in camps. Security in camps can be addressed through better planning of services by camp management, by more involvement of refugees, and through the use of outside security support. However, the militarisation of camps is a broader problem that requires political support from a number of stakeholders. The review focuses on insecurity arising from conflict (militarisation) and from crime and disputes within and around camps. It starts from the position that camps for refugees or internally displaced persons (IDPs) should be ‘civilian and humanitarian in character’, and thus, they should not host active combatants or fighters or support conflict. The rights of camp residents - e.g. non-refoulment of refugees - should be respected. In the case of insecurity arising from crime and disputes within and around camps, security measures should be proportionate and consider refugee protection. This review surveys evaluations and academic papers on camp security management. There is a significant body of evidence on the problem of camp militarisation in settings including Zaire/DRC, Thailand, Lebanon and the former Yugoslavia. However, the review has found relatively little evidence on successful efforts to counter militarisation in cases of conflict. It has found case studies and evaluations of a number of programmes to improve lower-level camp security, or in cases where conflict has abated. There are several reviews of UNHCR ’security packages’ involving support to host state police in African countries. These lessons are focused on how to engage with refugee and host populations, as well as host states, and how to manage security services. Guidance on camp management is also surveyed. There is very little evidence discussing liaison arrangements beyond stating the need to provide protection training and oversight for security forces; and the need for principled engagement with states and non-state conflict parties.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Minchev, Zlatogor, e Ivan Gaydarski. Cyber risks, threats & security measures associated with COVID-19. Procon, 2020. http://dx.doi.org/10.11610/views.0037.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Mumford, Michael D., Theodore L. Gessner, Jennifer O'Connor, Mary S. Connelly e Timothy C. Clifton. Background Data Measures for Predicting Security Risks: A Construct Approach. Fort Belvoir, VA: Defense Technical Information Center, gennaio 1992. http://dx.doi.org/10.21236/ada245754.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Mancy, Mancy. mHealth: Review of Security & Privacy Measures of mHealth Apps. Ames (Iowa): Iowa State University, gennaio 2021. http://dx.doi.org/10.31274/cc-20240624-1001.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Mumford, Michael, Theodore L. Gessner, Jennifer A. O'Connor, Julie F. Johnson e Robert J. Holt. Background Data Measures for Predicting Security Risks: Assessment of Differential Moderators. Fort Belvoir, VA: Defense Technical Information Center, gennaio 1994. http://dx.doi.org/10.21236/ada280487.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Christie, Lorna, e Alison Tully. Security of UK Telecommunications. Parliamentary Office of Science and Technology, agosto 2018. http://dx.doi.org/10.58248/pn584.

Testo completo
Abstract (sommario):
Telecommunications networks are essential for the day-to-day running of UK businesses and public services, however, concerns have been raised recently over their security. This POSTnote outlines the threats to these networks, the ability of networks to cope with disruption, and possible protective measures.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Hoaglund, Robert, e Walter Gazda. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability. Fort Belvoir, VA: Defense Technical Information Center, gennaio 2007. http://dx.doi.org/10.21236/ada471403.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia