Articoli di riviste sul tema "Security measures"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Security measures".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Dr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures". Indian Journal of Applied Research 4, n. 4 (1 ottobre 2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.
Testo completoD'souza, Jason John, e Seeza Franklin. "Li-Fi Security Issues and its Measures". International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (30 giugno 2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.
Testo completoMcCathie, Andy. "Internet security fears prompt IT security measures". Network Security 2000, n. 5 (maggio 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Testo completoGupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar e Mohinder Singh. "Networking and Security Measures". DESIDOC Bulletin of Information Technology 24, n. 2 (1 marzo 2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.
Testo completoRushinek, Avi, e Sara Rushinek. "E-commerce security measures". Ubiquity 2002, November (novembre 2002): 1. http://dx.doi.org/10.1145/763944.763945.
Testo completoRushinek, Avi, e Sara Rushinek. "E-commerce security measures". Ubiquity 2002, November (novembre 2002): 1. http://dx.doi.org/10.1145/763948.763945.
Testo completoStanton, Ray. "Weighing up security measures". Computer Fraud & Security 2006, n. 1 (gennaio 2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.
Testo completoWood, Charles Cresson. "Floppy diskette security measures". Computers & Security 4, n. 3 (settembre 1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.
Testo completoLi, Yan. "Network Security Protection Measures". Advanced Materials Research 971-973 (giugno 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.
Testo completoValera, Jasmine P., e Sunguk Lee. "Security Measures in Overcoming Mobile IPv6 Security Issues". International Journal of Database Theory and Application 9, n. 7 (31 luglio 2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.
Testo completoKhabirov, Artur Ilfarovich, e Gulnara Mullanurovna Khamitova. "Security Measures and Liability Measures in Loan Agreements". Journal of Politics and Law 12, n. 5 (31 agosto 2019): 1. http://dx.doi.org/10.5539/jpl.v12n5p1.
Testo completoChristin, Nicolas. "The effectiveness of security measures". Communications of the ACM 65, n. 9 (settembre 2022): 92. http://dx.doi.org/10.1145/3547132.
Testo completoGupta, Anish, Vimal Bibhu e Rashid Hussain. "Security Measures in Data Mining". International Journal of Information Engineering and Electronic Business 4, n. 3 (1 luglio 2012): 34–39. http://dx.doi.org/10.5815/ijieeb.2012.03.05.
Testo completoUffen, Jörg, e Michael H. Breitner. "Management of Technical Security Measures". International Journal of Social and Organizational Dynamics in IT 3, n. 1 (gennaio 2013): 14–31. http://dx.doi.org/10.4018/ijsodit.2013010102.
Testo completoCourtney, Robert H. "Security Measures are Inherently Undesirable". EDPACS 13, n. 9 (marzo 1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Testo completoKeenan, Debra Palmer, Christine Olson, James C. Hersey e Sondra M. Parmer. "Measures of Food Insecurity/Security". Journal of Nutrition Education 33 (settembre 2001): S49—S58. http://dx.doi.org/10.1016/s1499-4046(06)60069-9.
Testo completoTREMBLAY, JEAN-FRANÇOIS. "SECURITY MEASURES IMPEDE U.S. VISITS". Chemical & Engineering News 81, n. 11 (17 marzo 2003): 40–41. http://dx.doi.org/10.1021/cen-v081n011.p040.
Testo completoFeher, Ben, Lior Sidi, Asaf Shabtai, Rami Puzis e Leonardas Marozas. "WebRTC security measures and weaknesses". International Journal of Internet Technology and Secured Transactions 8, n. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.092138.
Testo completoMarozas, Leonardas, Asaf Shabtai, Rami Puzis, Ben Feher e Lior Sidi. "WebRTC security measures and weaknesses". International Journal of Internet Technology and Secured Transactions 8, n. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.10013302.
Testo completoJ A, Smitha, Rakshith G Raj, Sumanth J Samuel e Pramath P Yaji. "Security Measures of Textual Data". International Journal of Innovative Research in Information Security 9, n. 03 (23 giugno 2023): 55–60. http://dx.doi.org/10.26562/ijiris.2023.v0903.01.
Testo completoKhan, Koffka. "Securing Immersive Realms: A Review of Security Measures in 360-Degree Virtual Reality Video Streaming". International Journal of Science and Research (IJSR) 12, n. 12 (5 dicembre 2023): 727–33. http://dx.doi.org/10.21275/sr231208045505.
Testo completoGadre, Monica. "Data Security in Cloud Security Attacks and Preventive Measures". International Journal for Research in Applied Science and Engineering Technology 6, n. 3 (31 marzo 2018): 529–36. http://dx.doi.org/10.22214/ijraset.2018.3085.
Testo completoKaliyamurthy, Nitheesh Murugan, Swapnesh Taterh e Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks". International Journal of Applied Metaheuristic Computing 10, n. 4 (ottobre 2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.
Testo completoPopescu, Mirona Ana Maria, Andreea Barbu, Petronela Cristina Simion e Georgiana Moiceanu. "Research on Data Security Measures in Romania". Proceedings of the International Conference on Business Excellence 18, n. 1 (1 giugno 2024): 3277–83. http://dx.doi.org/10.2478/picbe-2024-0267.
Testo completoSTUDENÁ, Jana. "Relation of freedom and security in measures of crisis management". Scientific Papers of Silesian University of Technology. Organization and Management Series 2017, n. 110 (2017): 179–90. http://dx.doi.org/10.29119/1641-3466.2017.110.17.
Testo completoS Kale, Rakesh. "The Vulnerabilities, Threats and Counter measures in Wireless Network Security". International Journal of Science and Research (IJSR) 12, n. 4 (5 aprile 2023): 1218–20. http://dx.doi.org/10.21275/mr23419121210.
Testo completoTorres, C. G., M. E. Turner, J. R. Harkess e G. R. Istre. "Security measures for AIDS and HIV." American Journal of Public Health 81, n. 2 (febbraio 1991): 210–11. http://dx.doi.org/10.2105/ajph.81.2.210.
Testo completoZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures". Applied Mechanics and Materials 433-435 (ottobre 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Testo completoDamoah, Dominic, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-Sam e Brighter Agyeman. "Improving Security Measures on Grid Computing". International Journal of Computer Applications 83, n. 9 (18 dicembre 2013): 6–11. http://dx.doi.org/10.5120/14474-2490.
Testo completoRudakova, O. Yu, T. A. Rudakova e I. N. Sannikova. "Spatial measures for ensuring economic security". National Interests: Priorities and Security 16, n. 1 (16 gennaio 2020): 44–59. http://dx.doi.org/10.24891/ni.16.1.44.
Testo completoPevnev, Volodimir, e Serhii Kapchynskyi. "DATABASE SECURITY: THREATS AND PREVENTIVE MEASURES". Advanced Information Systems 2, n. 1 (27 maggio 2018): 69–72. http://dx.doi.org/10.20998/2522-9052.2018.1.13.
Testo completoBenjamin, John, G. Sirmans e Emily Zietz. "Security Measures and the Apartment Market". Journal of Real Estate Research 14, n. 3 (1 gennaio 1997): 347–58. http://dx.doi.org/10.1080/10835547.1997.12090900.
Testo completoFUJITA, Shintaro, e Kenji SAWADA. "Security Measures Technology for Control Systems". Journal of The Institute of Electrical Engineers of Japan 142, n. 4 (1 aprile 2022): 212–14. http://dx.doi.org/10.1541/ieejjournal.142.212.
Testo completoLittlewood, Bev, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid e Dieter Gollmann. "Towards Operational Measures of Computer Security". Journal of Computer Security 2, n. 2-3 (1 aprile 1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Testo completoWalsh, Matthew, e William Streilein. "Security Measures for Safeguarding the Bioeconomy". Health Security 18, n. 4 (1 agosto 2020): 313–17. http://dx.doi.org/10.1089/hs.2020.0029.
Testo completoSchuldt, Alison. "Security measures at the nuclear pore". Nature Cell Biology 6, n. 2 (febbraio 2004): 91. http://dx.doi.org/10.1038/ncb0204-91.
Testo completoSchroden, Jonathan J. "Measures for Security in a Counterinsurgency". Journal of Strategic Studies 32, n. 5 (ottobre 2009): 715–44. http://dx.doi.org/10.1080/01402390903189394.
Testo completoAlessi, Dario R., e Yogesh Kulathu. "Security measures of a master regulator". Nature 497, n. 7448 (maggio 2013): 193–94. http://dx.doi.org/10.1038/nature12101.
Testo completoKITAURA, Shigeru, e Sumiaki OHOTUYAMA. "Verification about security measures for derailment". Proceedings of the Transportation and Logistics Conference 2017.26 (2017): 1018. http://dx.doi.org/10.1299/jsmetld.2017.26.1018.
Testo completoAndrews, Christine. "Improving data security measures in business". Computer Fraud & Security 2009, n. 8 (agosto 2009): 8–10. http://dx.doi.org/10.1016/s1361-3723(09)70099-5.
Testo completoHorak, O. J. "Means and Measures for Data Security". IFAC Proceedings Volumes 22, n. 19 (dicembre 1989): 1–6. http://dx.doi.org/10.1016/s1474-6670(17)52787-1.
Testo completoCollinson, Helen. "Win 95 security measures mollify users". Computers & Security 15, n. 2 (gennaio 1996): 125–26. http://dx.doi.org/10.1016/0167-4048(96)89336-9.
Testo completoCieśla, Rafał. "Security measures in combating document falsifiers". Nowa Kodyfikacja Prawa Karnego 44 (29 dicembre 2017): 41–53. http://dx.doi.org/10.19195/2084-5065.44.4.
Testo completoSahoo, Chinmayee. "Cloud Computing And Its Security Measures". International Journal of Electronics Engineering and Applications VIII, n. I (1 giugno 2020): 10. http://dx.doi.org/10.30696/ijeea.viii.i.2020.10-19.
Testo completoAlfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, n. 6 (novembre 2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.
Testo completoGeorgieva, Natasha, e Hadji Krsteski. "Anti-corruption measures for corporate security". Journal of Process Management. New Technologies 5, n. 2 (2017): 75–82. http://dx.doi.org/10.5937/jouproman5-13490.
Testo completoSaarnio, Juha, e Neeli R. Prasad. "Foolproof Security Measures and Challenges Within". Wireless Personal Communications 29, n. 1/2 (aprile 2004): 1–3. http://dx.doi.org/10.1023/b:wire.0000037572.29470.27.
Testo completoChatterjee, Samrat, Stephen C. Hora e Heather Rosoff. "Portfolio Analysis of Layered Security Measures". Risk Analysis 35, n. 3 (8 dicembre 2014): 459–75. http://dx.doi.org/10.1111/risa.12303.
Testo completoАндрей Викторович, Борисов,. "Criminological measures to ensure transport security". Вестник Московской академии Следственного комитета Российской Федерации, n. 3(33) (1 settembre 2022): 76–86. http://dx.doi.org/10.54217/2588-0136.2022.33.3.007.
Testo completoO’shea, Timothy C. "The efficacy of home security measures". American Journal of Criminal Justice 24, n. 2 (marzo 2000): 155–67. http://dx.doi.org/10.1007/bf02887589.
Testo completo