Articoli di riviste sul tema "Security threats"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Security threats".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Isokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain". Teisė 122 (30 marzo 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.
Testo completoPASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY". STRATEGIES XXI - Command and Staff College 17, n. 1 (11 agosto 2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.
Testo completoJilani, Umair, Muhammad Umar Khan, Adnan Afroz e Khawaja Masood Ahmed. "Wireless Security Threats". Sir Syed University Research Journal of Engineering & Technology 3, n. 1 (20 dicembre 2013): 6. http://dx.doi.org/10.33317/ssurj.v3i1.62.
Testo completoSaptono, Edy, Ribka Keiza e Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia". Technium Social Sciences Journal 23 (9 settembre 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.
Testo completoSyomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities". Actual problems of innovative economy, n. 3 (30 maggio 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.
Testo completoSyed, Farzana Zaheer, e Saba Javed. "Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan". International Journal of Social Sciences and Management 4, n. 4 (30 ottobre 2017): 267–74. http://dx.doi.org/10.3126/ijssm.v4i4.18503.
Testo completoPendergrass, John C., Karen Heart, C. Ranganathan e V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine". International Journal of Healthcare Information Systems and Informatics 9, n. 4 (ottobre 2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.
Testo completoKarpavičiūtė, Ieva. "Securitization and Lithuania’s National Security Change". Lithuanian Foreign Policy Review 36, n. 1 (20 dicembre 2017): 9–33. http://dx.doi.org/10.1515/lfpr-2017-0005.
Testo completoHojda, Mihaela Hortensia. "Information security economics: cyber security threats". Proceedings of the International Conference on Business Excellence 16, n. 1 (1 agosto 2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.
Testo completoصادق, بارزان. "Internal Security Threats on the Kurdistan Region – Iraq". Journal for Political and Security Studies 3, n. 6 (1 dicembre 2020): 84–130. http://dx.doi.org/10.31271/jopss.10040.
Testo completoSmirnov, R. A., e S. N. Novikov. "Research on Information Security Risk Assessment Techniques". Interexpo GEO-Siberia 6 (18 maggio 2022): 250–57. http://dx.doi.org/10.33764/2618-981x-2022-6-250-257.
Testo completoKoper-Staszowska, Wioletta. "Security versus Threat – Interrelations". ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, n. 3 (30 ottobre 2018): 22–25. http://dx.doi.org/10.5604/01.3001.0012.7517.
Testo completoSmalii, O. B. "A general description of threats to european security at the threshold of the 21st century". Legal horizons, n. 21 (2020): 148–52. http://dx.doi.org/10.21272/legalhorizons.2020.i21.p148.
Testo completoYarovenko, Hanna. "Evaluating the threat to national information security". Problems and Perspectives in Management 18, n. 3 (9 settembre 2020): 195–210. http://dx.doi.org/10.21511/ppm.18(3).2020.17.
Testo completoMeland, Per Håkon, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz e Paolo Giorgini. "Threat Analysis in Goal-Oriented Security Requirements Modelling". International Journal of Secure Software Engineering 5, n. 2 (aprile 2014): 1–19. http://dx.doi.org/10.4018/ijsse.2014040101.
Testo completoLe, Ngoc Thuy, e Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security". Journal of Telecommunications and the Digital Economy 7, n. 1 (30 marzo 2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Testo completoDervišević, Tarik, Sabina Baraković e Jasmina Baraković Husić. "Case Study: Security of System for Remote Management of Windows". B&H Electrical Engineering 14, n. 2 (1 dicembre 2020): 4–12. http://dx.doi.org/10.2478/bhee-2020-0007.
Testo completoJenab, Kouroush, Sam Khoury e Kim LaFevor. "Flow-Graph and Markovian Methods for Cyber Security Analysis". International Journal of Enterprise Information Systems 12, n. 1 (gennaio 2016): 59–84. http://dx.doi.org/10.4018/ijeis.2016010104.
Testo completoMalviya, Deepak Kumar, e Umesh Kumar Lilhore. "Survey on Security Threats in Cloud Computing". International Journal of Trend in Scientific Research and Development Volume-3, Issue-1 (31 dicembre 2018): 1222–26. http://dx.doi.org/10.31142/ijtsrd19172.
Testo completoPolikanov, Dmitry. "Russia’s Perception and Hierarchy of Security Threats". Connections: The Quarterly Journal 04, n. 2 (2005): 85–91. http://dx.doi.org/10.11610/connections.04.2.11.
Testo completoGuchua, Alika, e Thornike Zedelashvili. "Cyberwar as a Phenomenon of Asymmetric Threat and Cyber-Nuclear Security Threats". Історико-політичні проблеми сучасного світу, n. 40 (15 dicembre 2019): 50–57. http://dx.doi.org/10.31861/mhpi2019.40.50-57.
Testo completoJilani, Umair, Muhammad Umar Khan, Adnan Afroz e Khawaja Masood Ahmed. "2 Wireless Security Threats". Sir Syed Research Journal of Engineering & Technology 1, n. 1 (20 dicembre 2013): 6. http://dx.doi.org/10.33317/ssurj.v1i1.62.
Testo completoKopczewski, Marian, Zbigniew Ciekanowski, Julia Nowicka e Katarzyna Bakalarczyk-Burakowska. "Security threats in cyberspace". Scientific Journal of the Military University of Land Forces 205, n. 3 (23 settembre 2022): 415–26. http://dx.doi.org/10.5604/01.3001.0016.0040.
Testo completoBahgat, Gawdat. "Oil security: Potential threats". Contemporary Security Policy 19, n. 2 (agosto 1998): 71–90. http://dx.doi.org/10.1080/13523269808404191.
Testo completoVelinov, Nikola, e Stephan Janouch. "Combating Evolving Security Threats". New Electronics 53, n. 10 (26 maggio 2020): 22–23. http://dx.doi.org/10.12968/s0047-9624(22)61260-4.
Testo completoGould, David. "Organizational Resilience Approaches to Cyber Security". International Journal of Smart Education and Urban Society 9, n. 4 (ottobre 2018): 53–62. http://dx.doi.org/10.4018/ijseus.2018100105.
Testo completoKaduszkiewicz, Marcin. "The National Map of Security Threats as a tool to monitor security and public order". Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 31, n. 31 (28 settembre 2018): 81–92. http://dx.doi.org/10.5604/01.3001.0012.8596.
Testo completoTkachuk, Natalia. "Analytical Component in Institutional Providing of Ukraine National Security Risks and Threats Assessment". Information Security of the Person, Society and State, n. 28-30 (15 dicembre 2020): 38–44. http://dx.doi.org/10.51369/2707-7276-2020-(1-3)-5.
Testo completoSuroto, Suroto. "WLAN Security: Threats And Countermeasures". JOIV : International Journal on Informatics Visualization 2, n. 4 (27 giugno 2018): 232. http://dx.doi.org/10.30630/joiv.2.4.133.
Testo completoTheron, Julien. "Networks of Threats: Interconnection, Interaction, Intermediation". Journal of Strategic Security 14, n. 3 (ottobre 2021): 45–69. http://dx.doi.org/10.5038/1944-0472.14.3.1942.
Testo completoSun, Lei, Qin Sheng Du e Lu Tan. "Cloud Security Threats Distribution Technology Research". Applied Mechanics and Materials 727-728 (gennaio 2015): 934–36. http://dx.doi.org/10.4028/www.scientific.net/amm.727-728.934.
Testo completoKovpak, Olena. "TOOLS OF COUNTERACTION OF BUDGET SECTOR DEVELOPMENT THREATS". Economic Analysis, n. 27(3) (2017): 31–36. http://dx.doi.org/10.35774/econa2017.03.031.
Testo completoIlvonen, Ilona, e Pasi Virtanen. "Preparing for Cyber Threats with Information Security Policies". International Journal of Cyber Warfare and Terrorism 3, n. 4 (ottobre 2013): 22–31. http://dx.doi.org/10.4018/ijcwt.2013100103.
Testo completoJ., Waweru, e Dr Anita Kiamba. "Wildlife Security and International Relations". International Journal of Research and Innovation in Social Science 06, n. 10 (2022): 720–24. http://dx.doi.org/10.47772/ijriss.2022.61035.
Testo completoGreaves, Wilfrid. "Climate change and security in Canada". International Journal: Canada's Journal of Global Policy Analysis 76, n. 2 (giugno 2021): 183–203. http://dx.doi.org/10.1177/00207020211019325.
Testo completoRizal, Muhamad, e Yanyan Yani. "Cybersecurity Policy and Its Implementation in Indonesia". JAS (Journal of ASEAN Studies) 4, n. 1 (9 agosto 2016): 61. http://dx.doi.org/10.21512/jas.v4i1.967.
Testo completoMelnyk, Dmytro. "Current Threats to the National Security of Ukraine in the Field of Information: Issues of dentification and Counteraction". Information Security of the Person, Society and State, n. 31-33 (20 dicembre 2021): 16–27. http://dx.doi.org/10.51369/2707-7276-2021-(1-3)-2.
Testo completoZeng, Min, Chuanzhou Dian e Yaoyao Wei. "Risk Assessment of Insider Threats Based on IHFACS-BN". Sustainability 15, n. 1 (28 dicembre 2022): 491. http://dx.doi.org/10.3390/su15010491.
Testo completoEl-Bakkouri, N., e T. Mazri. "SECURITY THREATS IN SMART HEALTHCARE". ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIV-4/W3-2020 (23 novembre 2020): 209–14. http://dx.doi.org/10.5194/isprs-archives-xliv-4-w3-2020-209-2020.
Testo completoJoseph, Juliet Eileen. "SADC and ECOWAS’S peace and security architecture preparedness and the COVID-19 pandemic". EUREKA: Social and Humanities, n. 1 (28 gennaio 2022): 16–30. http://dx.doi.org/10.21303/2504-5571.2022.002248.
Testo completoBabenko, Aleksey, e Svetlana Kozunova. "The Model of Information Security Threat Profile of Corporate Information System". NBI Technologies, n. 1 (agosto 2018): 6–11. http://dx.doi.org/10.15688/nbit.jvolsu.2018.1.1.
Testo completoZoidov, K. Kh, e E. N. Zimenkova. "On Threats to the Economic Security of the Republic of Crimea". Economics and Management, n. 9 (7 novembre 2019): 23–33. http://dx.doi.org/10.35854/1998-1627-2019-9-23-33.
Testo completoAntonova, Olena. "MAIN THREATS TO THE FORMATION OF THE SECURITY SYSTEM OF BANKS CREDIT ACTIVITIES". Actual Problems of Economics 1, n. 223 (22 gennaio 2020): 55–72. http://dx.doi.org/10.32752/1993-6788-2020-1-223-55-72.
Testo completoZhang, Shuqin, Guangyao Bai, Hong Li, Peipei Liu, Minzhi Zhang e Shujun Li. "Multi-Source Knowledge Reasoning for Data-Driven IoT Security". Sensors 21, n. 22 (15 novembre 2021): 7579. http://dx.doi.org/10.3390/s21227579.
Testo completoWENDT, Jan A. "CRITICAL ASSESSMENT OF THE OPERATION OF THE STATE SECURITY SYSTEMS IN POLAND". Revista Română de Geografie Politică 24, n. 2 (30 dicembre 2022): 74–81. http://dx.doi.org/10.30892/rrgp.242105-360.
Testo completoFebriana, Henny, Dewi Sartika Br Ginting, Fuzy Yustika Manik e Mahyuddin. "The Applied Aproach Impact Information Security For Government and Company (A Review)". Data Science: Journal of Computing and Applied Informatics 6, n. 1 (21 marzo 2022): 45–54. http://dx.doi.org/10.32734/jocai.v6.i1-7935.
Testo completoForca, Božidar, Dragoljub Sekulović e Igor Vukonjanski. "Actual Challenges, Risks and Security Safety". Security science journal 1, n. 1 (31 luglio 2020): 65–83. http://dx.doi.org/10.37458/ssj.1.1.6.
Testo completoZharkov, Grigory, e Vadim Shevtsov. "Analysis of Information Threats to Industrial Security". NBI Technologies, n. 2 (dicembre 2020): 6–10. http://dx.doi.org/10.15688/nbit.jvolsu.2020.2.1.
Testo completoHENTZ, JAMES J. "The Southern African security order: regional economic integration and security among developing states". Review of International Studies 35, S1 (febbraio 2009): 189–213. http://dx.doi.org/10.1017/s0260210509008481.
Testo completoBojanić, Dragan. "The theoretical and methodological analysis of challenges, risks and threats in modern theory of national security". Vojno delo 74, n. 2 (2022): 1–17. http://dx.doi.org/10.5937/vojdelo2202001b.
Testo completo