Literatura científica selecionada sobre o tema "Security measures"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Security measures".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Security measures"

1

Dr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures". Indian Journal of Applied Research 4, n.º 4 (1 de outubro de 2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

D'souza, Jason John, e Seeza Franklin. "Li-Fi Security Issues and its Measures". International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (30 de junho de 2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

McCathie, Andy. "Internet security fears prompt IT security measures". Network Security 2000, n.º 5 (maio de 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Gupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar e Mohinder Singh. "Networking and Security Measures". DESIDOC Bulletin of Information Technology 24, n.º 2 (1 de março de 2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Rushinek, Avi, e Sara Rushinek. "E-commerce security measures". Ubiquity 2002, November (novembro de 2002): 1. http://dx.doi.org/10.1145/763944.763945.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Rushinek, Avi, e Sara Rushinek. "E-commerce security measures". Ubiquity 2002, November (novembro de 2002): 1. http://dx.doi.org/10.1145/763948.763945.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Stanton, Ray. "Weighing up security measures". Computer Fraud & Security 2006, n.º 1 (janeiro de 2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Wood, Charles Cresson. "Floppy diskette security measures". Computers & Security 4, n.º 3 (setembro de 1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Li, Yan. "Network Security Protection Measures". Advanced Materials Research 971-973 (junho de 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.

Texto completo da fonte
Resumo:
Safety is the premise of network operation, network security is not only a single point of security, but the safety of the information network, need to be done from various solid protection. Analyzed the current form and face all kinds of LAN network security threats and network security precautions, technology, this paper expounds the LAN the importance of the current network security in our lives.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Valera, Jasmine P., e Sunguk Lee. "Security Measures in Overcoming Mobile IPv6 Security Issues". International Journal of Database Theory and Application 9, n.º 7 (31 de julho de 2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Teses / dissertações sobre o assunto "Security measures"

1

Paul, Philip Christopher. "Microelectronic security measures". Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611689.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

King-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems". Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.

Texto completo da fonte
Resumo:
The phrase 'Internet of Things' refers to the pervasive instrumentation of physical objects with sensors and actuators, and the connection of those sensors and actuators to the Internet. These sensors and actuators are generally based on similar hardware as, and have similar capabilities to, wireless sensor network nodes. However, they operate in a completely different network environment: wireless sensor network nodes all generally belong to a single entity, whereas Internet of Things endpoints can belong to different, even competing, ones. This difference has profound implications for the design of security mechanisms in these environments. Wireless sensor network security is generally focused on defence against attack by external parties. On the Internet of Things, such an insider/outsider distinction is impossible; every entity is both an endpoint for legitimate communications, and a possible source of attack. We argue that that under such conditions, the centralised models that underpin current networking standards and protocols for embedded systems are simply not appropriate, because they require such an insider/outsider distinction. This thesis serves as an exposition in the design of decentralised security mechanisms, applied both to applications, which must perform access control, and networks, which must guarantee communications security. It contains three main contributions. The first is a threat model for Internet of Things networks. The second is BottleCap, a capability-based access control module, and an exemplar of decentralised security architecture at the application layer. The third is StarfishNet, a network-layer protocol for Internet of Things wireless networks, and a similar exemplar of decentralised security architecture at the network layer. Both are evaluated with microbenchmarks on prototype implementations; StarfishNet's association protocol is additionally validated using formal verification in the protocol verification tool Tamarin.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Santos, Alvaro K. "Economic aspects of airport security measures". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366334.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Kavuluru, Ramakanth. "ANALYSIS OF SECURITY MEASURES FOR SEQUENCES". UKnowledge, 2009. http://uknowledge.uky.edu/gradschool_diss/735.

Texto completo da fonte
Resumo:
Stream ciphers are private key cryptosystems used for security in communication and data transmission systems. Because they are used to encrypt streams of data, it is necessary for stream ciphers to use primitives that are easy to implement and fast to operate. LFSRs and the recently invented FCSRs are two such primitives, which give rise to certain security measures for the cryptographic strength of sequences, which we refer to as complexity measures henceforth following the convention. The linear (resp. N-adic) complexity of a sequence is the length of the shortest LFSR (resp. FCSR) that can generate the sequence. Due to the availability of shift register synthesis algorithms, sequences used for cryptographic purposes should have high values for these complexity measures. It is also essential that the complexity of these sequences does not decrease when a few symbols are changed. The k-error complexity of a sequence is the smallest value of the complexity of a sequence obtained by altering k or fewer symbols in the given sequence. For a sequence to be considered cryptographically ‘strong’ it should have both high complexity and high error complexity values. An important problem regarding sequence complexity measures is to determine good bounds on a specific complexity measure for a given sequence. In this thesis we derive new nontrivial lower bounds on the k-operation complexity of periodic sequences in both the linear and N-adic cases. Here the operations considered are combinations of insertions, deletions, and substitutions. We show that our bounds are tight and also derive several auxiliary results based on them. A second problem on sequence complexity measures useful in the design and analysis of stream ciphers is to determine the number of sequences with a given fixed (error) complexity value. In this thesis we address this problem for the k-error linear complexity of 2n-periodic binary sequences. More specifically: 1. We characterize 2n-periodic binary sequences with fixed 2- or 3-error linear complexity and obtain the counting function for the number of such sequences with fixed k-error linear complexity for k = 2 or 3. 2. We obtain partial results on the number of 2n-periodic binary sequences with fixed k-error linear complexity when k is the minimum number of changes required to lower the linear complexity.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Mohsen, Rabih. "Quantitative measures for code obfuscation security". Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/55180.

Texto completo da fonte
Resumo:
In this thesis we establish a quantitative framework to measure and study the security of code obfuscation, an effective software protection method that defends software against malicious reverse engineering. Despite the recent positive result by Garg et al.[GGH+13] that shows the possibility of obfuscating using indistinguishability obfuscation definition, code obfuscation has two major challenges: firstly, the lack of theoretical foundation that is necessary to define and reason about code obfuscation security; secondly, it is an open problem whether there exists security metrics that measure and certify the current state-of-the-art of code obfuscation techniques. To address these challenges, we followed a research methodology that consists of the following main routes: a formal approach to build a theory that captures, defines and measures the security of code obfuscation, and an experimental approach that provides empirical evidence about the soundness and validity of the proposed theory and metrics. To this end, we propose Algorithmic Information Theory, known as Kolmogorov complexity, as a theoretical and practical model to define, study, and measure the security of code obfuscation. We introduce the notion of unintelligibility, an intuitive way to define code obfuscation, and argue that it is not sufficient to capture the security of code obfuscation. We then present a more powerful security definition that is based on the algorithmic mutual information, and show that is able to effectively capture code obfuscation security. We apply our proposed definition to prove the possibility of obtaining security in code obfuscation under reasonable assumptions. We model adversaries with deobfuscation capabilities that explicitly realise the required properties for a successful deobfuscation attack. We build a quantitative model that comprises a set of security metrics, which are derived from our proposed theory and based on lossless compression, aiming to measure the quality of code obfuscation security. We propose normalised information distance NID as a metric to measure code obfuscation resilience, and establish the relation between our security definition and the normalised information distance. We show that if the security conditions for code obfuscations are satisfied (the extreme case) then the NID tends to be close to one, which is the maximum value that can be achieved. Finally, we provide an experimental evaluation to provide empirical validation for the proposed metrics. Our results show that the proposed measures are positively correlated with the degree of obfuscation resilience to an attacker using decompilers, i.e. the percentage of the clear code that was not recovered by an attacker, which indicates a positive relationship with the obfuscation resilience factor.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Cachin, Christian. "Entropy measures and unconditional security in cryptography /". [S.l.] : [s.n.], 1997. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=12187.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Rastogi, Rahul. "Information security service management : a service management approach to information security management". Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.

Texto completo da fonte
Resumo:
In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the organization. While some of the policies and controls are of a purely technical nature, many depend upon the actions of end-users. However, end-users are known to exhibit both compliant and noncompliant behaviours in respect of these information security policies and controls in the organization. Non-compliant information security behaviours of end-users have the potential to lead to information security breaches. Non-compliance thus needs to be controlled. The discipline of information security and its management have evolved over the years. However, the discipline has retained the technology-driven nature of its origin. In this context, the discipline has failed to adequately appreciate the role played by the end-users and the complexities of their behaviour, as it relates to information security policies and controls. The pervasive information security management philosophy is that of treating end-users as the enemy. Compliance is sought to be achieved through awareness programs, rewards, punishments and evermore strict policies and controls. This has led to a bureaucratic information security management approach. The philosophy of treating end-users as the enemy has had an adverse impact on information security in the organization. It can be said that rather than curbing non-compliance by end-users, the present-day bureaucratic approach to information security management has contributed to non-compliance. This thesis calls this the end-user crisis. This research aims at resolving this crisis by identifying an improved approach to information security management in the organization. This research has applied the service management approach to information security management. The resultant Information Security Service Management (ISSM) views end-users as assets and resources, and not as enemies. The central idea of ISSM is that the end-user is to be treated as a customer, whose needs are to be satisfied. This research presents ISSM. This research also presents the various components of ISSM to aid in its implementation in an organization.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Acharya, Gautam. "Legal aspects of aviation security measures taken at airports". Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98600.

Texto completo da fonte
Resumo:
Aviation and the internet are two conveniences without which the modern world would almost grind to a halt given our current dependence levels (on them). If both were to suddenly vanish, mankind would be thrown back to the late 19th century reminiscent of a world which was once a smaller place.
Aviation plays a critical role in our daily life transporting man and material over vast distances in a relatively short period of time. A vital cog in this wheel is the airport that 'facilitates' the safe loading, unloading, take-off and landing of aircraft.
For some time now, aircraft have been the target of various terrorist groups and militant factions seeking to make a point to the world in the most dramatic fashion possible. To maintain the security of civil aviation, laws have been promulgated (both nationally and internationally) to ensure that the perpetrators (of the crime) when caught, will be adequately punished and in a manner that will deter others from committing crimes against civil aviation. However this law-making process (in large part initiated by the International Civil Aviation Organization) has not sufficiently addressed airports and the security therein.
This paper seeks to examine---and in some cases suggest improvements to---aviation security laws at large, with a specific emphasis on airports. It is believed that a more comprehensive set of laws governing aviation security would result in greater efficacy of airport security procedures thus reducing the need for prospective judicial intervention and concomitant lengthy court proceedings.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Cioranu, Adrian Gabriel. "Facilitation versus security". Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99131.

Texto completo da fonte
Resumo:
The aviation industry is undeniably playing a very significant role in our day-to-day life. A vast and inter-connected web of flights ensures swift passenger travel and cargo traffic. However, in the name of security, otherwise intrinsic technicalities tend now not only to hinder on further development of aviation facilitation but also take over and lead towards the exact opposite result. What are the current measures taken by the international community to streamline passenger travel? What are the new initiatives which ought to be implemented? How is the future of aviation facilitation going to look like? How is it going to affect air travel and what legal implications is it rising? Throughout this thesis we will present the legal framework applicable to aviation facilitation and discuss the main initiatives that are being considered by ICAO and IATA in this respect. While Facilitation and Security should be considered as "two faces of the same coin", in reality they appear to "compete" against each other. Hence, we will provide our arguments in support of this theory.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Naude, Kevin Alexander. "Assessing program code through static structural similarity". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.

Texto completo da fonte
Resumo:
Learning to write software requires much practice and frequent assessment. Consequently, the use of computers to assist in the assessment of computer programs has been important in supporting large classes at universities. The main approaches to the problem are dynamic analysis (testing student programs for expected output) and static analysis (direct analysis of the program code). The former is very sensitive to all kinds of errors in student programs, while the latter has traditionally only been used to assess quality, and not correctness. This research focusses on the application of static analysis, particularly structural similarity, to marking student programs. Existing traditional measures of similarity are limiting in that they are usually only effective on tree structures. In this regard they do not easily support dependencies in program code. Contemporary measures of structural similarity, such as similarity flooding, usually rely on an internal normalisation of scores. The effect is that the scores only have relative meaning, and cannot be interpreted in isolation, ie. they are not meaningful for assessment. The SimRank measure is shown to have the same problem, but not because of normalisation. The problem with the SimRank measure arises from the fact that its scores depend on all possible mappings between the children of vertices being compared. The main contribution of this research is a novel graph similarity measure, the Weighted Assignment Similarity measure. It is related to SimRank, but derives propagation scores from only the locally optimal mapping between child vertices. The resulting similarity scores may be regarded as the percentage of mutual coverage between graphs. The measure is proven to converge for all directed acyclic graphs, and an efficient implementation is outlined for this case. Attributes on graph vertices and edges are often used to capture domain specific information which is not structural in nature. It has been suggested that these should influence the similarity propagation, but no clear method for doing this has been reported. The second important contribution of this research is a general method for incorporating these local attribute similarities into the larger similarity propagation method. An example of attributes in program graphs are identifier names. The choice of identifiers in programs is arbitrary as they are purely symbolic. A problem facing any comparison between programs is that they are unlikely to use the same set of identifiers. This problem indicates that a mapping between the identifier sets is required. The third contribution of this research is a method for applying the structural similarity measure in a two step process to find an optimal identifier mapping. This approach is both novel and valuable as it cleverly reuses the similarity measure as an existing resource. In general, programming assignments allow a large variety of solutions. Assessing student programs through structural similarity is only feasible if the diversity in the solution space can be addressed. This study narrows program diversity through a set of semantic preserving program transformations that convert programs into a normal form. The application of the Weighted Assignment Similarity measure to marking student programs is investigated, and strong correlations are found with the human marker. It is shown that the most accurate assessment requires that programs not only be compared with a set of good solutions, but rather a mixed set of programs of varying levels of correctness. This research represents the first documented successful application of structural similarity to the marking of student programs.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "Security measures"

1

Wayne, Joanna. Security measures. Toronto: Harlequin, 2005.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Wayne, Joanna. Security Measures. Toronto, Ontario: Harlequin, 2005.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Hakim, Simon. Commercial security: Burglary patterns and security measures. Washington, DC (1801 K St., NW, Suite 1203L, Washington 20006-1301): Security Industry Association, 1994.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Parsons, Brinckerhoff Quade &. Douglas. Transportation security. Washington, D.C: Transportation Research Board, 2006.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Corporation, Science Applications International. Security Measures for Ferry Systems. Washington, D.C.: Transportation Research Board, 2006. http://dx.doi.org/10.17226/13927.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Oram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

United States. Federal Transit Administration., United States. Federal Highway Administration., National Research Council (U.S.). Transportation Research Board., National Cooperative Highway Research Program., Transit Cooperative Research Program, Transit Development Corporation e American Association of State Highway and Transportation Officials., eds. Transportation security. Washington, D.C: Transportation Research Board, 2006.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Brooksbank, David. Security manual. 7a ed. Aldershot, Hampshire, England: Gower, 1999.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Smith, Harry. Hotel security. Springfield, Ill., U.S.A: C.C. Thomas, 1993.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Frazier, Ernest R. Surface transportation security: Security 101 : a physical security primer for transportation agencies. Washington, D.C: Transportation Research Board, 2009.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Security measures"

1

Combs, Cynthia C. "Security Measures". In Terrorism in the Twenty-First Century, 386–419. 9a ed. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003211594-17.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Thompson, Eric C. "Selecting Security Measures". In Building a HIPAA-Compliant Cybersecurity Program, 27–51. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3060-2_3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Das, Satya P. "Security". In Economics of Terrorism and Counter-Terrorism Measures, 369–407. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96577-8_8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Brauner, Florian. "Acceptance of Security Measures". In Securing Public Transportation Systems, 33–113. Wiesbaden: Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-15306-9_4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

McLean, John. "Quantitative Measures of Security". In Dependable Computing and Fault-Tolerant Systems, 223–26. Vienna: Springer Vienna, 1995. http://dx.doi.org/10.1007/978-3-7091-9396-9_18.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Smoke, Richard. "Crisis Control Measures". In Nuclear Strategy and World Security, 28–39. London: Palgrave Macmillan UK, 1985. http://dx.doi.org/10.1007/978-1-349-17878-0_4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Martin, Paul. "In-trust measures". In Insider Risk and Personnel Security, 89–104. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-11.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Martin, Paul. "Pre-trust measures". In Insider Risk and Personnel Security, 76–88. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-10.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Beck, Adrian, e Andrew Willis. "Existing Security Measures: An Audit". In Crime and Security, 97–123. London: Palgrave Macmillan UK, 2006. http://dx.doi.org/10.1057/9780230377868_5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Combs, Cynthia C. "Security Measures: A Frail Defense". In Terrorism in the Twenty-First Century, 332–60. Eighth Edition. | New York : Routledge, 2018. | “First edition published by Pearson Education, Inc. 1997”—T.p. verso. | “Seventh edition published by Pearson Education, Inc. 2012 and Routledge 2016”—T.p. verso.: Routledge, 2017. http://dx.doi.org/10.4324/9781315617053-13.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Security measures"

1

Zheng, Xiaoxia. "Computer network security and measures". In Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

"Microarchitectures undo software security measures". In 2015 IEEE Hot Chips 27 Symposium (HCS). IEEE, 2015. http://dx.doi.org/10.1109/hotchips.2015.7477472.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Bramson, Aaron L. "Methodology for building confidence measures". In Defense and Security, editado por Belur V. Dasarathy. SPIE, 2004. http://dx.doi.org/10.1117/12.542398.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Gupta, Sanyuj Singh, Abha Thakral e Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures". In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441710.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Gupta, Sanyuj Singh, Abha Thakral e Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures". In 2018 12th International Conference on Communications (COMM). IEEE, 2018. http://dx.doi.org/10.1109/iccomm.2018.8430168.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Liu, Shuiyin, Yi Hong e Emanuele Viterbo. "On measures of information theoretic security". In 2014 IEEE Information Theory Workshop (ITW). IEEE, 2014. http://dx.doi.org/10.1109/itw.2014.6970843.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Chaudhry, Yuvraj Singh, Upasana Sharma e Ajay Rana. "Enhancing Security Measures of AI Applications". In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9197790.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Gong, Guo-quan, Shuang Qiang e Jun Wang. "Information security measures and regulation research". In 2009 International Conference on Management Science and Engineering (ICMSE). IEEE, 2009. http://dx.doi.org/10.1109/icmse.2009.5317613.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Dadhich, Piyanka, M. C. Govil, Kamlesh Dutta, R. B. Patel e B. P. Singh. "Security Measures to Protect Mobile Agents". In INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10). AIP, 2010. http://dx.doi.org/10.1063/1.3526218.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Singh, Jagwinder, e Navneet Kaur. "Cloud computing: Security measures and applications". In ETLTC-ICETM2023 INTERNATIONAL CONFERENCE PROCEEDINGS: ICT Integration in Technical Education & Entertainment Technologies and Management. AIP Publishing, 2023. http://dx.doi.org/10.1063/5.0172172.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Relatórios de organizações sobre o assunto "Security measures"

1

Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), fevereiro de 1989. http://dx.doi.org/10.2172/6137987.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Santos, Ramon G. Confidence-Building Measures in Philippine Security. Fort Belvoir, VA: Defense Technical Information Center, maio de 1998. http://dx.doi.org/10.21236/ada345450.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Nathanson, David. Security and Stability Operations Measures of Effectiveness. Fort Belvoir, VA: Defense Technical Information Center, fevereiro de 2005. http://dx.doi.org/10.21236/ada464303.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Kelly, Luke. Evidence on Measures to Address Security in Camp Settings. Institute of Development Studies, março de 2021. http://dx.doi.org/10.19088/k4d.2021.052.

Texto completo da fonte
Resumo:
This rapid literature review finds that authorities use a range of methods to reduce insecurity in camps. Security in camps can be addressed through better planning of services by camp management, by more involvement of refugees, and through the use of outside security support. However, the militarisation of camps is a broader problem that requires political support from a number of stakeholders. The review focuses on insecurity arising from conflict (militarisation) and from crime and disputes within and around camps. It starts from the position that camps for refugees or internally displaced persons (IDPs) should be ‘civilian and humanitarian in character’, and thus, they should not host active combatants or fighters or support conflict. The rights of camp residents - e.g. non-refoulment of refugees - should be respected. In the case of insecurity arising from crime and disputes within and around camps, security measures should be proportionate and consider refugee protection. This review surveys evaluations and academic papers on camp security management. There is a significant body of evidence on the problem of camp militarisation in settings including Zaire/DRC, Thailand, Lebanon and the former Yugoslavia. However, the review has found relatively little evidence on successful efforts to counter militarisation in cases of conflict. It has found case studies and evaluations of a number of programmes to improve lower-level camp security, or in cases where conflict has abated. There are several reviews of UNHCR ’security packages’ involving support to host state police in African countries. These lessons are focused on how to engage with refugee and host populations, as well as host states, and how to manage security services. Guidance on camp management is also surveyed. There is very little evidence discussing liaison arrangements beyond stating the need to provide protection training and oversight for security forces; and the need for principled engagement with states and non-state conflict parties.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Minchev, Zlatogor, e Ivan Gaydarski. Cyber risks, threats & security measures associated with COVID-19. Procon, 2020. http://dx.doi.org/10.11610/views.0037.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Mumford, Michael D., Theodore L. Gessner, Jennifer O'Connor, Mary S. Connelly e Timothy C. Clifton. Background Data Measures for Predicting Security Risks: A Construct Approach. Fort Belvoir, VA: Defense Technical Information Center, janeiro de 1992. http://dx.doi.org/10.21236/ada245754.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Mancy, Mancy. mHealth: Review of Security & Privacy Measures of mHealth Apps. Ames (Iowa): Iowa State University, janeiro de 2021. http://dx.doi.org/10.31274/cc-20240624-1001.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Mumford, Michael, Theodore L. Gessner, Jennifer A. O'Connor, Julie F. Johnson e Robert J. Holt. Background Data Measures for Predicting Security Risks: Assessment of Differential Moderators. Fort Belvoir, VA: Defense Technical Information Center, janeiro de 1994. http://dx.doi.org/10.21236/ada280487.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Christie, Lorna, e Alison Tully. Security of UK Telecommunications. Parliamentary Office of Science and Technology, agosto de 2018. http://dx.doi.org/10.58248/pn584.

Texto completo da fonte
Resumo:
Telecommunications networks are essential for the day-to-day running of UK businesses and public services, however, concerns have been raised recently over their security. This POSTnote outlines the threats to these networks, the ability of networks to cope with disruption, and possible protective measures.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Hoaglund, Robert, e Walter Gazda. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability. Fort Belvoir, VA: Defense Technical Information Center, janeiro de 2007. http://dx.doi.org/10.21236/ada471403.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia