Добірка наукової літератури з теми "ENHANCING SECURITY"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "ENHANCING SECURITY".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "ENHANCING SECURITY"
J, Stephen, and Vidyavati Ramteke. "Enhancing Security Issues in Online Games." Journal of Advanced Research in Dynamical and Control Systems 12, no. 8 (August 19, 2020): 95–103. http://dx.doi.org/10.5373/jardcs/v12i8/20202451.
Повний текст джерелаHaedar Akib,, Lutfi Saefullah, Husain Syam, Hamsu Abdul Gani,. "ENHANCING MARITIME SECURITY COOPERATION." Psychology and Education Journal 58, no. 2 (February 10, 2021): 4769–75. http://dx.doi.org/10.17762/pae.v58i2.2868.
Повний текст джерелаShonola, Shaibu Adekunle, and Mike Joy. "Enhancing Mobile Learning Security." International Journal on Integrating Technology in Education 5, no. 3 (September 30, 2016): 01–15. http://dx.doi.org/10.5121/ijite.2016.5301.
Повний текст джерелаHudson, R. B. "Enhancing Elderly Financial Security." Public Policy & Aging Report 19, no. 3 (June 1, 2009): 2. http://dx.doi.org/10.1093/ppar/19.3.2.
Повний текст джерелаPangalos, G., M. Khair, and L. Bozios. "Enhancing medical database security." Journal of Medical Systems 18, no. 4 (August 1994): 159–71. http://dx.doi.org/10.1007/bf00996700.
Повний текст джерелаWilkinson, Paul. "Enhancing global aviation security?" Terrorism and Political Violence 10, no. 3 (September 1998): 147–66. http://dx.doi.org/10.1080/09546559808427475.
Повний текст джерелаArazi, B. "Enhancing Security with Nanotechnology." Computer 39, no. 10 (October 2006): 106–7. http://dx.doi.org/10.1109/mc.2006.338.
Повний текст джерелаvan der Meer, Sico. "Enhancing International Cyber Security." Security and Human Rights 26, no. 2-4 (December 7, 2015): 193–205. http://dx.doi.org/10.1163/18750230-02602004.
Повний текст джерелаHnamte, Vanlalruata, Jamal Hussain, Samuel Lalmuanawma, Chhakchhuak Lalrinawma, and Lalchhanhima Hmar. "Enhancing Secured Network Slicer for Cloud Security Systems." Indian Journal Of Science And Technology 16, sp1 (October 3, 2023): 179–91. http://dx.doi.org/10.17485/ijst/v16sp1.msc25.
Повний текст джерелаModares, Hero, Amirhossein Moravejosharieh, Rosli Bin Salleh, and Jaime Lloret. "Enhancing Security in Mobile IPv6." ETRI Journal 36, no. 1 (February 1, 2014): 51–61. http://dx.doi.org/10.4218/etrij.14.0113.0177.
Повний текст джерелаДисертації з теми "ENHANCING SECURITY"
Zhang, Linfan, and Shuang Zheng. "Enhancing QR Code Security." Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-14145.
Повний текст джерелаYue, Chuan. "Enhancing Web Browsing Security." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623575.
Повний текст джерелаH, Fruchter Nathaniel. "Enhancing ISP-consumer security notifications." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122916.
Повний текст джерелаThesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2019
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 79-85).
Security notification schemes hold great promise for improving both consumer cybersecurity and general network health as malware and other sources of malicious activity are becoming more prevalent on home networks. For example, botnets of Internet of Things devices engage in denial of service (DoS) attacks and ransomware holds data on personal and commercial systems hostage. Many of these threats are relatively opaque for an end user. An end user may not know that their smart device is participating in a DoS attack at all, unless they notice a protracted slowdown in network speeds. An upstream network provider like a consumer ISP has more visibility into the issue. Due to their privileged position, ISPs often have more data about the status of a malware infection, denial of service attack, or other malicious activity. This extra information can be of great benefit for the purposes of notification. For instance, an ISP may be able to notify a customer that a device on their network is being used for a DoS attackor that they see communication with a server involved in distributing ransomware. ISPs and other organizations that try and implement these schemes often run into a set of questions: How do I get the right data to power the notification? How do I ensure the user trusts the notification? Can I ensure the notification is not spoofed? Is there an optimal way to present the notification? How do I make sure a user takes the proper remedial action? This thesis presents a framework for new notification schemes to answer these questions by examining four key elements of a notification: form, delivery, and content. It also proposes multi-factor verification, a novel scheme to address trust and spoofing issues within a notification scheme. Finally, it provides a model for a new ISP-user security notification scheme within the context of the United States market and policy landscape.
by Nathaniel H. Fruchter.
S.M. in Technology and Policy
S.M.inTechnologyandPolicy Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program
Mohammed, Ali, Sachin Sama, and Majeed Mohammed. "Enhancing Network Security in Linux Environment." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17144.
Повний текст джерелаLiu, Ying. "Enhancing security for XML Web services." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27531.
Повний текст джерелаKadhum, Hamza. "Enhancing Zigbee Security for Industrial Implementation." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279559.
Повний текст джерелаZigbee nätverk är ett populärt val vid uppsättning av ett nätverk med låg strömförbrukning. Zigbees användningsområde är olika men den är väldigt populär inom industriell områdesövervakning och hemautomation. Däremot har Zigbees säkerhet varit en nackdel, då det har framkommit att den inte möter kraven för industriell användning. Arbetet kom till genom ett samarbete med Ericsson och KTH för att undersöka Zigbee nätverks implementation och säkerhet. Arbetet bearbetar olika säkerhetslösningar för Zigbee nätverk och hur den kan implementeras för att uppnå långtidsanvändning utan batteribyte. Säkerhetslösningar bygger på public-key samt symmetric key kryptografi algoritmer för att förbättra och öka Zigbees säkerhet genom autentisering och tillåtelse av noder som ansluter sig till nätverket. Nätverkets konfiguration för långtidsanvändning redovisas genom att jämföra olika polling tidsintervaller mellan meddelanden. Långtidsanvändning utan batteribyte är viktigt för att nätverket kommer implementeras i ett avlägset område som är svåråtkomlig. Arbetet redovisar och jämföra olika lösningar för att öka säkerheten för Zigbee nätverk. Den optimala lösningen för att uppnå autentisering samt tillåtelse av noder som ansluter sig uppnås med nyckel skapande genom secret-splitting metoden. Metoden följer NIST rekommendationer och anses vara säker, därav uppfyller den kraven för industriell implementation. Nätverkets säkerhet ökar samt bibehåller ett nätverk med låg strömförbrukning.
Makkar, Ankush. "Enhancing IoT Security Using 5G Capabilities." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85109.
Повний текст джерелаFekete, Florian. "Civil-military relations : enhancing international security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FFekete.pdf.
Повний текст джерелаThesis advisor(s): Donald Abenheim, Karen Guttieri. Includes bibliographical references (p. 65-70). Also available online.
Kirkham, E., and C. Flew. "Strengthening embargoes and enhancing human security." Thesis, International Alert, Saferworld and University of Bradford, Department of Peace Studies, Centre for International Co-operation and Security, 2003. http://hdl.handle.net/10454/4275.
Повний текст джерелаArms embargoes are one of the principal tools of states in seeking to prevent, limit and bring an end to armed conflict and human rights abuses. Despite the frequency with which arms embargoes have been imposed, there are significant problems with their implementation. Pressure is therefore growing for the international governmental community to act in order to ensure that the political commitment embodied by the imposition of arms embargoes is matched by the commitment to ensure their rigorous enforcement and to achieve enhanced human security on the ground. Increasing the effectiveness of arms embargoes is a specific aim of the United Nations Programme of Action for Preventing and Combating the Illicit Trade in Small Arms and Light Weapons in All Its Aspects1 which specifically calls upon states "To take appropriate measures, including all legal or administrative means, against any activity that violates a United Nations Security Council arms embargo in accordance with the Charter of the United Nations".2 Accordingly, within the context of the implementation of the UN PoA, the overall aim of this paper is to explore ways in which the international community can act in order to strengthen the impact of arms embargoes and enhance human security. It will begin by examining the purposes, processes and effects relating to arms embargoes, with particular attention to those agreed at international (UN) level, and by highlighting issues of concern in each regard. An overview of the main issues and challenges facing implementation of arms embargoes will include the elaboration of three case-study examples showing the impact of UN arms embargoes on the availability of arms and on human security and a further five that illustrate the dilemmas faced by states in seeking to implement arms embargoes. Priority areas for attention in any international effort to strengthen the effectiveness of arms embargoes will be followed by more extensive proposals for enhancing international embargo regimes within the context of implementing the UN PoA. Whilst it is recognised that the UN PoA contains measures that relate only to the illicit trade in small arms and light weapons (SALW), if implemented fully, many of these would serve to strengthen the international apparatus of control, information exchange and provision of assistance relating to arms proliferation and misuse as a whole. In turn, this would greatly enhance the implementation of UN arms embargoes. Therefore, as well as providing an opportunity for reviewing progress on implementing the PoA, the first Biennial Meeting of States in July 2003 is clearly a major opportunity for states to address a number of the pressing challenges facing states in the implementation of UN embargoes.
Lee, Man Hee. "Architectural support for enhancing security in clusters." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2889.
Повний текст джерелаКниги з теми "ENHANCING SECURITY"
Cuthbertson, Ian M., and David Robertson. Enhancing European Security. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7.
Повний текст джерелаShultz, George Pratt. Enhancing diplomatic security. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1986.
Знайти повний текст джерелаRowny, Edward L. SDI, enhancing security and stability. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.
Знайти повний текст джерелаRowny, Edward L. SDI, enhancing security and stability. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.
Знайти повний текст джерелаRowny, Edward L. SDI, enhancing security and stability. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.
Знайти повний текст джерелаRao, Vemuri V., ed. Enhancing computer security with smart technology. Boca Raton, FL: Auerbach Publications, 2005.
Знайти повний текст джерелаUnited States. Congressional Budget Office., ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Знайти повний текст джерелаUnited States. Congressional Budget Office., ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Знайти повний текст джерелаUnited States. Congressional Budget Office, ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Знайти повний текст джерелаUnited States. Congressional Budget Office, ed. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Знайти повний текст джерелаЧастини книг з теми "ENHANCING SECURITY"
Coffin, David. "Enhancing Security." In Expert Oracle and Java Security, 267–328. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3832-4_11.
Повний текст джерелаCuthbertson, Ian M., and David Robertson. "Security Through Behavioral Modification." In Enhancing European Security, 186–206. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_11.
Повний текст джерелаCuthbertson, Ian M., and David Robertson. "Introduction." In Enhancing European Security, 3–21. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_1.
Повний текст джерелаCuthbertson, Ian M., and David Robertson. "Arms Control and All That." In Enhancing European Security, 166–85. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_10.
Повний текст джерелаCuthbertson, Ian M., and David Robertson. "Combining Control and Enhancement." In Enhancing European Security, 207–16. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_12.
Повний текст джерелаCuthbertson, Ian M., and David Robertson. "Why Was INF Needed, and Would It Have Been Used?" In Enhancing European Security, 23–35. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_2.
Повний текст джерелаCuthbertson, Ian M., and David Robertson. "Conventional Force Imbalances: How to Count, and Can We Count?" In Enhancing European Security, 36–53. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_3.
Повний текст джерелаCuthbertson, Ian M., and David Robertson. "Conventional Force Imbalances: The Numbers." In Enhancing European Security, 54–66. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_4.
Повний текст джерелаCuthbertson, Ian M., and David Robertson. "Is There a Special European Interest in European Security?" In Enhancing European Security, 67–106. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_5.
Повний текст джерелаCuthbertson, Ian M., and David Robertson. "Is There a Pan-European Special Interest?" In Enhancing European Security, 107–25. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_6.
Повний текст джерелаТези доповідей конференцій з теми "ENHANCING SECURITY"
Zisiadis, Dimitris, Spyros Kopsidas, Argyris Varalis, and Leandros Tassiulas. "Enhancing WPS security." In 2012 IFIP Wireless Days (WD). IEEE, 2012. http://dx.doi.org/10.1109/wd.2012.6402836.
Повний текст джерелаFall, Moustapha, Chris Chuvalas, Nolan Warning, Max Rabiee, and Carla Purdy. "Enhancing SCADA System Security." In 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2020. http://dx.doi.org/10.1109/mwscas48704.2020.9184532.
Повний текст джерелаSingh, Arun Kumar, Shefalika Ghosh Samaddar, and Arun K. Misra. "Enhancing VPN security through security policy management." In 2012 1st International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2012. http://dx.doi.org/10.1109/rait.2012.6194494.
Повний текст джерелаPriyanka, S. Sharon, and B. Nagajayanthi. "Enhancing security in Bluetooth networks." In 2014 International Conference on Science Engineering and Management Research (ICSEMR). IEEE, 2014. http://dx.doi.org/10.1109/icsemr.2014.7043560.
Повний текст джерелаTamaki, Kiyoshi. "Enhancing implementation security of QKD." In Quantum Technologies and Quantum Information Science, edited by Mark T. Gruneisen, Miloslav Dusek, and John G. Rarity. SPIE, 2017. http://dx.doi.org/10.1117/12.2280737.
Повний текст джерелаThomson, I. R. "Performance enhancing proxies and security." In IP over Satellite - The Next Generation: MPLS, VPN and DRM Delivered Services. IEE, 2003. http://dx.doi.org/10.1049/ic:20030055.
Повний текст джерелаKetel, Mohammed. "Enhancing BYOD Security Through SDN." In SoutheastCon 2018. IEEE, 2018. http://dx.doi.org/10.1109/secon.2018.8479230.
Повний текст джерелаFarinholt, Jacob M., and James E. Troupe. "Enhancing QKD security with weak measurements." In SPIE Security + Defence, edited by Mark T. Gruneisen, Miloslav Dusek, and John G. Rarity. SPIE, 2016. http://dx.doi.org/10.1117/12.2241059.
Повний текст джерелаDulski, R., P. Powalisz, M. Kastek, and P. Trzaskawka. "Enhancing image quality produced by IR cameras." In Security + Defence, edited by David A. Huckridge and Reinhard R. Ebert. SPIE, 2010. http://dx.doi.org/10.1117/12.864979.
Повний текст джерелаChaudhry, Yuvraj Singh, Upasana Sharma, and Ajay Rana. "Enhancing Security Measures of AI Applications." In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9197790.
Повний текст джерелаЗвіти організацій з теми "ENHANCING SECURITY"
Rowny, Edward L. SDI: Enhancing Security and Stability. Fort Belvoir, VA: Defense Technical Information Center, March 1988. http://dx.doi.org/10.21236/ada351518.
Повний текст джерелаPregenzer, A. L. Enhancing regional security agreements through cooperative monitoring. Office of Scientific and Technical Information (OSTI), May 1995. http://dx.doi.org/10.2172/79720.
Повний текст джерелаYunus, Sarıkaya, and Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, July 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19167.
Повний текст джерелаYunus, Sarıkaya, and Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, July 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19168.
Повний текст джерелаAlbek, Aminuddin. The ASEAN Political-Security Community: Enhancing Defense Cooperation. Fort Belvoir, VA: Defense Technical Information Center, December 2015. http://dx.doi.org/10.21236/ad1009058.
Повний текст джерелаResearch Institute (IFPRI), International Food Policy. Increasing agricultural productivity and enhancing food security in Africa. Washington, DC: International Food Policy Research Institute, 2012. http://dx.doi.org/10.2499/9780896297937.
Повний текст джерелаFritz, Tucker. Enhancing Reliability of Classified Shipments Between the Nuclear Security Enterprise. Office of Scientific and Technical Information (OSTI), March 2020. http://dx.doi.org/10.2172/1764607.
Повний текст джерелаBarbeau, Sean. Enhancing Transit Safety and Security with Wireless Detection and Communication Technologies. Tampa, FL: University of South Florida, November 2008. http://dx.doi.org/10.5038/cutr-nctr-rr-2007-02.
Повний текст джерелаCruz, Alfredo, Jeff Duffany, and Alexander Lopez. Enhancing Research in Networking & System Security, and Forensics, in Puerto Rico. Fort Belvoir, VA: Defense Technical Information Center, March 2015. http://dx.doi.org/10.21236/ada622717.
Повний текст джерелаFuller, Rob. Resilience in Pakistan: Evaluation of enhancing food security and resilience of small-scale farmers. Oxfam GB, February 2015. http://dx.doi.org/10.21201/2015.344180.
Повний текст джерела