Добірка наукової літератури з теми "Security current"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security current".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Security current"

1

Hwang, Yong-Woon, Im-Yeong Lee, Hwankuk Kim, Hyejung Lee, and Donghyun Kim. "Current Status and Security Trend of OSINT." Wireless Communications and Mobile Computing 2022 (February 18, 2022): 1–14. http://dx.doi.org/10.1155/2022/1290129.

Повний текст джерела
Анотація:
Recently, users have used open-source intelligence (OSINT) to gather and obtain information regarding the data of interest. The advantage of using data gathered by OSINT is that security threats arising in cyberspace can be addressed. However, if a user uses data collected by OSINT for malicious purposes, information regarding the target of an attack can be gathered, which may lead to various cybercrimes, such as hacking, malware, and a denial-of-service attack. Therefore, from a cybersecurity point of view, it is important to positively use the data gathered by OSINT in a positive manner. If exploited in a negative manner, it is important to prepare countermeasures that can minimize the damage caused by cybercrimes. In this paper, the current status and security trends of OSINT will be explained. Specifically, we present security threats and cybercrimes that may occur if data gathered by OSINT are exploited by malicious users. Furthermore, to solve this problem, we propose security requirements that can be applied to the OSINT environment. The proposed security requirements are necessary for securely gathering and storing data in the OSINT environment and for securely accessing and using the data collected by OSINT. The goal of the proposed security requirements is to minimize the damage when cybercrimes occur in the OSINT environment.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Tagarev, Todor. "Theory and Current Practice of Deterrence in International Security." Connections: The Quarterly Journal 18, no. 1-2 (2019): 5–10. http://dx.doi.org/10.11610/connections.18.1-2.00.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Ponomarenko, Tetiana, Olha Prokopenko, Halyna Kuzmenko, Tetiana Kaminska, and Marharyta Luchyk. "Banking security of Ukraine: current state and ways to improve." Banks and Bank Systems 13, no. 2 (June 22, 2018): 77–88. http://dx.doi.org/10.21511/bbs.13(2).2018.07.

Повний текст джерела
Анотація:
Ukrainian banking institutions conduct their activity under the influence of various risks, which create critical situations for them. In this context, banks should pay more attention to their own security. The article analyzes the theoretical approaches to the concept of “banking security”, examines the level of banking security as a component of the financial and economic security of the state, and determines the ways to improve it. Banking security was analyzed based on the data of the National Bank of Ukraine and other banks that are part of the banking system of the country.The current state of the banking system shows a decrease in the security since 2014 to the “danger zone”. This is facilitated by a great number of problem loans and foreign capital in the authorized capital of banks; the predominance of short-term lending over long-term one; continued unprofitableness and low liquidity of bank assets. Banking security was the guarantor of achieving financial security of the state. Therefore, the article outlines directions for improving the operation of banking institutions and the banking system as a whole, which will allow to improve banking security in the short term. This is, first of all, the legislative consolidation of the creditor rights protection, the expansion of the lending process, including in foreign currency, with the predomi-nance of long-term loans, the banks’ work in the direction of increasing their assets profitability, optimizing administrative costs, developing and using the latest informa¬tion technology to ensure the effective operation and information security of banks.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Miyachi, Toshio. "Current Trends on Network Security." IEEJ Transactions on Electronics, Information and Systems 124, no. 8 (2004): 1521–26. http://dx.doi.org/10.1541/ieejeiss.124.1521.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Park, J. S., and D. Dicoi. "WLAN security: Current and future." IEEE Internet Computing 7, no. 5 (September 2003): 60–65. http://dx.doi.org/10.1109/mic.2003.1232519.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Syhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.

Повний текст джерела
Анотація:
Food security is directly related to nutrition and public health. It concerns the availability of food needed by people, its accessibility to consumers, including financial aspects of accessibility, the food utilization in sufficient quantity and quality to ensure full life, and stability, i.e. the ability to resist the negative changes that occur in food supply chains. Food security is a causal path that begins with production and leads to consumption, going through stages of stabilization and stress management. Therefore, the aim of this paper is to consider the essence of food security and investigate its level by the analysis of world rankings. Consequently, the Global Food Security Index, which measures the level of food security in four areas – food affordability, food availability, food quality and safety, and natural resources and resiliencies considered in this paper. According to this ranking, the first three places are occupied by the countries of Western Europe – Finland, Ireland, and the Netherlands. Except European countries, top 15 countries also include Israel, Japan, the United States of America, Canada, and New Zealand. Ukraine ranks 54th out of 113 countries. Positive changes occur only in the group «quality and safety». The rest of the groups of food security indicators for Ukraine show negative trends. In particular, in the group «food availability» indicators of «food security and access policy commitments» and «political and social barriers to access» decreased by more than thirty percent comparing with the previous year. Additionally, Global Hunger Index is considered. This index is based on four indicators – undernourishment, child wasting, child stunting, and child mortality. Despite the tendency of index improvement by the regions of the world, its value is particularly dangerous for the countries of Africa South of the Sahara, and South Asia. For Ukraine, the value of this indicator is less than 5, since 2006. This fact classifies Ukraine as a low-risk area. Accordingly, the analysis shows that currently the second goal of the Sustainable Development Plan – «Zero Hunger», is unattainable by 2030.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Syhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.

Повний текст джерела
Анотація:
Food security is directly related to nutrition and public health. It concerns the availability of food needed by people, its accessibility to consumers, including financial aspects of accessibility, the food utilization in sufficient quantity and quality to ensure full life, and stability, i.e. the ability to resist the negative changes that occur in food supply chains. Food security is a causal path that begins with production and leads to consumption, going through stages of stabilization and stress management. Therefore, the aim of this paper is to consider the essence of food security and investigate its level by the analysis of world rankings. Consequently, the Global Food Security Index, which measures the level of food security in four areas – food affordability, food availability, food quality and safety, and natural resources and resiliencies considered in this paper. According to this ranking, the first three places are occupied by the countries of Western Europe – Finland, Ireland, and the Netherlands. Except European countries, top 15 countries also include Israel, Japan, the United States of America, Canada, and New Zealand. Ukraine ranks 54th out of 113 countries. Positive changes occur only in the group «quality and safety». The rest of the groups of food security indicators for Ukraine show negative trends. In particular, in the group «food availability» indicators of «food security and access policy commitments» and «political and social barriers to access» decreased by more than thirty percent comparing with the previous year. Additionally, Global Hunger Index is considered. This index is based on four indicators – undernourishment, child wasting, child stunting, and child mortality. Despite the tendency of index improvement by the regions of the world, its value is particularly dangerous for the countries of Africa South of the Sahara, and South Asia. For Ukraine, the value of this indicator is less than 5, since 2006. This fact classifies Ukraine as a low-risk area. Accordingly, the analysis shows that currently the second goal of the Sustainable Development Plan – «Zero Hunger», is unattainable by 2030.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

PASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (August 11, 2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.

Повний текст джерела
Анотація:
Abstract: Each historical era corresponded to a certain type of technological revolution that produced transformations both in terms of the theory of military science and in the field of strategies, techniques, tactics and procedures for preparing and conducting the phenomenon of war. Thus, the beginning of the 21st century has been marked by major transformations of the global security environment, an environment conducive to hybrid dangers and threats that can seriously affect contemporary human society. Moreover, migration, terrorism, organized crime, the nuclear threat and pandemics are and will remain the main sources of global insecurity and major threats to global security. The persistence and rapid evolution of these phenomena motivate us to investigate the field, to analyze the sources of instability that seriously threaten the security of the human evolutionary environment and to present to the informed public a study of current threats to global security.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

GABOR, Gabriel, Doina MURESAN, Laura UNGUREANU, and Alexandru CRISTIAN. "PROMOTING SECURITY INTERESTS OF ROMANIA IN THE CURRENT GEOSTRATEGIC CONTEXT." Review of the Air Force Academy 13, no. 3 (December 16, 2015): 123–28. http://dx.doi.org/10.19062/1842-9238.2015.13.3.21.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Brandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.

Повний текст джерела
Анотація:
AbstractAdequate income is a social determinant of health. In the United States, only Social Security beneficiaries receive inflation-protected guaranteed income. Social Security needs another 1983 compromise in which stakeholders accepted “shared pain” to avoid insolvency. We propose indexing the benefit using the chained consumer price index (CPI) for all urban consumers and providing a one-time bonus of 8% to 10% for beneficiaries in their mid-80s, when needs become greater. The chained CPI has little impact when beneficiaries start receiving benefits, but older beneficiaries need protection. The estimated 75-year savings from this restructured benefit amount to 14.2% to 18% of Social Security deficits. Modest increases in payroll taxes and maximum earnings taxed should make up most of the shortfall. Including unearned income with wages and salaries subject to the 6.2% individual tax would produce much more revenue. The discussion explores the proposal’s political feasibility, grounding in current policy and political science literature, and the role of income as a social determinant of health.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Security current"

1

Carlsson, Fredrik, and Klas-Göran Eriksson. "Comparison of security level and current consumption of security implementations for MQTT." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40760.

Повний текст джерела
Анотація:
IoT is a rapidly growing area with products in the consumer, commercial and industrial market. Collecting data with multiple small and often battery-powered devices sets new challenges for both security and communication. There has been a distinct lack of a IoT specific communication protocols. The industry has had to use bulky interfaces not suitable for resource-constrained devices. MQTT is a standardised communication protocol made for the IoT industry. MQTT does however not have built-in security and it is up to the developers to implement a suitable security countermeasure. To evaluate how different security countermeasures impact MQTT in complexity, current consumption and security the following research questions are answered. How do you derive a measurement from the SEF that can be compared with a current consumption measurement? Which level of security, according to the SEF, will RSA, AES and TLS provide to MQTT when publishing a message to a broker? What level of complexity is added to MQTT when using chosen security countermeasure? Which of the analysed security countermeasure upholds an adequate security level while also having a low current consumption? To answer the above research questions an experiment approach has been used. Implementations of TLS, RSA and AES have been evaluated to measure how they affect the security level and current consumption of an MQTT publication, compared to no security countermeasures at all.Both RSA and AES had the same security level, but the current consumption for RSA was four times higher. The experiment showed that the security level is significantly higher for TLS, while it also has the highest current consumption. The security countermeasure evaluated differs greatly. TLS provides complete protections, while RSA and AES lacks authentication and does not ensure integrity and non-repudiation.Even if the current consumption for TLS is higher, the security it provides make it unreasonable to recommend any of the other security countermeasure implementations.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Kashfi, Hamid. "Evaluation of Current Practical Attacks Against RFID Technology." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37766.

Повний текст джерела
Анотація:
Radio Frequency Identification (RFID) is a technology that has been around for three decades now. It is being used in various scenarios in technologically modern societies around the world and becoming a crucial part of our daily life. But we often forget how the inner technology is designed to work, or even if it is as trustable and secure as we think. While the RFID technology and protocols involved with it has been designed with an acceptable level of security in mind, not all implementations and use cases are as secure as consumers believe. A majority of implementations and products that are deployed suffer from known and critical security issues.      This thesis work starts with an introduction to RFID standards and how the technology works. Followed by that a taxonomy of known attacks and threats affecting RFID is presented, which avoids going through too much of technical details but provides references for farther research and study for every part and attack. Then RFID security threats are reviewed from risk management point of view, linking introduced attacks to the security principle they affect. We also review (lack thereof) security standards and guidelines that can help mitigating introduced threats. Finally to demonstrate how practical and serious these threats are, three real-world case studies are presented, in which we break security of widely used RFID implementations. At the end we also review and highlight domains in RFID security that can be researched farther, and what materials we are currently missing, that can be used to raise awareness and increase security of RFID technology for consumers.      The goal of this thesis report is to familiarize readers with all of the publicly documented and known security issues of RFID technology, so that they can get a sense about the security state of their systems. Without getting involved with too much technical details about every attack vector, or going throw tens of different books and papers, readers can use this report as a comprehensive reference to educate themselves about all known attacks against RFID, published to the date of writing this report.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Gao, Li Li. "Security in VoIP-Current Situation and Necessary Development." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7921.

Повний текст джерела
Анотація:

Nowadays, VoIP is getting more and more popular. It helps company to reduce cost, extends service to remote area, produce more service opportunities, etc. Besides these advantages, VoIP also put forward security problems.

In this paper, we introduce the popular protocols in VoIP and their security mechanisms, by introducing threats to VoIP, we point out the vulnerabilities with the security mechanisms of each VoIP protocol, and give recommendation for each VoIP protocol. In the conclusion part, we evaluate the vulnerabilities of each protocol, and point out in the future, with better protocol architecture, enhanced security policies, VoIP will has a brighter future.

Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ashenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.

Повний текст джерела
Анотація:
Large-scale data losses experienced across both public and private sector organisations have led to expectations that organisations will develop a culture that supports information security aims and objectives. Despite the fact that many organisations now run awareness, education and training programmes for their employees, however, information security incidents due to employee misuse of information still keep occurring. This suggests that these programmes are not working. The research presented in this thesis examines ways to better understand employees’ attitudes towards information security with a view to improving current organisational practice. The research explores whether Chief Information Security Officers are delivering organisational change for information security, before moving on to better understand employee’s attitudes and how these are translated into behaviours. The research takes a mixed-methods approach that is not often used in information security research and combines both qualitative and quantitative analytical methods, grounded in the theory of social psychology. Case studies are carried out with Chief Information Security Officers as well as at the Office of Fair Trading and Prudential plc. The research delivers a survey tool that can be used in organisations to better understand how to frame information security messages so that they achieve their aims. An expert panel of users evaluated the survey. The research concluded that end users fall into two groups – the ‘I Can Handle It Group’ and the ‘It’s Out of My Control Group’ and these substantive findings have been validated by a field experiment. By mirroring the attributions of the dominant group the field experiment demonstrates that it is possible to influence employees’ behaviour.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Zahidi, Salman. "Biometrics - Evaluation of Current Situation." Thesis, Linköpings universitet, Informationskodning, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73230.

Повний текст джерела
Анотація:
Information security has always been a topic of concern in the world as an emphasis on new techniques to secure the identity of a legitimate user is regarded as top priority. To counter such an issue, we have a traditional way of authentication factors “what you have” and “what you know” in the form of smart cards or passwords respectively. But biometrics is based on the factor “who are you” by analyzing human physical or behavioral characteristics. Biometrics has always been an efficient way of authorization and is now considered as a $1500 million industry where fingerprints dominate the biometrics while iris is quickly emerging as the most desirable form of biometric technique.The main goal of this thesis is to compare and evaluate different biometrics techniques in terms of their purpose, recognition mechanism, market value and their application areas. Since there are no defined evaluating criteria, my method of evaluation was based on a literature survey from internet, books, IEEE papers and technical surveys. Chapter 3 is focused on different biometrics techniques where I discuss them briefly but in chapter 4, I go deeper into Iris, fingerprints, facial techniques which are prominent in biometrics world. Lastly, I had a general assessment of the biometrics, their future growth and suggested specific techniques for different environment like access controls, e-commerce, national ids, and surveillance.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Buzdugan, Maria. "Current and emerging air cargo security and facilitation issues." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99128.

Повний текст джерела
Анотація:
In the wake of September 11th and following an overemphasis on passenger air travel security, the air cargo system potentially has become the primary target for terrorists. States have undertaken various regulatory approaches that involve technology and operational measures aimed at addressing the perceived security threats in the air cargo industry. This thesis presents both an overview of the potential risks and best security practices identified within several international, regional and national initiatives, including the "authorized economic operator" and "secure supply chain" mechanisms. The main challenge in designing an adequate security system appears to be ensuring that security improvements are in accord with the time-sensitive realities of air cargo industry and do not unduly interfere with trade flow. It is argued that only an international approach based on best available cargo security practices could adequately and efficiently address the current and emerging air cargo security vulnerabilities.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Qiang, Hao. "E-book Security: An Analysis of Current Protection Systems." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1876.

Повний текст джерела
Анотація:

E-books have a wide range of application spheres from rich-media presentations to web site archiving, from writing to financial statement. They make publishing, storing and distributing of information quite simple. As a new publication technique, the main concern with e-books is the copyright infringement. To prevent e-books from free duplication and distribution, different security mechanisms are used in their publishing and distributing processes. By investigating and analyzing Digital Rights Management (DRM) and Electronic Book Exchange (EBX), this thesis presents some security issues that the e-book industry are or should be aware. Various security problems and possible solutions are highlighted by means of two case studies.

Стилі APA, Harvard, Vancouver, ISO та ін.
8

Horvat, Marko. "Formal analysis of modern security protocols in current standards." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:64d55401-82e1-4fb9-ad0b-73caf2236595.

Повний текст джерела
Анотація:
While research has been done in the past on evaluating standardised security protocols, most notably TLS, there is still room for improvement. Modern security protocols need to be rigorously and thoroughly analysed, ideally before they are widely deployed, so as to minimise the impact of often creative, powerful adversaries. We explore the potential vulnerabilities of modern security protocols specified in current standards, including TLS 1.2, TLS 1.3, and SSH. We introduce and formalise the threat of Actor Key Compromise (AKC), and show how this threat can and cannot be avoided in the protocol design stage. We find AKC-related and other serious security flaws in protocols from the ISO/IEC 11770 standard, find realistic exploits, and harden the protocols to ensure strong security properties. Based on our work, the ISO/IEC 11770 working group is releasing an updated version of the standard that incorporates our suggested improvements. We analyse the unilaterally and mutually authenticated modes of the TLS 1.3 Handshake and Record protocols according to revision 06 of their specification draft. We verify session key secrecy and perfect forward secrecy in both modes with respect to a powerful symbolic attacker and an unbounded number of threads. Subsequently, we model and verify the standard authenticated key exchange requirements in revision 10. We analyse a proposal for its extension and uncover a flaw in it, which directly impacts the draft of revision 11.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Hove, Cathrine, and Marte Tårnes. "Information Security Incident Management : An Empirical Study of Current Practice." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22651.

Повний текст джерела
Анотація:
An increasing use of digital solutions suggests that organizations today are more exposed to attacks than before. Recent reports show that attacks get more advanced and that attackers choose their targets more wisely. Despite preventive measures being implemented, incidents occur occasionally. This calls for effective and efficient information security incident management. Several standards and guidelines addressing incident management exist. However, few studies of current practices have been conducted. In this thesis an empirical study was conducted where organizations' incident management practices were studied. The research was conducted as a case study of three large Norwegian organizations, where the data collection methods were interviews and document studies. Our findings show that the organizations were relatively compliant with standards and guidelines for incident management, but that there was still room for improvements. We found communication, information dissemination, employee involvement, experience and allocation of responsibilities to be important factors to an effective and efficient incident management process. Finally, we contribute with recommendations for performing successful information security incident management. We recommend organizations to use standards and guidelines as a basis for incident management, conduct regular rehearsals, utilize employees as part of the sensor network in incident detection and to conduct awareness campaigns for employees.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Yousef, Paul. "GSM-Security: A Survey and Evaluation of the Current Situation." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2273.

Повний текст джерела
Анотація:

The Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world. Approximately 800 million people around the world are using GSM for different purposes, but mostly for voice communication and SMS. For GSM, like many other widely used systems, security is crucial. The security involves mechanisms used to protect the different shareholders, like subscribers and service providers. The aspects of security that this report covers are mainly anonymity, authentication and confidentiality.

The important aspects of the system that need protection are described, along with the implementation of mechanisms used for the protection. It appears that many of the very valuable aspects of GSM can be attacked.

The anonymity of a GSM user is compromised resulting in the attacker being able to observe the time, rate, length, sources or destinations of e g calls. Even tracking a subscriber’s movements becomes possible. However, a passive attack is not sufficient to perform these attacks. The attacker needs to mount an active attack using equipment offering base station functionality.

Authentication is a crucial aspect of a wireless communication system due to the nature of the medium used, i e the radio link that is available to every one and not only the legitimate entities. Even the authentication mechanisms are attacked. It is possible to clone a subscription either by having physical access to the smart card or over the air interface. Cloning a subscription over the air requires base station functionality.

The most obvious threat against communication systems is eavesdropping on conversations. The privacy of GSM conversations is protected using some version of the A5 algorithm. There are several impressive cryptanalytical attacks against these algorithms, that break the encryption and make it possible to eavesdrop in real-time. Most of these algorithms require, however, extensive computation power and unrealistic quantities of known plaintext, which make it difficult to use them in practice. Difficulties using cryptanalytical attacks to break the confidentiality of GSM calls does not mean that conversations are well protected. Loopholes in the protocols used in GSM make it possible for an outsider, with access to sufficient equipment, to eavesdrop on conversations in real-time.

In the presence of these threats and vulnerabilities it is justified to wonder whether GSM provides sufficient security for users with very valuable information to communicate. These users may be military organisations, senior management personnel in large companies etc. GSM’s current security model does note provide sufficient protection for these entities. An additional layer of security should be added to the current security model.

Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Security current"

1

Dutta, Nitul, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, and Emil Pricop. Cyber Security: Issues and Current Trends. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6597-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Current French security policy: The Gaullist legacy. New York: Greenwood Press, 1991.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

McCormack, Richard T. Current challenges facing the OAS. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Liebman, Jeffrey B. Redistribution in the current U.S. Social Security system. Cambridge, MA: National Bureau of Economic Research, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Institute for Defence Studies and Analyses, ed. Current issues in climate change. New Delhi: Institute for Defence Studies & Analyses, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Davis, Terry Lee. Commercial Aviation Cyber Security: Current State and Essential Reading. Warrendale, PA: SAE International, 2016. http://dx.doi.org/10.4271/pt-179.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Turner, Sean H. Implementing email security and tokens: Current standards, tools, and practices. Indianapolis, IN: Wiley, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

McCormack, Richard T. Current challenges facing the OAS. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

McCormack, Richard T. Current challenges facing the OAS. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Current and emerging trends in cyber operations: Policy, strategy and practice. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2015.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Security current"

1

Lakshmi, Vasantha. "Current State of Security." In Beginning Security with Microsoft Technologies, 1–10. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4853-9_1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Macbean, Alasdair I. "Achieving Food Security." In Current Issues in Development Economics, 50–68. London: Macmillan Education UK, 1991. http://dx.doi.org/10.1007/978-1-349-21587-4_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Baseley-Walker, Ben. "Current international space security initiatives." In The Fair and Responsible Use of Space, 109–21. Vienna: Springer Vienna, 2010. http://dx.doi.org/10.1007/978-3-211-99653-9_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Rao, Umesh Hodeghatta, and Umesha Nayak. "Current Trends in Information Security." In The InfoSec Handbook, 325–30. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6383-8_16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kuszewska, Agnieszka. "Current security and economic dynamics." In Law and Conflict Resolution in Kashmir, 185–98. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003196549-19.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Gillespie, Anna. "Current Nuclear Programmes in Third World Countries." In Plutonium and Security, 133–53. London: Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-11693-5_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Lambrinoudakis, Costas, Dimitris Gritzalis, Vassilis Tsoumas, Maria Karyda, and Spyros Ikonomopoulos. "Secure Electronic Voting: the Current Landscape." In Advances in Information Security, 101–22. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0239-5_7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Farahmandi, Farimah, Yuanwen Huang, and Prabhat Mishra. "Trojan Detection Using Dynamic Current Analysis." In System-on-Chip Security, 189–219. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30596-3_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Jacobs, Stuart. "Security of Current Mobile IP Solutions." In Advances in Database Technologies, 323–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-49121-7_28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Karanja, Daniel D. "Securing Africa’s Food Security: Current Constraints and Future Options." In New Security Threats and Crises in Africa, 111–27. New York: Palgrave Macmillan US, 2010. http://dx.doi.org/10.1057/9780230115538_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Security current"

1

Brookson, C. B. "Security in current systems." In IEE Colloquium on Security in Networks. IEE, 1995. http://dx.doi.org/10.1049/ic:19950131.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

"INFORMATION SECURITY PROBLEMS IN BANKING." In Current Issue of Law in the Banking Sphere. Samara State Economic University, 2019. http://dx.doi.org/10.46554/banking.forum-10.2019-21/26.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Rogers, Leslie A. "Current best estimates of planet populations." In SPIE Defense + Security, edited by Thomas George, Achyut K. Dutta, and M. Saif Islam. SPIE, 2016. http://dx.doi.org/10.1117/12.2223920.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Tamošiūnienė, Rima, and Corneliu Munteanu. "Current research approaches to economic security." In 1st International Conference on Business Management. Editorial Universitat Politècnica de València, 2015. http://dx.doi.org/10.4995/icbm.2015.1537.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Zhang, Jian, Huaijian Chen, Liangyi Gong, Jing Cao, and Zhaojun Gu. "The Current Research of IoT Security." In 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC). IEEE, 2019. http://dx.doi.org/10.1109/dsc.2019.00059.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Pattanayak, Animesh, and Matt Kirkland. "Current Cyber Security Challenges in ICS." In 2018 IEEE International Conference on Industrial Internet (ICII). IEEE, 2018. http://dx.doi.org/10.1109/icii.2018.00013.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Abba, Abdullahi Lawal, Mohammed Awad, Zakaria Al-Qudah, and Abdul Halim Jallad. "Security analysis of current voting systems." In 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA). IEEE, 2017. http://dx.doi.org/10.1109/icecta.2017.8252006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Eslahi, Meisam, Maryam Var Naseri, H. Hashim, N. M. Tahir, and Ezril Hisham Mat Saad. "BYOD: Current state and security challenges." In 2014 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE, 2014. http://dx.doi.org/10.1109/iscaie.2014.7010235.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

"SECURITY CONSIDERATIONS IN CURRENT VOIP PROTOCOLS." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2006. http://dx.doi.org/10.5220/0002098601830191.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

"ASSIGNMENT OF RIGHTS FROM NOTARIAL SECURITY AGREEMENTS." In Current Issue of Law in the Banking Sphere. Samara State Economic University, 2019. http://dx.doi.org/10.46554/banking.forum-10.2019-204/208.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Security current"

1

Wayne F. Boyer and Scott A. McBride. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues. Office of Scientific and Technical Information (OSTI), April 2009. http://dx.doi.org/10.2172/957512.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Liebman, Jeffrey. Redistribution in the Current U.S. Social Security System. Cambridge, MA: National Bureau of Economic Research, December 2001. http://dx.doi.org/10.3386/w8625.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Rebo, Eero. Estonian National Security Strategy: Current and Future Challenges. Fort Belvoir, VA: Defense Technical Information Center, March 2013. http://dx.doi.org/10.21236/ada590661.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Rolston. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research. Office of Scientific and Technical Information (OSTI), March 2005. http://dx.doi.org/10.2172/911610.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kaeo, M. Operational Security Current Practices in Internet Service Provider Environments. RFC Editor, January 2007. http://dx.doi.org/10.17487/rfc4778.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Rassokha, Ekaterina. LEGAL PROBLEMS OF INTERNATIONAL SECURITY IN THE CURRENT ENVIRONMEN. Intellectual Archive, August 2021. http://dx.doi.org/10.32370/iaj.2559.

Повний текст джерела
Анотація:
The article reflects the main views on international security problems in the legal aspect and identified actual problems and contradictions in the application and compliance with international humanitarian law norms.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Todd, Frank P. Current National Space Security Trends and Implications for the Future. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada401672.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Ferwerda, Jeremy, Nazli Choucri, and Stuart Madnick. Institutional Foundations for Cyber Security: Current Responses and New Challenges. Fort Belvoir, VA: Defense Technical Information Center, September 2010. http://dx.doi.org/10.21236/ada530584.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Francois, Isabelle. Whither the Medvedev Initiative on European Security? (Transatlantic Current, no. 3). Fort Belvoir, VA: Defense Technical Information Center, December 2011. http://dx.doi.org/10.21236/ada577605.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Mollahan, K., and L. Nattrass. Global Security Rule Sets An Analysis of the Current Global Security Environment and Rule Sets Governing Nuclear Weapons Release. Office of Scientific and Technical Information (OSTI), September 2004. http://dx.doi.org/10.2172/15011427.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії