Добірка наукової літератури з теми "Security current"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security current".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security current"
Hwang, Yong-Woon, Im-Yeong Lee, Hwankuk Kim, Hyejung Lee, and Donghyun Kim. "Current Status and Security Trend of OSINT." Wireless Communications and Mobile Computing 2022 (February 18, 2022): 1–14. http://dx.doi.org/10.1155/2022/1290129.
Повний текст джерелаTagarev, Todor. "Theory and Current Practice of Deterrence in International Security." Connections: The Quarterly Journal 18, no. 1-2 (2019): 5–10. http://dx.doi.org/10.11610/connections.18.1-2.00.
Повний текст джерелаPonomarenko, Tetiana, Olha Prokopenko, Halyna Kuzmenko, Tetiana Kaminska, and Marharyta Luchyk. "Banking security of Ukraine: current state and ways to improve." Banks and Bank Systems 13, no. 2 (June 22, 2018): 77–88. http://dx.doi.org/10.21511/bbs.13(2).2018.07.
Повний текст джерелаMiyachi, Toshio. "Current Trends on Network Security." IEEJ Transactions on Electronics, Information and Systems 124, no. 8 (2004): 1521–26. http://dx.doi.org/10.1541/ieejeiss.124.1521.
Повний текст джерелаPark, J. S., and D. Dicoi. "WLAN security: Current and future." IEEE Internet Computing 7, no. 5 (September 2003): 60–65. http://dx.doi.org/10.1109/mic.2003.1232519.
Повний текст джерелаSyhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.
Повний текст джерелаSyhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.
Повний текст джерелаPASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (August 11, 2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.
Повний текст джерелаGABOR, Gabriel, Doina MURESAN, Laura UNGUREANU, and Alexandru CRISTIAN. "PROMOTING SECURITY INTERESTS OF ROMANIA IN THE CURRENT GEOSTRATEGIC CONTEXT." Review of the Air Force Academy 13, no. 3 (December 16, 2015): 123–28. http://dx.doi.org/10.19062/1842-9238.2015.13.3.21.
Повний текст джерелаBrandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.
Повний текст джерелаДисертації з теми "Security current"
Carlsson, Fredrik, and Klas-Göran Eriksson. "Comparison of security level and current consumption of security implementations for MQTT." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40760.
Повний текст джерелаKashfi, Hamid. "Evaluation of Current Practical Attacks Against RFID Technology." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37766.
Повний текст джерелаGao, Li Li. "Security in VoIP-Current Situation and Necessary Development." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7921.
Повний текст джерелаNowadays, VoIP is getting more and more popular. It helps company to reduce cost, extends service to remote area, produce more service opportunities, etc. Besides these advantages, VoIP also put forward security problems.
In this paper, we introduce the popular protocols in VoIP and their security mechanisms, by introducing threats to VoIP, we point out the vulnerabilities with the security mechanisms of each VoIP protocol, and give recommendation for each VoIP protocol. In the conclusion part, we evaluate the vulnerabilities of each protocol, and point out in the future, with better protocol architecture, enhanced security policies, VoIP will has a brighter future.
Ashenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.
Повний текст джерелаZahidi, Salman. "Biometrics - Evaluation of Current Situation." Thesis, Linköpings universitet, Informationskodning, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73230.
Повний текст джерелаBuzdugan, Maria. "Current and emerging air cargo security and facilitation issues." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99128.
Повний текст джерелаQiang, Hao. "E-book Security: An Analysis of Current Protection Systems." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1876.
Повний текст джерелаE-books have a wide range of application spheres from rich-media presentations to web site archiving, from writing to financial statement. They make publishing, storing and distributing of information quite simple. As a new publication technique, the main concern with e-books is the copyright infringement. To prevent e-books from free duplication and distribution, different security mechanisms are used in their publishing and distributing processes. By investigating and analyzing Digital Rights Management (DRM) and Electronic Book Exchange (EBX), this thesis presents some security issues that the e-book industry are or should be aware. Various security problems and possible solutions are highlighted by means of two case studies.
Horvat, Marko. "Formal analysis of modern security protocols in current standards." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:64d55401-82e1-4fb9-ad0b-73caf2236595.
Повний текст джерелаHove, Cathrine, and Marte Tårnes. "Information Security Incident Management : An Empirical Study of Current Practice." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22651.
Повний текст джерелаYousef, Paul. "GSM-Security: A Survey and Evaluation of the Current Situation." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2273.
Повний текст джерелаThe Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world. Approximately 800 million people around the world are using GSM for different purposes, but mostly for voice communication and SMS. For GSM, like many other widely used systems, security is crucial. The security involves mechanisms used to protect the different shareholders, like subscribers and service providers. The aspects of security that this report covers are mainly anonymity, authentication and confidentiality.
The important aspects of the system that need protection are described, along with the implementation of mechanisms used for the protection. It appears that many of the very valuable aspects of GSM can be attacked.
The anonymity of a GSM user is compromised resulting in the attacker being able to observe the time, rate, length, sources or destinations of e g calls. Even tracking a subscriber’s movements becomes possible. However, a passive attack is not sufficient to perform these attacks. The attacker needs to mount an active attack using equipment offering base station functionality.
Authentication is a crucial aspect of a wireless communication system due to the nature of the medium used, i e the radio link that is available to every one and not only the legitimate entities. Even the authentication mechanisms are attacked. It is possible to clone a subscription either by having physical access to the smart card or over the air interface. Cloning a subscription over the air requires base station functionality.
The most obvious threat against communication systems is eavesdropping on conversations. The privacy of GSM conversations is protected using some version of the A5 algorithm. There are several impressive cryptanalytical attacks against these algorithms, that break the encryption and make it possible to eavesdrop in real-time. Most of these algorithms require, however, extensive computation power and unrealistic quantities of known plaintext, which make it difficult to use them in practice. Difficulties using cryptanalytical attacks to break the confidentiality of GSM calls does not mean that conversations are well protected. Loopholes in the protocols used in GSM make it possible for an outsider, with access to sufficient equipment, to eavesdrop on conversations in real-time.
In the presence of these threats and vulnerabilities it is justified to wonder whether GSM provides sufficient security for users with very valuable information to communicate. These users may be military organisations, senior management personnel in large companies etc. GSM’s current security model does note provide sufficient protection for these entities. An additional layer of security should be added to the current security model.
Книги з теми "Security current"
Dutta, Nitul, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, and Emil Pricop. Cyber Security: Issues and Current Trends. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6597-4.
Повний текст джерелаCurrent French security policy: The Gaullist legacy. New York: Greenwood Press, 1991.
Знайти повний текст джерелаMcCormack, Richard T. Current challenges facing the OAS. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.
Знайти повний текст джерелаLiebman, Jeffrey B. Redistribution in the current U.S. Social Security system. Cambridge, MA: National Bureau of Economic Research, 2001.
Знайти повний текст джерелаInstitute for Defence Studies and Analyses, ed. Current issues in climate change. New Delhi: Institute for Defence Studies & Analyses, 2014.
Знайти повний текст джерелаDavis, Terry Lee. Commercial Aviation Cyber Security: Current State and Essential Reading. Warrendale, PA: SAE International, 2016. http://dx.doi.org/10.4271/pt-179.
Повний текст джерелаTurner, Sean H. Implementing email security and tokens: Current standards, tools, and practices. Indianapolis, IN: Wiley, 2008.
Знайти повний текст джерелаMcCormack, Richard T. Current challenges facing the OAS. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.
Знайти повний текст джерелаMcCormack, Richard T. Current challenges facing the OAS. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.
Знайти повний текст джерелаCurrent and emerging trends in cyber operations: Policy, strategy and practice. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2015.
Знайти повний текст джерелаЧастини книг з теми "Security current"
Lakshmi, Vasantha. "Current State of Security." In Beginning Security with Microsoft Technologies, 1–10. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4853-9_1.
Повний текст джерелаMacbean, Alasdair I. "Achieving Food Security." In Current Issues in Development Economics, 50–68. London: Macmillan Education UK, 1991. http://dx.doi.org/10.1007/978-1-349-21587-4_4.
Повний текст джерелаBaseley-Walker, Ben. "Current international space security initiatives." In The Fair and Responsible Use of Space, 109–21. Vienna: Springer Vienna, 2010. http://dx.doi.org/10.1007/978-3-211-99653-9_10.
Повний текст джерелаRao, Umesh Hodeghatta, and Umesha Nayak. "Current Trends in Information Security." In The InfoSec Handbook, 325–30. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6383-8_16.
Повний текст джерелаKuszewska, Agnieszka. "Current security and economic dynamics." In Law and Conflict Resolution in Kashmir, 185–98. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003196549-19.
Повний текст джерелаGillespie, Anna. "Current Nuclear Programmes in Third World Countries." In Plutonium and Security, 133–53. London: Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-11693-5_8.
Повний текст джерелаLambrinoudakis, Costas, Dimitris Gritzalis, Vassilis Tsoumas, Maria Karyda, and Spyros Ikonomopoulos. "Secure Electronic Voting: the Current Landscape." In Advances in Information Security, 101–22. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0239-5_7.
Повний текст джерелаFarahmandi, Farimah, Yuanwen Huang, and Prabhat Mishra. "Trojan Detection Using Dynamic Current Analysis." In System-on-Chip Security, 189–219. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30596-3_10.
Повний текст джерелаJacobs, Stuart. "Security of Current Mobile IP Solutions." In Advances in Database Technologies, 323–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-49121-7_28.
Повний текст джерелаKaranja, Daniel D. "Securing Africa’s Food Security: Current Constraints and Future Options." In New Security Threats and Crises in Africa, 111–27. New York: Palgrave Macmillan US, 2010. http://dx.doi.org/10.1057/9780230115538_6.
Повний текст джерелаТези доповідей конференцій з теми "Security current"
Brookson, C. B. "Security in current systems." In IEE Colloquium on Security in Networks. IEE, 1995. http://dx.doi.org/10.1049/ic:19950131.
Повний текст джерела"INFORMATION SECURITY PROBLEMS IN BANKING." In Current Issue of Law in the Banking Sphere. Samara State Economic University, 2019. http://dx.doi.org/10.46554/banking.forum-10.2019-21/26.
Повний текст джерелаRogers, Leslie A. "Current best estimates of planet populations." In SPIE Defense + Security, edited by Thomas George, Achyut K. Dutta, and M. Saif Islam. SPIE, 2016. http://dx.doi.org/10.1117/12.2223920.
Повний текст джерелаTamošiūnienė, Rima, and Corneliu Munteanu. "Current research approaches to economic security." In 1st International Conference on Business Management. Editorial Universitat Politècnica de València, 2015. http://dx.doi.org/10.4995/icbm.2015.1537.
Повний текст джерелаZhang, Jian, Huaijian Chen, Liangyi Gong, Jing Cao, and Zhaojun Gu. "The Current Research of IoT Security." In 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC). IEEE, 2019. http://dx.doi.org/10.1109/dsc.2019.00059.
Повний текст джерелаPattanayak, Animesh, and Matt Kirkland. "Current Cyber Security Challenges in ICS." In 2018 IEEE International Conference on Industrial Internet (ICII). IEEE, 2018. http://dx.doi.org/10.1109/icii.2018.00013.
Повний текст джерелаAbba, Abdullahi Lawal, Mohammed Awad, Zakaria Al-Qudah, and Abdul Halim Jallad. "Security analysis of current voting systems." In 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA). IEEE, 2017. http://dx.doi.org/10.1109/icecta.2017.8252006.
Повний текст джерелаEslahi, Meisam, Maryam Var Naseri, H. Hashim, N. M. Tahir, and Ezril Hisham Mat Saad. "BYOD: Current state and security challenges." In 2014 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE, 2014. http://dx.doi.org/10.1109/iscaie.2014.7010235.
Повний текст джерела"SECURITY CONSIDERATIONS IN CURRENT VOIP PROTOCOLS." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2006. http://dx.doi.org/10.5220/0002098601830191.
Повний текст джерела"ASSIGNMENT OF RIGHTS FROM NOTARIAL SECURITY AGREEMENTS." In Current Issue of Law in the Banking Sphere. Samara State Economic University, 2019. http://dx.doi.org/10.46554/banking.forum-10.2019-204/208.
Повний текст джерелаЗвіти організацій з теми "Security current"
Wayne F. Boyer and Scott A. McBride. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues. Office of Scientific and Technical Information (OSTI), April 2009. http://dx.doi.org/10.2172/957512.
Повний текст джерелаLiebman, Jeffrey. Redistribution in the Current U.S. Social Security System. Cambridge, MA: National Bureau of Economic Research, December 2001. http://dx.doi.org/10.3386/w8625.
Повний текст джерелаRebo, Eero. Estonian National Security Strategy: Current and Future Challenges. Fort Belvoir, VA: Defense Technical Information Center, March 2013. http://dx.doi.org/10.21236/ada590661.
Повний текст джерелаRolston. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research. Office of Scientific and Technical Information (OSTI), March 2005. http://dx.doi.org/10.2172/911610.
Повний текст джерелаKaeo, M. Operational Security Current Practices in Internet Service Provider Environments. RFC Editor, January 2007. http://dx.doi.org/10.17487/rfc4778.
Повний текст джерелаRassokha, Ekaterina. LEGAL PROBLEMS OF INTERNATIONAL SECURITY IN THE CURRENT ENVIRONMEN. Intellectual Archive, August 2021. http://dx.doi.org/10.32370/iaj.2559.
Повний текст джерелаTodd, Frank P. Current National Space Security Trends and Implications for the Future. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada401672.
Повний текст джерелаFerwerda, Jeremy, Nazli Choucri, and Stuart Madnick. Institutional Foundations for Cyber Security: Current Responses and New Challenges. Fort Belvoir, VA: Defense Technical Information Center, September 2010. http://dx.doi.org/10.21236/ada530584.
Повний текст джерелаFrancois, Isabelle. Whither the Medvedev Initiative on European Security? (Transatlantic Current, no. 3). Fort Belvoir, VA: Defense Technical Information Center, December 2011. http://dx.doi.org/10.21236/ada577605.
Повний текст джерелаMollahan, K., and L. Nattrass. Global Security Rule Sets An Analysis of the Current Global Security Environment and Rule Sets Governing Nuclear Weapons Release. Office of Scientific and Technical Information (OSTI), September 2004. http://dx.doi.org/10.2172/15011427.
Повний текст джерела