Добірка наукової літератури з теми "Security devices"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security devices".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security devices"
Al Reshan, Mana Saleh. "IoT-based Application of Information Security Triad." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.
Повний текст джерелаKroleski, Steven L., and William A. Bottiglieri. "Leases As Security Devices." Journal of Business Case Studies (JBCS) 4, no. 4 (June 28, 2011): 45. http://dx.doi.org/10.19030/jbcs.v4i4.4775.
Повний текст джерелаChoudhary, Yash, B. Umamaheswari, and Vijeta Kumawat. "A Study of Threats, Vulnerabilities and Countermeasures: An IoT Perspective." Shanlax International Journal of Arts, Science and Humanities 8, no. 4 (April 1, 2021): 39–45. http://dx.doi.org/10.34293/sijash.v8i4.3583.
Повний текст джерелаZhu, Li Jue, Wen Tao Zhao, Hui Jun Wu, Yong Liu, and Zhao Ming Hu. "Prototype Design of Self-Securing Portable Storage Device." Applied Mechanics and Materials 347-350 (August 2013): 3911–14. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3911.
Повний текст джерелаKurt Peker, Yeṣem, Gabriel Bello, and Alfredo J. Perez. "On the Security of Bluetooth Low Energy in Two Consumer Wearable Heart Rate Monitors/Sensing Devices." Sensors 22, no. 3 (January 27, 2022): 988. http://dx.doi.org/10.3390/s22030988.
Повний текст джерелаMyridakis, Dimitrios, Georgios Spathoulas, Athanasios Kakarountas, and Dimitrios Schinianakis. "Smart Devices Security Enhancement via Power Supply Monitoring." Future Internet 12, no. 3 (March 10, 2020): 48. http://dx.doi.org/10.3390/fi12030048.
Повний текст джерелаKaushal, Rajesh Kumar, Naveen Kumar, Shilpi Singhal, Simranjeet Singh, and Harmaninderjit Singh. "Locking Device for Physical Protection of Electronic Devices." ECS Transactions 107, no. 1 (April 24, 2022): 1769–79. http://dx.doi.org/10.1149/10701.1769ecst.
Повний текст джерелаSharma, Amritesh Kumar, Arun Kumar Singh, and Pankaj P. Singh. "Security in Android." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 10 (April 25, 2014): 3990–96. http://dx.doi.org/10.24297/ijct.v12i10.2983.
Повний текст джерелаAlamer, A., and B. Soh. "FEATHER: A Proposed Lightweight Protocol for Mobile Cloud Computing Security." Engineering, Technology & Applied Science Research 10, no. 4 (August 16, 2020): 6116–25. http://dx.doi.org/10.48084/etasr.3676.
Повний текст джерелаA. Harris, Mark, and Karen P. Patten. "Mobile device security considerations for small- and medium-sized enterprise business mobility." Information Management & Computer Security 22, no. 1 (March 4, 2014): 97–114. http://dx.doi.org/10.1108/imcs-03-2013-0019.
Повний текст джерелаДисертації з теми "Security devices"
Brooks, Jason L., and Jason A. Goss. "SECURITY ISSUES AND RESULTING SECURITY POLICIES FOR MOBILE DEVICES." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32799.
Повний текст джерелаde, Souza Savita. "Digital watermarking and novel security devices." Thesis, De Montfort University, 2003. http://hdl.handle.net/2086/5847.
Повний текст джерелаNakarmi, Prajwol Kumar. "Evaluation of VoIP Security for Mobile Devices." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-43721.
Повний текст джерелаStevenson, Martijn. "Asbestos : operating system security for mobile devices." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/37101.
Повний текст джерелаIncludes bibliographical references (p. 75-78).
This thesis presents the design and implementation of a port of the Asbestos operating system to the ARM processor. The port to the ARM allows Asbestos to run on mobile devices such as cell phones and personal digital assistants. These mobile, wireless-enabled devices are at risk for data attacks because they store private data but often roam in public networks. The Asbestos operating system is designed to prevent disclosure of such data. The port includes a file system and a network driver, which together enable future development of Asbestos applications on the ARM platform. This thesis evaluates the port with a performance comparison between Asbestos running on an HP iPAQ hand held computer and the original x86 Asbestos.
by Martijn Stevenson.
M.Eng.
Clulow, Jolyon Steven. "On the security of real-world devices." Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613220.
Повний текст джерелаKayayurt, Barış Tuğlular Tuğkan. "End-to-end security for mobile devices/." [s.l.]: [s.n.], 2004. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000492.pdf.
Повний текст джерелаNARAYANAMOORTHY, KAUSHIK. "OUTSOURCING OF SECURITY PROTOCOLS IN CONSTRAINED DEVICES." OpenSIUC, 2015. https://opensiuc.lib.siu.edu/theses/1724.
Повний текст джерелаNovak, Edmund. "Security and Privacy for Ubiquitous Mobile Devices." W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477068313.
Повний текст джерелаGüneysu, Tim Erhan. "Cryptography and cryptanalysis on reconfigurable devices security implementations for hardware and reprogrammable devices." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/994465785/04.
Повний текст джерелаBorison, Torbjorn. "Object Synchronization and Security for Mobile Communications Devices." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93276.
Повний текст джерелаКниги з теми "Security devices"
Gebotys, Catherine H. Security in Embedded Devices. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-1530-6.
Повний текст джерелаDebbabi, Mourad. Embedded Java security: Security for mobile devices. London: Springer, 2010.
Знайти повний текст джерелаMourad, Debbabi, ed. Embedded Java security: Security for mobile devices. London: Springer, 2007.
Знайти повний текст джерелаKilborn, Jason J. Louisiana security devices: A precis. 2nd ed. Durham, N.C: Carolina Academic Press, 2012.
Знайти повний текст джерелаRai, Sajay, Philip Chukwuma, and Richard Cozart. Security and Auditing of Smart Devices. Chukwuma, CISSP, Richard Cozart. Description: Boca Raton, FL : Taylor & Francis: Auerbach Publications, 2016. http://dx.doi.org/10.1201/9781315369372.
Повний текст джерелаHei, Xiali, and Xiaojiang Du. Security for Wireless Implantable Medical Devices. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7153-0.
Повний текст джерелаRoland, Michael. Security Issues in Mobile NFC Devices. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15488-6.
Повний текст джерелаRubin, Michael H. Louisiana law of security devices: A précis. New Providence, NJ: LexisNexis, 2011.
Знайти повний текст джерелаRaj, Balwinder, and Arun Kumar Singh. Nanoelectronic Devices for Hardware and Software Security. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003126645.
Повний текст джерелаBurleson, Wayne, and Sandro Carrara, eds. Security and Privacy for Implantable Medical Devices. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-1674-6.
Повний текст джерелаЧастини книг з теми "Security devices"
Opatrny, Justin. "Gateway Security Devices." In Computer Security Handbook, 26.1–26.35. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch26.
Повний текст джерелаLenhard, Thomas H. "Removable Media, USB Devices, Smartphones and Other Mobile Devices." In Data Security, 41–43. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35494-7_7.
Повний текст джерелаGebotys, Catherine H. "Where Security Began." In Security in Embedded Devices, 1–12. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-1530-6_1.
Повний текст джерелаMoore, Simon. "Protecting Consumer Security Devices." In Smart Card Programming and Security, 1. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45418-7_1.
Повний текст джерелаRaghunandan, Krishnamurthy. "Security and Personal Devices." In Introduction to Wireless Communications and Networks, 95–119. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92188-0_6.
Повний текст джерелаGarbis, Jason, and Jerry W. Chapman. "IoT Devices and “Things”." In Zero Trust Security, 193–207. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6702-8_16.
Повний текст джерелаWinkler, Johannes, Andreas Wallner, and Christian Steger. "Making Picnic Feasible for Embedded Devices." In Computer Security, 166–80. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3_10.
Повний текст джерелаVasudevan, Amit, Jonathan M. McCune, and James Newsome. "Desired Security Features." In Trustworthy Execution on Mobile Devices, 9–14. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8190-4_3.
Повний текст джерелаSforza, Antonio, Stefano Starita, and Claudio Sterle. "Optimal Location of Security Devices." In Railway Infrastructure Security, 171–96. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-04426-2_9.
Повний текст джерелаAnderson, Ross, and Markus Kuhn. "Low cost attacks on tamper resistant devices." In Security Protocols, 125–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0028165.
Повний текст джерелаТези доповідей конференцій з теми "Security devices"
Soligo, R., M. Saraniti, and S. M. Goodnick. "Terahertz devices and device modeling." In SPIE Defense + Security, edited by Thomas George, M. Saif Islam, and Achyut K. Dutta. SPIE, 2014. http://dx.doi.org/10.1117/12.2049599.
Повний текст джерелаSango, Marc, Jean Godot, Antonio Gonzalez, and Ricardo Ruiz Nolasco. "Model-Based System, Safety and Security Co-Engineering Method and Toolchain for Medical Devices Design." In 2019 Design of Medical Devices Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/dmd2019-3210.
Повний текст джерелаMitra, Nilanjit, Abhyuday Maji, and Prativa Agarwalla. "Integrated maritime security & surveillance." In 2017 Devices for Integrated Circuit (DevIC). IEEE, 2017. http://dx.doi.org/10.1109/devic.2017.8074055.
Повний текст джерелаMankovich, N. "Medical device security in hospital networks incorporating medical devices." In IET Seminar on Software for Medical Devices. IEE, 2006. http://dx.doi.org/10.1049/ic:20060142.
Повний текст джерелаHe, Xiaowei, Weilu Gao, Qi Zhang, Lei Ren, and Junichiro Kono. "Carbon-based terahertz devices." In SPIE Defense + Security, edited by Firooz A. Sadjadi and Abhijit Mahalanobis. SPIE, 2015. http://dx.doi.org/10.1117/12.2185159.
Повний текст джерелаChen, Xiaolong, and Fengnian Xia. "Black phosphorous optoelectronic devices." In SPIE Defense + Security, edited by Thomas George, Achyut K. Dutta, and M. Saif Islam. SPIE, 2017. http://dx.doi.org/10.1117/12.2263244.
Повний текст джерелаLiu, H. C., H. Luo, D. Ban, M. Buchanan, Z. R. Wasilewski, A. J. Spring Thorpe, and P. J. Poole. "Photon upconversion devices." In Defense and Security Symposium, edited by Bjørn F. Andresen, Gabor F. Fulop, and Paul R. Norton. SPIE, 2006. http://dx.doi.org/10.1117/12.665689.
Повний текст джерелаLi, Xiaolong, Jianhui Li, and Chunhui Yuan. "Security methods and security devices of alcoholic products." In 2015 International Conference on Education Technology, Management and Humanities Science (ETMHS 2015). Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/etmhs-15.2015.184.
Повний текст джерелаPaul, Philip, Simon Moore, and Simon Tam. "Tamper Protection for Security Devices." In 2008 ECSIS Symposium on Bio-Inspired Learning and Intelligent Systems for Security (BLISS). IEEE, 2008. http://dx.doi.org/10.1109/bliss.2008.27.
Повний текст джерелаArney, D., K. K. Venkatasubramanian, O. Sokolsky, and Insup Lee. "Biomedical devices and systems security." In 2011 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE, 2011. http://dx.doi.org/10.1109/iembs.2011.6090663.
Повний текст джерелаЗвіти організацій з теми "Security devices"
Ganger, Gregory R. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices). Fort Belvoir, VA: Defense Technical Information Center, January 2007. http://dx.doi.org/10.21236/ada465393.
Повний текст джерелаFranklin, Joshua M., Gema Howell, Scott Ledgerwood, and Jaydee L. Griffith. Security analysis of first responder mobile and wearable devices. Gaithersburg, MD: National Institute of Standards and Technology, May 2020. http://dx.doi.org/10.6028/nist.ir.8196.
Повний текст джерелаHowell, Gema. Security Guidance for First Responder Mobile and Wearable Devices. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8235.
Повний текст джерелаJohnson, Roger G., and Anthony R. E. Garcia. Effective vulnerability assessments for physical security devices, systems, and programs. Office of Scientific and Technical Information (OSTI), September 2002. http://dx.doi.org/10.2172/801237.
Повний текст джерелаSouppaya, Murugiah, and Karen Scarfone. Guidelines for Managing the Security of Mobile Devices in the Enterprise. National Institute of Standards and Technology, June 2013. http://dx.doi.org/10.6028/nist.sp.800-124r1.
Повний текст джерелаPhillips, Laurence R., Bankim Tejani, Jonathan Margulies, Jason L. Hills, Bryan T. Richardson, Micheal J. Baca, and Laura Weiland. Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices. Office of Scientific and Technical Information (OSTI), December 2005. http://dx.doi.org/10.2172/882347.
Повний текст джерелаFranklin, Joshua, Kevin Bowler, Christopher Brown, Spike E. Dog, Sallie Edwards, Neil McNab, and Matthew Steele. Mobile device security:. Gaithersburg, MD: National Institute of Standards and Technology, February 2019. http://dx.doi.org/10.6028/nist.sp.1800-4.
Повний текст джерелаSayers, Dave, Rui Sousa-Silva, Sviatlana Höhn, Lule Ahmedi, Kais Allkivi-Metsoja, Dimitra Anastasiou, Štefan Beňuš, et al. The Dawn of the Human-Machine Era: A forecast of new and emerging language technologies. Open Science Centre, University of Jyväskylä, May 2021. http://dx.doi.org/10.17011/jyx/reports/20210518/1.
Повний текст джерелаGanger, Gregory R., and David F. Nagle. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security. Fort Belvoir, VA: Defense Technical Information Center, December 2000. http://dx.doi.org/10.21236/ada396954.
Повний текст джерелаO'Brien, Gavin. Securing Electronic Health Records on Mobile Devices. Gaithersburg, MD: National Institute of Standards and Technology, September 2017. http://dx.doi.org/10.6028/nist.sp.1800-1.
Повний текст джерела