Статті в журналах з теми "Security measures"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Security measures.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security measures".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Dr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures." Indian Journal of Applied Research 4, no. 4 (October 1, 2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

D'souza, Jason John, and Seeza Franklin. "Li-Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

McCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (May 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Gupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar, and Mohinder Singh. "Networking and Security Measures." DESIDOC Bulletin of Information Technology 24, no. 2 (March 1, 2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Rushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (November 2002): 1. http://dx.doi.org/10.1145/763944.763945.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Rushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (November 2002): 1. http://dx.doi.org/10.1145/763948.763945.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Stanton, Ray. "Weighing up security measures." Computer Fraud & Security 2006, no. 1 (January 2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Wood, Charles Cresson. "Floppy diskette security measures." Computers & Security 4, no. 3 (September 1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Li, Yan. "Network Security Protection Measures." Advanced Materials Research 971-973 (June 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.

Повний текст джерела
Анотація:
Safety is the premise of network operation, network security is not only a single point of security, but the safety of the information network, need to be done from various solid protection. Analyzed the current form and face all kinds of LAN network security threats and network security precautions, technology, this paper expounds the LAN the importance of the current network security in our lives.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Valera, Jasmine P., and Sunguk Lee. "Security Measures in Overcoming Mobile IPv6 Security Issues." International Journal of Database Theory and Application 9, no. 7 (July 31, 2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Khabirov, Artur Ilfarovich, and Gulnara Mullanurovna Khamitova. "Security Measures and Liability Measures in Loan Agreements." Journal of Politics and Law 12, no. 5 (August 31, 2019): 1. http://dx.doi.org/10.5539/jpl.v12n5p1.

Повний текст джерела
Анотація:
The Civil Code of the Russian Federation regulates the use of various measures to protect violated rights and interests: first, these include universal methods for protecting civil rights (article 12 of the Civil Code); second, these include provisions of Chapter 25 of the Civil Code regarding the liability for violating one's obligations; both of them jointly comprising the institution of protection of civil rights. This article studies the issue of consequences for violating a party's duties under a loan agreement. The article differentiates safeguarding measures and liability measures to be used in case of an offense. The article also makes a conclusion regarding whether such differentiation is appropriate. Based on such differentiation, we analyze Paragraph 1 of Chapter 42 of the Civil Code of the Russian Federation.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Christin, Nicolas. "The effectiveness of security measures." Communications of the ACM 65, no. 9 (September 2022): 92. http://dx.doi.org/10.1145/3547132.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Gupta, Anish, Vimal Bibhu, and Rashid Hussain. "Security Measures in Data Mining." International Journal of Information Engineering and Electronic Business 4, no. 3 (July 1, 2012): 34–39. http://dx.doi.org/10.5815/ijieeb.2012.03.05.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Uffen, Jörg, and Michael H. Breitner. "Management of Technical Security Measures." International Journal of Social and Organizational Dynamics in IT 3, no. 1 (January 2013): 14–31. http://dx.doi.org/10.4018/ijsodit.2013010102.

Повний текст джерела
Анотація:
Organizations are investing substantial resources in technical security measures that aim at preventively protecting their information assets. The way management – or information security executives – deals with potential security measures varies individually and depends on personality traits and cognitive factors. Based on the Theory of Planned Behavior, the authors examine the relationship between the personality traits of conscientiousness, neuroticism and openness with attitudes and intentions towards managing technical security measures. The highly relevant moderating role of compliance factors is also investigated. The hypothesized relationships are analyzed and validated using empirical data from a survey of 174 information security executives. Findings suggest that conscientiousness is important in determining the attitude towards the management of technical security measures. In addition, the findings indicate that when executives are confronted with information security standards or guidelines, the personality traits of conscientiousness and openness will have a stronger effect on attitude towards managing security measures than without moderators.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Courtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (March 1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Keenan, Debra Palmer, Christine Olson, James C. Hersey, and Sondra M. Parmer. "Measures of Food Insecurity/Security." Journal of Nutrition Education 33 (September 2001): S49—S58. http://dx.doi.org/10.1016/s1499-4046(06)60069-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

TREMBLAY, JEAN-FRANÇOIS. "SECURITY MEASURES IMPEDE U.S. VISITS." Chemical & Engineering News 81, no. 11 (March 17, 2003): 40–41. http://dx.doi.org/10.1021/cen-v081n011.p040.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Feher, Ben, Lior Sidi, Asaf Shabtai, Rami Puzis, and Leonardas Marozas. "WebRTC security measures and weaknesses." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.092138.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Marozas, Leonardas, Asaf Shabtai, Rami Puzis, Ben Feher, and Lior Sidi. "WebRTC security measures and weaknesses." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.10013302.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

J A, Smitha, Rakshith G Raj, Sumanth J Samuel, and Pramath P Yaji. "Security Measures of Textual Data." International Journal of Innovative Research in Information Security 9, no. 03 (June 23, 2023): 55–60. http://dx.doi.org/10.26562/ijiris.2023.v0903.01.

Повний текст джерела
Анотація:
As the volume and importance of textual data in data science continues to grow, combined with advancements in its techniques, it has created numerous opportunities for extracting valuable insights from textual information. However, privacy and the security of private data are issues that are brought up by the analysis of text data. This paper presents an in-depth analysis of security measures specifically designed for protecting textual data in data science applications. It explores various techniques and strategies to safeguard the confidentiality, integrity, and availability of textual data throughout its lifecycle. The objective is to provide data scientists and practitioners with a comprehensive understanding of the security challenges and best practices associated with textual data in the context of data science.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Khan, Koffka. "Securing Immersive Realms: A Review of Security Measures in 360-Degree Virtual Reality Video Streaming." International Journal of Science and Research (IJSR) 12, no. 12 (December 5, 2023): 727–33. http://dx.doi.org/10.21275/sr231208045505.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Gadre, Monica. "Data Security in Cloud Security Attacks and Preventive Measures." International Journal for Research in Applied Science and Engineering Technology 6, no. 3 (March 31, 2018): 529–36. http://dx.doi.org/10.22214/ijraset.2018.3085.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (October 2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.

Повний текст джерела
Анотація:
Software defined networking (SDN), a new attempt in addressing the existing challenges in the legacy network architecture, is lime-lighted due to its simplified approach in managing the networks and its capability of programmability. In progressing with software defined networks implementation, security remains a high priority focus. The advantage of SDN itself opens a wide ground in posing new security threats and challenges. Focusing on the security of the SDN is a prime factor as it reflects on the growth of SDN technology implementation. This article focuses on the various existing security solutions available for SDN and the real challenge in securing the SDN providing the researchers a paved platform to work on further securing the networks. This article is designed with an introduction on SDN, its architecture, the available security solutions for the network, the leveraging threats and type of attack possibilities in SDN. This article concludes with the requirements of security factors and schemes in SDN.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Popescu, Mirona Ana Maria, Andreea Barbu, Petronela Cristina Simion, and Georgiana Moiceanu. "Research on Data Security Measures in Romania." Proceedings of the International Conference on Business Excellence 18, no. 1 (June 1, 2024): 3277–83. http://dx.doi.org/10.2478/picbe-2024-0267.

Повний текст джерела
Анотація:
Abstract Information from the online environment is constantly increasing, as well as its value. In this context, for companies data security becomes a central pillar to protect sensitive information and to ensure its integrity, confidentiality and availability (CIA Triangle). The security measures adopted by the companies also increase the degree of trust of their partners and customers. But data security is not just about implementing the right technologies and policies; equally important is the awareness and proper training of personnel who interact with this data or the applications that contain it. Human resource in companies playes an important role in protecting sensitive information by understanding the negative conseques of not securing and manipulating in a risky manner the confidential data used in their daily activies. To prepare the human resource and educate the employees in order to raise their awarness towards which is considered sensitive data, what measures and tools must be applied when handling it, trainings by specialisez personnel can be implemented. In this manner, the risks of cyber security attacks, data leak, are minimized and the business environment is strengthened. In this research it is presented a review of specialized literature that treat the subject of data security to highlight the current stage of development and have a general landscape from a scientific point of view. Having this as a base, the authors have developed a questionnaire that was distributed to romanian companies to find out the business perspective towards this subject. Therefore, by analysing the two perspectives, this study has the goal to present the dynamics of data security, the challenges brought by it and the good practices that can be addopted.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

STUDENÁ, Jana. "Relation of freedom and security in measures of crisis management." Scientific Papers of Silesian University of Technology. Organization and Management Series 2017, no. 110 (2017): 179–90. http://dx.doi.org/10.29119/1641-3466.2017.110.17.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

S Kale, Rakesh. "The Vulnerabilities, Threats and Counter measures in Wireless Network Security." International Journal of Science and Research (IJSR) 12, no. 4 (April 5, 2023): 1218–20. http://dx.doi.org/10.21275/mr23419121210.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Torres, C. G., M. E. Turner, J. R. Harkess, and G. R. Istre. "Security measures for AIDS and HIV." American Journal of Public Health 81, no. 2 (February 1991): 210–11. http://dx.doi.org/10.2105/ajph.81.2.210.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Повний текст джерела
Анотація:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Damoah, Dominic, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-Sam, and Brighter Agyeman. "Improving Security Measures on Grid Computing." International Journal of Computer Applications 83, no. 9 (December 18, 2013): 6–11. http://dx.doi.org/10.5120/14474-2490.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Rudakova, O. Yu, T. A. Rudakova, and I. N. Sannikova. "Spatial measures for ensuring economic security." National Interests: Priorities and Security 16, no. 1 (January 16, 2020): 44–59. http://dx.doi.org/10.24891/ni.16.1.44.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Pevnev, Volodimir, and Serhii Kapchynskyi. "DATABASE SECURITY: THREATS AND PREVENTIVE MEASURES." Advanced Information Systems 2, no. 1 (May 27, 2018): 69–72. http://dx.doi.org/10.20998/2522-9052.2018.1.13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Benjamin, John, G. Sirmans, and Emily Zietz. "Security Measures and the Apartment Market." Journal of Real Estate Research 14, no. 3 (January 1, 1997): 347–58. http://dx.doi.org/10.1080/10835547.1997.12090900.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

FUJITA, Shintaro, and Kenji SAWADA. "Security Measures Technology for Control Systems." Journal of The Institute of Electrical Engineers of Japan 142, no. 4 (April 1, 2022): 212–14. http://dx.doi.org/10.1541/ieejjournal.142.212.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid, and Dieter Gollmann. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (April 1, 1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Walsh, Matthew, and William Streilein. "Security Measures for Safeguarding the Bioeconomy." Health Security 18, no. 4 (August 1, 2020): 313–17. http://dx.doi.org/10.1089/hs.2020.0029.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Schuldt, Alison. "Security measures at the nuclear pore." Nature Cell Biology 6, no. 2 (February 2004): 91. http://dx.doi.org/10.1038/ncb0204-91.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Schroden, Jonathan J. "Measures for Security in a Counterinsurgency." Journal of Strategic Studies 32, no. 5 (October 2009): 715–44. http://dx.doi.org/10.1080/01402390903189394.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Alessi, Dario R., and Yogesh Kulathu. "Security measures of a master regulator." Nature 497, no. 7448 (May 2013): 193–94. http://dx.doi.org/10.1038/nature12101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

KITAURA, Shigeru, and Sumiaki OHOTUYAMA. "Verification about security measures for derailment." Proceedings of the Transportation and Logistics Conference 2017.26 (2017): 1018. http://dx.doi.org/10.1299/jsmetld.2017.26.1018.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Andrews, Christine. "Improving data security measures in business." Computer Fraud & Security 2009, no. 8 (August 2009): 8–10. http://dx.doi.org/10.1016/s1361-3723(09)70099-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Horak, O. J. "Means and Measures for Data Security." IFAC Proceedings Volumes 22, no. 19 (December 1989): 1–6. http://dx.doi.org/10.1016/s1474-6670(17)52787-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Collinson, Helen. "Win 95 security measures mollify users." Computers & Security 15, no. 2 (January 1996): 125–26. http://dx.doi.org/10.1016/0167-4048(96)89336-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Cieśla, Rafał. "Security measures in combating document falsifiers." Nowa Kodyfikacja Prawa Karnego 44 (December 29, 2017): 41–53. http://dx.doi.org/10.19195/2084-5065.44.4.

Повний текст джерела
Анотація:
Evolution of political and economic transformation has to a considerable degree contributed to the increase of crimes committed with fake documents. Development of civilisation and technological progress necessitate protection of public documents. To ensure security and trust to the institutions issuing documents their producers and issu­ers use various security measures to protect them against falsification. Combination of advanced technologies with biometric identifiers is a necessary solution. Implementation of advanced security measures should, at least for a certain period of time, hinder produc­tion of falsified documents. Producers and issuers of secured documents should persist in their efforts to look for new and effective technical and legal solutions in protecting docu­ments. In this context legislative work on creating a comprehensive legal act on public documents in Poland is a necessary solution.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Sahoo, Chinmayee. "Cloud Computing And Its Security Measures." International Journal of Electronics Engineering and Applications VIII, no. I (June 1, 2020): 10. http://dx.doi.org/10.30696/ijeea.viii.i.2020.10-19.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Alfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (November 2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Georgieva, Natasha, and Hadji Krsteski. "Anti-corruption measures for corporate security." Journal of Process Management. New Technologies 5, no. 2 (2017): 75–82. http://dx.doi.org/10.5937/jouproman5-13490.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Saarnio, Juha, and Neeli R. Prasad. "Foolproof Security Measures and Challenges Within." Wireless Personal Communications 29, no. 1/2 (April 2004): 1–3. http://dx.doi.org/10.1023/b:wire.0000037572.29470.27.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Chatterjee, Samrat, Stephen C. Hora, and Heather Rosoff. "Portfolio Analysis of Layered Security Measures." Risk Analysis 35, no. 3 (December 8, 2014): 459–75. http://dx.doi.org/10.1111/risa.12303.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Андрей Викторович, Борисов,. "Criminological measures to ensure transport security." Вестник Московской академии Следственного комитета Российской Федерации, no. 3(33) (September 1, 2022): 76–86. http://dx.doi.org/10.54217/2588-0136.2022.33.3.007.

Повний текст джерела
Анотація:
В статье на основе анализа научных источников, посвященных проблеме обеспечения транспортной безопасности, и действующего законодательства определены основополагающие криминологические меры обеспечения транспортной безопасности. Автором представлены различные классификации криминологических мер обеспечения транспортной безопасности: в зависимости от вида транспорта, общесоциальные и специально-криминологические. В статье раскрываются содержание и виды общесоциальных и специально-криминологических мер обеспечения транспортной безопасности. Based on the analysis of scientific sources devoted to the problem of ensuring transport security and current legislation, the article defines the fundamental criminological measures to ensure transport security. The author presents various classifications of criminological measures to ensure transport security: depending on the type of transport, general social and special criminological. The article reveals the content and types of general social and special criminological measures to ensure transport security.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

O’shea, Timothy C. "The efficacy of home security measures." American Journal of Criminal Justice 24, no. 2 (March 2000): 155–67. http://dx.doi.org/10.1007/bf02887589.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії