Статті в журналах з теми "Security threats"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security threats".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Isokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain." Teisė 122 (March 30, 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.
Повний текст джерелаPASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (August 11, 2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.
Повний текст джерелаJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (December 20, 2013): 6. http://dx.doi.org/10.33317/ssurj.v3i1.62.
Повний текст джерелаSaptono, Edy, Ribka Keiza, and Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia." Technium Social Sciences Journal 23 (September 9, 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.
Повний текст джерелаSyomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.
Повний текст джерелаSyed, Farzana Zaheer, and Saba Javed. "Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan." International Journal of Social Sciences and Management 4, no. 4 (October 30, 2017): 267–74. http://dx.doi.org/10.3126/ijssm.v4i4.18503.
Повний текст джерелаPendergrass, John C., Karen Heart, C. Ranganathan, and V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine." International Journal of Healthcare Information Systems and Informatics 9, no. 4 (October 2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.
Повний текст джерелаKarpavičiūtė, Ieva. "Securitization and Lithuania’s National Security Change." Lithuanian Foreign Policy Review 36, no. 1 (December 20, 2017): 9–33. http://dx.doi.org/10.1515/lfpr-2017-0005.
Повний текст джерелаHojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (August 1, 2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.
Повний текст джерелаصادق, بارزان. "Internal Security Threats on the Kurdistan Region – Iraq." Journal for Political and Security Studies 3, no. 6 (December 1, 2020): 84–130. http://dx.doi.org/10.31271/jopss.10040.
Повний текст джерелаSmirnov, R. A., and S. N. Novikov. "Research on Information Security Risk Assessment Techniques." Interexpo GEO-Siberia 6 (May 18, 2022): 250–57. http://dx.doi.org/10.33764/2618-981x-2022-6-250-257.
Повний текст джерелаKoper-Staszowska, Wioletta. "Security versus Threat – Interrelations." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 3 (October 30, 2018): 22–25. http://dx.doi.org/10.5604/01.3001.0012.7517.
Повний текст джерелаSmalii, O. B. "A general description of threats to european security at the threshold of the 21st century." Legal horizons, no. 21 (2020): 148–52. http://dx.doi.org/10.21272/legalhorizons.2020.i21.p148.
Повний текст джерелаYarovenko, Hanna. "Evaluating the threat to national information security." Problems and Perspectives in Management 18, no. 3 (September 9, 2020): 195–210. http://dx.doi.org/10.21511/ppm.18(3).2020.17.
Повний текст джерелаMeland, Per Håkon, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, and Paolo Giorgini. "Threat Analysis in Goal-Oriented Security Requirements Modelling." International Journal of Secure Software Engineering 5, no. 2 (April 2014): 1–19. http://dx.doi.org/10.4018/ijsse.2014040101.
Повний текст джерелаLe, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (March 30, 2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Повний текст джерелаDervišević, Tarik, Sabina Baraković, and Jasmina Baraković Husić. "Case Study: Security of System for Remote Management of Windows." B&H Electrical Engineering 14, no. 2 (December 1, 2020): 4–12. http://dx.doi.org/10.2478/bhee-2020-0007.
Повний текст джерелаJenab, Kouroush, Sam Khoury, and Kim LaFevor. "Flow-Graph and Markovian Methods for Cyber Security Analysis." International Journal of Enterprise Information Systems 12, no. 1 (January 2016): 59–84. http://dx.doi.org/10.4018/ijeis.2016010104.
Повний текст джерелаMalviya, Deepak Kumar, and Umesh Kumar Lilhore. "Survey on Security Threats in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-3, Issue-1 (December 31, 2018): 1222–26. http://dx.doi.org/10.31142/ijtsrd19172.
Повний текст джерелаPolikanov, Dmitry. "Russia’s Perception and Hierarchy of Security Threats." Connections: The Quarterly Journal 04, no. 2 (2005): 85–91. http://dx.doi.org/10.11610/connections.04.2.11.
Повний текст джерелаGuchua, Alika, and Thornike Zedelashvili. "Cyberwar as a Phenomenon of Asymmetric Threat and Cyber-Nuclear Security Threats." Історико-політичні проблеми сучасного світу, no. 40 (December 15, 2019): 50–57. http://dx.doi.org/10.31861/mhpi2019.40.50-57.
Повний текст джерелаJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "2 Wireless Security Threats." Sir Syed Research Journal of Engineering & Technology 1, no. 1 (December 20, 2013): 6. http://dx.doi.org/10.33317/ssurj.v1i1.62.
Повний текст джерелаKopczewski, Marian, Zbigniew Ciekanowski, Julia Nowicka, and Katarzyna Bakalarczyk-Burakowska. "Security threats in cyberspace." Scientific Journal of the Military University of Land Forces 205, no. 3 (September 23, 2022): 415–26. http://dx.doi.org/10.5604/01.3001.0016.0040.
Повний текст джерелаBahgat, Gawdat. "Oil security: Potential threats." Contemporary Security Policy 19, no. 2 (August 1998): 71–90. http://dx.doi.org/10.1080/13523269808404191.
Повний текст джерелаVelinov, Nikola, and Stephan Janouch. "Combating Evolving Security Threats." New Electronics 53, no. 10 (May 26, 2020): 22–23. http://dx.doi.org/10.12968/s0047-9624(22)61260-4.
Повний текст джерелаGould, David. "Organizational Resilience Approaches to Cyber Security." International Journal of Smart Education and Urban Society 9, no. 4 (October 2018): 53–62. http://dx.doi.org/10.4018/ijseus.2018100105.
Повний текст джерелаKaduszkiewicz, Marcin. "The National Map of Security Threats as a tool to monitor security and public order." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 31, no. 31 (September 28, 2018): 81–92. http://dx.doi.org/10.5604/01.3001.0012.8596.
Повний текст джерелаTkachuk, Natalia. "Analytical Component in Institutional Providing of Ukraine National Security Risks and Threats Assessment." Information Security of the Person, Society and State, no. 28-30 (December 15, 2020): 38–44. http://dx.doi.org/10.51369/2707-7276-2020-(1-3)-5.
Повний текст джерелаSuroto, Suroto. "WLAN Security: Threats And Countermeasures." JOIV : International Journal on Informatics Visualization 2, no. 4 (June 27, 2018): 232. http://dx.doi.org/10.30630/joiv.2.4.133.
Повний текст джерелаTheron, Julien. "Networks of Threats: Interconnection, Interaction, Intermediation." Journal of Strategic Security 14, no. 3 (October 2021): 45–69. http://dx.doi.org/10.5038/1944-0472.14.3.1942.
Повний текст джерелаSun, Lei, Qin Sheng Du, and Lu Tan. "Cloud Security Threats Distribution Technology Research." Applied Mechanics and Materials 727-728 (January 2015): 934–36. http://dx.doi.org/10.4028/www.scientific.net/amm.727-728.934.
Повний текст джерелаKovpak, Olena. "TOOLS OF COUNTERACTION OF BUDGET SECTOR DEVELOPMENT THREATS." Economic Analysis, no. 27(3) (2017): 31–36. http://dx.doi.org/10.35774/econa2017.03.031.
Повний текст джерелаIlvonen, Ilona, and Pasi Virtanen. "Preparing for Cyber Threats with Information Security Policies." International Journal of Cyber Warfare and Terrorism 3, no. 4 (October 2013): 22–31. http://dx.doi.org/10.4018/ijcwt.2013100103.
Повний текст джерелаJ., Waweru, and Dr Anita Kiamba. "Wildlife Security and International Relations." International Journal of Research and Innovation in Social Science 06, no. 10 (2022): 720–24. http://dx.doi.org/10.47772/ijriss.2022.61035.
Повний текст джерелаGreaves, Wilfrid. "Climate change and security in Canada." International Journal: Canada's Journal of Global Policy Analysis 76, no. 2 (June 2021): 183–203. http://dx.doi.org/10.1177/00207020211019325.
Повний текст джерелаRizal, Muhamad, and Yanyan Yani. "Cybersecurity Policy and Its Implementation in Indonesia." JAS (Journal of ASEAN Studies) 4, no. 1 (August 9, 2016): 61. http://dx.doi.org/10.21512/jas.v4i1.967.
Повний текст джерелаMelnyk, Dmytro. "Current Threats to the National Security of Ukraine in the Field of Information: Issues of dentification and Counteraction." Information Security of the Person, Society and State, no. 31-33 (December 20, 2021): 16–27. http://dx.doi.org/10.51369/2707-7276-2021-(1-3)-2.
Повний текст джерелаZeng, Min, Chuanzhou Dian, and Yaoyao Wei. "Risk Assessment of Insider Threats Based on IHFACS-BN." Sustainability 15, no. 1 (December 28, 2022): 491. http://dx.doi.org/10.3390/su15010491.
Повний текст джерелаEl-Bakkouri, N., and T. Mazri. "SECURITY THREATS IN SMART HEALTHCARE." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIV-4/W3-2020 (November 23, 2020): 209–14. http://dx.doi.org/10.5194/isprs-archives-xliv-4-w3-2020-209-2020.
Повний текст джерелаJoseph, Juliet Eileen. "SADC and ECOWAS’S peace and security architecture preparedness and the COVID-19 pandemic." EUREKA: Social and Humanities, no. 1 (January 28, 2022): 16–30. http://dx.doi.org/10.21303/2504-5571.2022.002248.
Повний текст джерелаBabenko, Aleksey, and Svetlana Kozunova. "The Model of Information Security Threat Profile of Corporate Information System." NBI Technologies, no. 1 (August 2018): 6–11. http://dx.doi.org/10.15688/nbit.jvolsu.2018.1.1.
Повний текст джерелаZoidov, K. Kh, and E. N. Zimenkova. "On Threats to the Economic Security of the Republic of Crimea." Economics and Management, no. 9 (November 7, 2019): 23–33. http://dx.doi.org/10.35854/1998-1627-2019-9-23-33.
Повний текст джерелаAntonova, Olena. "MAIN THREATS TO THE FORMATION OF THE SECURITY SYSTEM OF BANKS CREDIT ACTIVITIES." Actual Problems of Economics 1, no. 223 (January 22, 2020): 55–72. http://dx.doi.org/10.32752/1993-6788-2020-1-223-55-72.
Повний текст джерелаZhang, Shuqin, Guangyao Bai, Hong Li, Peipei Liu, Minzhi Zhang, and Shujun Li. "Multi-Source Knowledge Reasoning for Data-Driven IoT Security." Sensors 21, no. 22 (November 15, 2021): 7579. http://dx.doi.org/10.3390/s21227579.
Повний текст джерелаWENDT, Jan A. "CRITICAL ASSESSMENT OF THE OPERATION OF THE STATE SECURITY SYSTEMS IN POLAND." Revista Română de Geografie Politică 24, no. 2 (December 30, 2022): 74–81. http://dx.doi.org/10.30892/rrgp.242105-360.
Повний текст джерелаFebriana, Henny, Dewi Sartika Br Ginting, Fuzy Yustika Manik, and Mahyuddin. "The Applied Aproach Impact Information Security For Government and Company (A Review)." Data Science: Journal of Computing and Applied Informatics 6, no. 1 (March 21, 2022): 45–54. http://dx.doi.org/10.32734/jocai.v6.i1-7935.
Повний текст джерелаForca, Božidar, Dragoljub Sekulović, and Igor Vukonjanski. "Actual Challenges, Risks and Security Safety." Security science journal 1, no. 1 (July 31, 2020): 65–83. http://dx.doi.org/10.37458/ssj.1.1.6.
Повний текст джерелаZharkov, Grigory, and Vadim Shevtsov. "Analysis of Information Threats to Industrial Security." NBI Technologies, no. 2 (December 2020): 6–10. http://dx.doi.org/10.15688/nbit.jvolsu.2020.2.1.
Повний текст джерелаHENTZ, JAMES J. "The Southern African security order: regional economic integration and security among developing states." Review of International Studies 35, S1 (February 2009): 189–213. http://dx.doi.org/10.1017/s0260210509008481.
Повний текст джерелаBojanić, Dragan. "The theoretical and methodological analysis of challenges, risks and threats in modern theory of national security." Vojno delo 74, no. 2 (2022): 1–17. http://dx.doi.org/10.5937/vojdelo2202001b.
Повний текст джерела