Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „ENHANCING SECURITY“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "ENHANCING SECURITY" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "ENHANCING SECURITY"
J, Stephen, und Vidyavati Ramteke. „Enhancing Security Issues in Online Games“. Journal of Advanced Research in Dynamical and Control Systems 12, Nr. 8 (19.08.2020): 95–103. http://dx.doi.org/10.5373/jardcs/v12i8/20202451.
Der volle Inhalt der QuelleHaedar Akib,, Lutfi Saefullah, Husain Syam, Hamsu Abdul Gani,. „ENHANCING MARITIME SECURITY COOPERATION“. Psychology and Education Journal 58, Nr. 2 (10.02.2021): 4769–75. http://dx.doi.org/10.17762/pae.v58i2.2868.
Der volle Inhalt der QuelleShonola, Shaibu Adekunle, und Mike Joy. „Enhancing Mobile Learning Security“. International Journal on Integrating Technology in Education 5, Nr. 3 (30.09.2016): 01–15. http://dx.doi.org/10.5121/ijite.2016.5301.
Der volle Inhalt der QuelleHudson, R. B. „Enhancing Elderly Financial Security“. Public Policy & Aging Report 19, Nr. 3 (01.06.2009): 2. http://dx.doi.org/10.1093/ppar/19.3.2.
Der volle Inhalt der QuellePangalos, G., M. Khair und L. Bozios. „Enhancing medical database security“. Journal of Medical Systems 18, Nr. 4 (August 1994): 159–71. http://dx.doi.org/10.1007/bf00996700.
Der volle Inhalt der QuelleWilkinson, Paul. „Enhancing global aviation security?“ Terrorism and Political Violence 10, Nr. 3 (September 1998): 147–66. http://dx.doi.org/10.1080/09546559808427475.
Der volle Inhalt der QuelleArazi, B. „Enhancing Security with Nanotechnology“. Computer 39, Nr. 10 (Oktober 2006): 106–7. http://dx.doi.org/10.1109/mc.2006.338.
Der volle Inhalt der Quellevan der Meer, Sico. „Enhancing International Cyber Security“. Security and Human Rights 26, Nr. 2-4 (07.12.2015): 193–205. http://dx.doi.org/10.1163/18750230-02602004.
Der volle Inhalt der QuelleHnamte, Vanlalruata, Jamal Hussain, Samuel Lalmuanawma, Chhakchhuak Lalrinawma und Lalchhanhima Hmar. „Enhancing Secured Network Slicer for Cloud Security Systems“. Indian Journal Of Science And Technology 16, sp1 (03.10.2023): 179–91. http://dx.doi.org/10.17485/ijst/v16sp1.msc25.
Der volle Inhalt der QuelleModares, Hero, Amirhossein Moravejosharieh, Rosli Bin Salleh und Jaime Lloret. „Enhancing Security in Mobile IPv6“. ETRI Journal 36, Nr. 1 (01.02.2014): 51–61. http://dx.doi.org/10.4218/etrij.14.0113.0177.
Der volle Inhalt der QuelleDissertationen zum Thema "ENHANCING SECURITY"
Zhang, Linfan, und Shuang Zheng. „Enhancing QR Code Security“. Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-14145.
Der volle Inhalt der QuelleYue, Chuan. „Enhancing Web Browsing Security“. W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623575.
Der volle Inhalt der QuelleH, Fruchter Nathaniel. „Enhancing ISP-consumer security notifications“. Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122916.
Der volle Inhalt der QuelleThesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2019
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 79-85).
Security notification schemes hold great promise for improving both consumer cybersecurity and general network health as malware and other sources of malicious activity are becoming more prevalent on home networks. For example, botnets of Internet of Things devices engage in denial of service (DoS) attacks and ransomware holds data on personal and commercial systems hostage. Many of these threats are relatively opaque for an end user. An end user may not know that their smart device is participating in a DoS attack at all, unless they notice a protracted slowdown in network speeds. An upstream network provider like a consumer ISP has more visibility into the issue. Due to their privileged position, ISPs often have more data about the status of a malware infection, denial of service attack, or other malicious activity. This extra information can be of great benefit for the purposes of notification. For instance, an ISP may be able to notify a customer that a device on their network is being used for a DoS attackor that they see communication with a server involved in distributing ransomware. ISPs and other organizations that try and implement these schemes often run into a set of questions: How do I get the right data to power the notification? How do I ensure the user trusts the notification? Can I ensure the notification is not spoofed? Is there an optimal way to present the notification? How do I make sure a user takes the proper remedial action? This thesis presents a framework for new notification schemes to answer these questions by examining four key elements of a notification: form, delivery, and content. It also proposes multi-factor verification, a novel scheme to address trust and spoofing issues within a notification scheme. Finally, it provides a model for a new ISP-user security notification scheme within the context of the United States market and policy landscape.
by Nathaniel H. Fruchter.
S.M. in Technology and Policy
S.M.inTechnologyandPolicy Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program
Mohammed, Ali, Sachin Sama und Majeed Mohammed. „Enhancing Network Security in Linux Environment“. Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17144.
Der volle Inhalt der QuelleLiu, Ying. „Enhancing security for XML Web services“. Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27531.
Der volle Inhalt der QuelleKadhum, Hamza. „Enhancing Zigbee Security for Industrial Implementation“. Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279559.
Der volle Inhalt der QuelleZigbee nätverk är ett populärt val vid uppsättning av ett nätverk med låg strömförbrukning. Zigbees användningsområde är olika men den är väldigt populär inom industriell områdesövervakning och hemautomation. Däremot har Zigbees säkerhet varit en nackdel, då det har framkommit att den inte möter kraven för industriell användning. Arbetet kom till genom ett samarbete med Ericsson och KTH för att undersöka Zigbee nätverks implementation och säkerhet. Arbetet bearbetar olika säkerhetslösningar för Zigbee nätverk och hur den kan implementeras för att uppnå långtidsanvändning utan batteribyte. Säkerhetslösningar bygger på public-key samt symmetric key kryptografi algoritmer för att förbättra och öka Zigbees säkerhet genom autentisering och tillåtelse av noder som ansluter sig till nätverket. Nätverkets konfiguration för långtidsanvändning redovisas genom att jämföra olika polling tidsintervaller mellan meddelanden. Långtidsanvändning utan batteribyte är viktigt för att nätverket kommer implementeras i ett avlägset område som är svåråtkomlig. Arbetet redovisar och jämföra olika lösningar för att öka säkerheten för Zigbee nätverk. Den optimala lösningen för att uppnå autentisering samt tillåtelse av noder som ansluter sig uppnås med nyckel skapande genom secret-splitting metoden. Metoden följer NIST rekommendationer och anses vara säker, därav uppfyller den kraven för industriell implementation. Nätverkets säkerhet ökar samt bibehåller ett nätverk med låg strömförbrukning.
Makkar, Ankush. „Enhancing IoT Security Using 5G Capabilities“. Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85109.
Der volle Inhalt der QuelleFekete, Florian. „Civil-military relations : enhancing international security“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FFekete.pdf.
Der volle Inhalt der QuelleThesis advisor(s): Donald Abenheim, Karen Guttieri. Includes bibliographical references (p. 65-70). Also available online.
Kirkham, E., und C. Flew. „Strengthening embargoes and enhancing human security“. Thesis, International Alert, Saferworld and University of Bradford, Department of Peace Studies, Centre for International Co-operation and Security, 2003. http://hdl.handle.net/10454/4275.
Der volle Inhalt der QuelleArms embargoes are one of the principal tools of states in seeking to prevent, limit and bring an end to armed conflict and human rights abuses. Despite the frequency with which arms embargoes have been imposed, there are significant problems with their implementation. Pressure is therefore growing for the international governmental community to act in order to ensure that the political commitment embodied by the imposition of arms embargoes is matched by the commitment to ensure their rigorous enforcement and to achieve enhanced human security on the ground. Increasing the effectiveness of arms embargoes is a specific aim of the United Nations Programme of Action for Preventing and Combating the Illicit Trade in Small Arms and Light Weapons in All Its Aspects1 which specifically calls upon states "To take appropriate measures, including all legal or administrative means, against any activity that violates a United Nations Security Council arms embargo in accordance with the Charter of the United Nations".2 Accordingly, within the context of the implementation of the UN PoA, the overall aim of this paper is to explore ways in which the international community can act in order to strengthen the impact of arms embargoes and enhance human security. It will begin by examining the purposes, processes and effects relating to arms embargoes, with particular attention to those agreed at international (UN) level, and by highlighting issues of concern in each regard. An overview of the main issues and challenges facing implementation of arms embargoes will include the elaboration of three case-study examples showing the impact of UN arms embargoes on the availability of arms and on human security and a further five that illustrate the dilemmas faced by states in seeking to implement arms embargoes. Priority areas for attention in any international effort to strengthen the effectiveness of arms embargoes will be followed by more extensive proposals for enhancing international embargo regimes within the context of implementing the UN PoA. Whilst it is recognised that the UN PoA contains measures that relate only to the illicit trade in small arms and light weapons (SALW), if implemented fully, many of these would serve to strengthen the international apparatus of control, information exchange and provision of assistance relating to arms proliferation and misuse as a whole. In turn, this would greatly enhance the implementation of UN arms embargoes. Therefore, as well as providing an opportunity for reviewing progress on implementing the PoA, the first Biennial Meeting of States in July 2003 is clearly a major opportunity for states to address a number of the pressing challenges facing states in the implementation of UN embargoes.
Lee, Man Hee. „Architectural support for enhancing security in clusters“. [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2889.
Der volle Inhalt der QuelleBücher zum Thema "ENHANCING SECURITY"
Cuthbertson, Ian M., und David Robertson. Enhancing European Security. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7.
Der volle Inhalt der QuelleShultz, George Pratt. Enhancing diplomatic security. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1986.
Den vollen Inhalt der Quelle findenRowny, Edward L. SDI, enhancing security and stability. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.
Den vollen Inhalt der Quelle findenRowny, Edward L. SDI, enhancing security and stability. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.
Den vollen Inhalt der Quelle findenRowny, Edward L. SDI, enhancing security and stability. Washington, D.C: U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.
Den vollen Inhalt der Quelle findenRao, Vemuri V., Hrsg. Enhancing computer security with smart technology. Boca Raton, FL: Auerbach Publications, 2005.
Den vollen Inhalt der Quelle findenUnited States. Congressional Budget Office., Hrsg. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Den vollen Inhalt der Quelle findenUnited States. Congressional Budget Office., Hrsg. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Den vollen Inhalt der Quelle findenUnited States. Congressional Budget Office, Hrsg. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Den vollen Inhalt der Quelle findenUnited States. Congressional Budget Office, Hrsg. Enhancing U.S. security through foreign aid. Washington, D.C: Congress of the U.S., Congressional Budget Office., 1994.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "ENHANCING SECURITY"
Coffin, David. „Enhancing Security“. In Expert Oracle and Java Security, 267–328. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3832-4_11.
Der volle Inhalt der QuelleCuthbertson, Ian M., und David Robertson. „Security Through Behavioral Modification“. In Enhancing European Security, 186–206. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_11.
Der volle Inhalt der QuelleCuthbertson, Ian M., und David Robertson. „Introduction“. In Enhancing European Security, 3–21. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_1.
Der volle Inhalt der QuelleCuthbertson, Ian M., und David Robertson. „Arms Control and All That“. In Enhancing European Security, 166–85. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_10.
Der volle Inhalt der QuelleCuthbertson, Ian M., und David Robertson. „Combining Control and Enhancement“. In Enhancing European Security, 207–16. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_12.
Der volle Inhalt der QuelleCuthbertson, Ian M., und David Robertson. „Why Was INF Needed, and Would It Have Been Used?“ In Enhancing European Security, 23–35. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_2.
Der volle Inhalt der QuelleCuthbertson, Ian M., und David Robertson. „Conventional Force Imbalances: How to Count, and Can We Count?“ In Enhancing European Security, 36–53. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_3.
Der volle Inhalt der QuelleCuthbertson, Ian M., und David Robertson. „Conventional Force Imbalances: The Numbers“. In Enhancing European Security, 54–66. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_4.
Der volle Inhalt der QuelleCuthbertson, Ian M., und David Robertson. „Is There a Special European Interest in European Security?“ In Enhancing European Security, 67–106. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_5.
Der volle Inhalt der QuelleCuthbertson, Ian M., und David Robertson. „Is There a Pan-European Special Interest?“ In Enhancing European Security, 107–25. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_6.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "ENHANCING SECURITY"
Zisiadis, Dimitris, Spyros Kopsidas, Argyris Varalis und Leandros Tassiulas. „Enhancing WPS security“. In 2012 IFIP Wireless Days (WD). IEEE, 2012. http://dx.doi.org/10.1109/wd.2012.6402836.
Der volle Inhalt der QuelleFall, Moustapha, Chris Chuvalas, Nolan Warning, Max Rabiee und Carla Purdy. „Enhancing SCADA System Security“. In 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2020. http://dx.doi.org/10.1109/mwscas48704.2020.9184532.
Der volle Inhalt der QuelleSingh, Arun Kumar, Shefalika Ghosh Samaddar und Arun K. Misra. „Enhancing VPN security through security policy management“. In 2012 1st International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2012. http://dx.doi.org/10.1109/rait.2012.6194494.
Der volle Inhalt der QuellePriyanka, S. Sharon, und B. Nagajayanthi. „Enhancing security in Bluetooth networks“. In 2014 International Conference on Science Engineering and Management Research (ICSEMR). IEEE, 2014. http://dx.doi.org/10.1109/icsemr.2014.7043560.
Der volle Inhalt der QuelleTamaki, Kiyoshi. „Enhancing implementation security of QKD“. In Quantum Technologies and Quantum Information Science, herausgegeben von Mark T. Gruneisen, Miloslav Dusek und John G. Rarity. SPIE, 2017. http://dx.doi.org/10.1117/12.2280737.
Der volle Inhalt der QuelleThomson, I. R. „Performance enhancing proxies and security“. In IP over Satellite - The Next Generation: MPLS, VPN and DRM Delivered Services. IEE, 2003. http://dx.doi.org/10.1049/ic:20030055.
Der volle Inhalt der QuelleKetel, Mohammed. „Enhancing BYOD Security Through SDN“. In SoutheastCon 2018. IEEE, 2018. http://dx.doi.org/10.1109/secon.2018.8479230.
Der volle Inhalt der QuelleFarinholt, Jacob M., und James E. Troupe. „Enhancing QKD security with weak measurements“. In SPIE Security + Defence, herausgegeben von Mark T. Gruneisen, Miloslav Dusek und John G. Rarity. SPIE, 2016. http://dx.doi.org/10.1117/12.2241059.
Der volle Inhalt der QuelleDulski, R., P. Powalisz, M. Kastek und P. Trzaskawka. „Enhancing image quality produced by IR cameras“. In Security + Defence, herausgegeben von David A. Huckridge und Reinhard R. Ebert. SPIE, 2010. http://dx.doi.org/10.1117/12.864979.
Der volle Inhalt der QuelleChaudhry, Yuvraj Singh, Upasana Sharma und Ajay Rana. „Enhancing Security Measures of AI Applications“. In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2020. http://dx.doi.org/10.1109/icrito48877.2020.9197790.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "ENHANCING SECURITY"
Rowny, Edward L. SDI: Enhancing Security and Stability. Fort Belvoir, VA: Defense Technical Information Center, März 1988. http://dx.doi.org/10.21236/ada351518.
Der volle Inhalt der QuellePregenzer, A. L. Enhancing regional security agreements through cooperative monitoring. Office of Scientific and Technical Information (OSTI), Mai 1995. http://dx.doi.org/10.2172/79720.
Der volle Inhalt der QuelleYunus, Sarıkaya, und Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, Juli 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19167.
Der volle Inhalt der QuelleYunus, Sarıkaya, und Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, Juli 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19168.
Der volle Inhalt der QuelleAlbek, Aminuddin. The ASEAN Political-Security Community: Enhancing Defense Cooperation. Fort Belvoir, VA: Defense Technical Information Center, Dezember 2015. http://dx.doi.org/10.21236/ad1009058.
Der volle Inhalt der QuelleResearch Institute (IFPRI), International Food Policy. Increasing agricultural productivity and enhancing food security in Africa. Washington, DC: International Food Policy Research Institute, 2012. http://dx.doi.org/10.2499/9780896297937.
Der volle Inhalt der QuelleFritz, Tucker. Enhancing Reliability of Classified Shipments Between the Nuclear Security Enterprise. Office of Scientific and Technical Information (OSTI), März 2020. http://dx.doi.org/10.2172/1764607.
Der volle Inhalt der QuelleBarbeau, Sean. Enhancing Transit Safety and Security with Wireless Detection and Communication Technologies. Tampa, FL: University of South Florida, November 2008. http://dx.doi.org/10.5038/cutr-nctr-rr-2007-02.
Der volle Inhalt der QuelleCruz, Alfredo, Jeff Duffany und Alexander Lopez. Enhancing Research in Networking & System Security, and Forensics, in Puerto Rico. Fort Belvoir, VA: Defense Technical Information Center, März 2015. http://dx.doi.org/10.21236/ada622717.
Der volle Inhalt der QuelleFuller, Rob. Resilience in Pakistan: Evaluation of enhancing food security and resilience of small-scale farmers. Oxfam GB, Februar 2015. http://dx.doi.org/10.21201/2015.344180.
Der volle Inhalt der Quelle