Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Security measures.

Zeitschriftenartikel zum Thema „Security measures“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Security measures" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Gunuganti, Anvesh, and Srikanth Mandru. "Securing Crypto Currency Exchanges: Implementing Cutting - Edge Security Measures for Enhanced Protection." International Journal of Science and Research (IJSR) 12, no. 1 (2023): 1273–77. https://doi.org/10.21275/sr24531140255.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ramolia, Nidhi, Pranav Piyushbhai Tank, R. N. Ravikumar, Babar Zeb, Manish Kumar, and Sushil Kumar Singh. "Futuristic Metaverse: Security and Counter Measures." ICCK Transactions on Intelligent Systematics 2, no. 1 (2025): 49. https://doi.org/10.62762/tis.2024.194631.

Der volle Inhalt der Quelle
Annotation:
This paper presents a comprehensive analysis of the security and privacy challenges in the Metaverse, introducing a novel framework for evaluating and addressing these emerging threats. Our research makes three key contributions: (1) a systematic classification of Metaverse-specific security vulnerabilities across interconnected virtual and physical environments, (2) a framework for assessing privacy risks in AR/VR-enabled social interactions, and (3) targeted solutions for securing blockchain-based digital assets and identity management in the Metaverse. Our analysis highlights how traditiona
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

McCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Dr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures." Indian Journal of Applied Research 4, no. 4 (2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

D'souza, Jason John, and Seeza Franklin. "Li-Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Gupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar, and Mohinder Singh. "Networking and Security Measures." DESIDOC Bulletin of Information Technology 24, no. 2 (2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Rushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (2002): 1. http://dx.doi.org/10.1145/763944.763945.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Rushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (2002): 1. http://dx.doi.org/10.1145/763948.763945.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Stanton, Ray. "Weighing up security measures." Computer Fraud & Security 2006, no. 1 (2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Wood, Charles Cresson. "Floppy diskette security measures." Computers & Security 4, no. 3 (1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Li, Yan. "Network Security Protection Measures." Advanced Materials Research 971-973 (June 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.

Der volle Inhalt der Quelle
Annotation:
Safety is the premise of network operation, network security is not only a single point of security, but the safety of the information network, need to be done from various solid protection. Analyzed the current form and face all kinds of LAN network security threats and network security precautions, technology, this paper expounds the LAN the importance of the current network security in our lives.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

ARAVINDA A KUMAR and Divya TL. "Security measures implemented in RESTful API Development." Open Access Research Journal of Engineering and Technology 7, no. 1 (2024): 105–12. http://dx.doi.org/10.53022/oarjet.2024.7.1.0042.

Der volle Inhalt der Quelle
Annotation:
Protecting Application Programming Interfaces (APIs) is crucial for securing sensitive data and ensuring the stability of web applications. This paper examines the effectiveness of key security practices, focusing on token-based authentication and password hashing techniques. It highlights the use of JSON Web Tokens (JWT) for authentication, detailing how JWTs enhance data security by incorporating claims and expiration details to mitigate unauthorized access risks. The paper also covers the application of `bcrypt` for password hashing through the `passlib` library, demonstrating its role in s
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Valera, Jasmine P., and Sunguk Lee. "Security Measures in Overcoming Mobile IPv6 Security Issues." International Journal of Database Theory and Application 9, no. 7 (2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Khabirov, Artur Ilfarovich, and Gulnara Mullanurovna Khamitova. "Security Measures and Liability Measures in Loan Agreements." Journal of Politics and Law 12, no. 5 (2019): 1. http://dx.doi.org/10.5539/jpl.v12n5p1.

Der volle Inhalt der Quelle
Annotation:
The Civil Code of the Russian Federation regulates the use of various measures to protect violated rights and interests: first, these include universal methods for protecting civil rights (article 12 of the Civil Code); second, these include provisions of Chapter 25 of the Civil Code regarding the liability for violating one's obligations; both of them jointly comprising the institution of protection of civil rights. This article studies the issue of consequences for violating a party's duties under a loan agreement. The article differentiates safeguarding measures and liabilit
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Nelson, Masese. "Security Measures for Protecting of Information Technology Assets." International Journal of Science and Research (IJSR) 11, no. 2 (2022): 401–5. http://dx.doi.org/10.21275/sr22129224133.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Malazizi, Nahid. "Tourism and International Borders: Global Health Security Measures." International Journal of Science and Research (IJSR) 10, no. 10 (2021): 900–904. https://doi.org/10.21275/sr211012113522.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Christin, Nicolas. "The effectiveness of security measures." Communications of the ACM 65, no. 9 (2022): 92. http://dx.doi.org/10.1145/3547132.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Gupta, Anish, Vimal Bibhu, and Rashid Hussain. "Security Measures in Data Mining." International Journal of Information Engineering and Electronic Business 4, no. 3 (2012): 34–39. http://dx.doi.org/10.5815/ijieeb.2012.03.05.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Uffen, Jörg, and Michael H. Breitner. "Management of Technical Security Measures." International Journal of Social and Organizational Dynamics in IT 3, no. 1 (2013): 14–31. http://dx.doi.org/10.4018/ijsodit.2013010102.

Der volle Inhalt der Quelle
Annotation:
Organizations are investing substantial resources in technical security measures that aim at preventively protecting their information assets. The way management – or information security executives – deals with potential security measures varies individually and depends on personality traits and cognitive factors. Based on the Theory of Planned Behavior, the authors examine the relationship between the personality traits of conscientiousness, neuroticism and openness with attitudes and intentions towards managing technical security measures. The highly relevant moderating role of compliance f
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Courtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Keenan, Debra Palmer, Christine Olson, James C. Hersey, and Sondra M. Parmer. "Measures of Food Insecurity/Security." Journal of Nutrition Education 33 (September 2001): S49—S58. http://dx.doi.org/10.1016/s1499-4046(06)60069-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

TREMBLAY, JEAN-FRANÇOIS. "SECURITY MEASURES IMPEDE U.S. VISITS." Chemical & Engineering News 81, no. 11 (2003): 40–41. http://dx.doi.org/10.1021/cen-v081n011.p040.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Feher, Ben, Lior Sidi, Asaf Shabtai, Rami Puzis, and Leonardas Marozas. "WebRTC security measures and weaknesses." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.092138.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Marozas, Leonardas, Asaf Shabtai, Rami Puzis, Ben Feher, and Lior Sidi. "WebRTC security measures and weaknesses." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.10013302.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

J A, Smitha, Rakshith G Raj, Sumanth J Samuel, and Pramath P Yaji. "Security Measures of Textual Data." International Journal of Innovative Research in Information Security 9, no. 03 (2023): 55–60. http://dx.doi.org/10.26562/ijiris.2023.v0903.01.

Der volle Inhalt der Quelle
Annotation:
As the volume and importance of textual data in data science continues to grow, combined with advancements in its techniques, it has created numerous opportunities for extracting valuable insights from textual information. However, privacy and the security of private data are issues that are brought up by the analysis of text data. This paper presents an in-depth analysis of security measures specifically designed for protecting textual data in data science applications. It explores various techniques and strategies to safeguard the confidentiality, integrity, and availability of textual data
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Adıgüzel, Selminaz, and Murat Düzgün. "Air Transportation Security Measures: Ics2." Journal of Aviation 9, no. 1 (2025): 168–80. https://doi.org/10.30518/jav.1591826.

Der volle Inhalt der Quelle
Annotation:
In this research, ICS 2 security measures in airline transportation were examined. The aim of this research is to investigate security measures in airline transportation and the economic effects of the ICS 2 application which the EU has implemented in customs on air transportation. The EU Commission with its proposal for a new Customs Code (R-UCC) has proposed that the EU Customs Data Center is managed by the national EU Customs Authority that be given to the person declaring that the raw material, product or semi-processed product has been brought into the EU or removed from the EU. In this r
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Munnangi, Sivasatyanarayanareddy. "Best Practices for Implementing Robust Security Measures." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 2 (2019): 2032–56. https://doi.org/10.61841/turcomat.v10i2.15041.

Der volle Inhalt der Quelle
Annotation:
In today’s digital landscape, organizations leveraging Pega Business Process Management (BPM) face significant security challenges as they strive to protect sensitive business processes from evolving cyber threats. This article explores best practices for implementing robust security measures within Pega BPM environments, focusing on secure configuration settings, identity and access management (IAM), encryption standards, and real-time monitoring. By integrating Pega BPM with broader cybersecurity frameworks, organizations can proactively detect and mitigate vulnerabilities, ensuring the inte
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

M., Chorna, and Shumilo O. "CREATING A PACKAGE OF MEASURES AIMED AT MANAGING THE ECONOMIC SECURITY OF RETAIL TRADE ENTERPRISES." ECONOMIC STRATEGY AND PROSPECTS OF TRADE AND SERVICES SECTOR DEVELOPMENT 2 (30) (January 9, 2020): 78–88. https://doi.org/10.5281/zenodo.3602147.

Der volle Inhalt der Quelle
Annotation:
<em>It is noted that improving the efficiency of economic security management of the enterprise contributes to the sustainable operation of the establishment in the market and its growth in the future and it should be based on the development and implementation of measures to ensure and guarantee economic security. It is also stated that the basis for the development and justification of measures which improve the enterprise economic security is to compare the enterprise with other enterprises in the competitive group in the market.</em> <em>A methodological approach to the formation of a pack
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Gadre, Monica. "Data Security in Cloud Security Attacks and Preventive Measures." International Journal for Research in Applied Science and Engineering Technology 6, no. 3 (2018): 529–36. http://dx.doi.org/10.22214/ijraset.2018.3085.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.

Der volle Inhalt der Quelle
Annotation:
Software defined networking (SDN), a new attempt in addressing the existing challenges in the legacy network architecture, is lime-lighted due to its simplified approach in managing the networks and its capability of programmability. In progressing with software defined networks implementation, security remains a high priority focus. The advantage of SDN itself opens a wide ground in posing new security threats and challenges. Focusing on the security of the SDN is a prime factor as it reflects on the growth of SDN technology implementation. This article focuses on the various existing securit
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Khan, Koffka. "Securing Immersive Realms: A Review of Security Measures in 360-Degree Virtual Reality Video Streaming." International Journal of Science and Research (IJSR) 12, no. 12 (2023): 727–33. http://dx.doi.org/10.21275/sr231208045505.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Jason, John D'souza, and Franklin Seeza. "Li Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 2588–90. https://doi.org/10.31142/ijtsrd15706.

Der volle Inhalt der Quelle
Annotation:
As we see in todays world, all institutes as well as organizations are planning to shrink the size hardware and are even trying to make it portable, olden days we had local area network wires to transmit data over devices then came in Wi Fi which didn&#39;t have wires but was able to transmit data over devices but its sources are usually wired an sometimes not portable to every place and then now industries are planning to implement li fi which uses a simple light to transmit data over devices users will just have to carry a small light source which will transmit the data over devices but what
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Popescu, Mirona Ana Maria, Andreea Barbu, Petronela Cristina Simion, and Georgiana Moiceanu. "Research on Data Security Measures in Romania." Proceedings of the International Conference on Business Excellence 18, no. 1 (2024): 3277–83. http://dx.doi.org/10.2478/picbe-2024-0267.

Der volle Inhalt der Quelle
Annotation:
Abstract Information from the online environment is constantly increasing, as well as its value. In this context, for companies data security becomes a central pillar to protect sensitive information and to ensure its integrity, confidentiality and availability (CIA Triangle). The security measures adopted by the companies also increase the degree of trust of their partners and customers. But data security is not just about implementing the right technologies and policies; equally important is the awareness and proper training of personnel who interact with this data or the applications that c
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Torres, C. G., M. E. Turner, J. R. Harkess, and G. R. Istre. "Security measures for AIDS and HIV." American Journal of Public Health 81, no. 2 (1991): 210–11. http://dx.doi.org/10.2105/ajph.81.2.210.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Der volle Inhalt der Quelle
Annotation:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are looph
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Damoah, Dominic, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-Sam, and Brighter Agyeman. "Improving Security Measures on Grid Computing." International Journal of Computer Applications 83, no. 9 (2013): 6–11. http://dx.doi.org/10.5120/14474-2490.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Rudakova, O. Yu, T. A. Rudakova, and I. N. Sannikova. "Spatial measures for ensuring economic security." National Interests: Priorities and Security 16, no. 1 (2020): 44–59. http://dx.doi.org/10.24891/ni.16.1.44.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Pevnev, Volodimir, and Serhii Kapchynskyi. "DATABASE SECURITY: THREATS AND PREVENTIVE MEASURES." Advanced Information Systems 2, no. 1 (2018): 69–72. http://dx.doi.org/10.20998/2522-9052.2018.1.13.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Benjamin, John, G. Sirmans, and Emily Zietz. "Security Measures and the Apartment Market." Journal of Real Estate Research 14, no. 3 (1997): 347–58. http://dx.doi.org/10.1080/10835547.1997.12090900.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

FUJITA, Shintaro, and Kenji SAWADA. "Security Measures Technology for Control Systems." Journal of The Institute of Electrical Engineers of Japan 142, no. 4 (2022): 212–14. http://dx.doi.org/10.1541/ieejjournal.142.212.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Walsh, Matthew, and William Streilein. "Security Measures for Safeguarding the Bioeconomy." Health Security 18, no. 4 (2020): 313–17. http://dx.doi.org/10.1089/hs.2020.0029.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Schuldt, Alison. "Security measures at the nuclear pore." Nature Cell Biology 6, no. 2 (2004): 91. http://dx.doi.org/10.1038/ncb0204-91.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Schroden, Jonathan J. "Measures for Security in a Counterinsurgency." Journal of Strategic Studies 32, no. 5 (2009): 715–44. http://dx.doi.org/10.1080/01402390903189394.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Alessi, Dario R., and Yogesh Kulathu. "Security measures of a master regulator." Nature 497, no. 7448 (2013): 193–94. http://dx.doi.org/10.1038/nature12101.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

KITAURA, Shigeru, and Sumiaki OHOTUYAMA. "Verification about security measures for derailment." Proceedings of the Transportation and Logistics Conference 2017.26 (2017): 1018. http://dx.doi.org/10.1299/jsmetld.2017.26.1018.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Andrews, Christine. "Improving data security measures in business." Computer Fraud & Security 2009, no. 8 (2009): 8–10. http://dx.doi.org/10.1016/s1361-3723(09)70099-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Horak, O. J. "Means and Measures for Data Security." IFAC Proceedings Volumes 22, no. 19 (1989): 1–6. http://dx.doi.org/10.1016/s1474-6670(17)52787-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Collinson, Helen. "Win 95 security measures mollify users." Computers & Security 15, no. 2 (1996): 125–26. http://dx.doi.org/10.1016/0167-4048(96)89336-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Cieśla, Rafał. "Security measures in combating document falsifiers." Nowa Kodyfikacja Prawa Karnego 44 (December 29, 2017): 41–53. http://dx.doi.org/10.19195/2084-5065.44.4.

Der volle Inhalt der Quelle
Annotation:
Evolution of political and economic transformation has to a considerable degree contributed to the increase of crimes committed with fake documents. Development of civilisation and technological progress necessitate protection of public documents. To ensure security and trust to the institutions issuing documents their producers and issu­ers use various security measures to protect them against falsification. Combination of advanced technologies with biometric identifiers is a necessary solution. Implementation of advanced security measures should, at least for a certain period of time, hinder
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!