Zeitschriftenartikel zum Thema „Security measures“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Security measures" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Gunuganti, Anvesh, and Srikanth Mandru. "Securing Crypto Currency Exchanges: Implementing Cutting - Edge Security Measures for Enhanced Protection." International Journal of Science and Research (IJSR) 12, no. 1 (2023): 1273–77. https://doi.org/10.21275/sr24531140255.
Der volle Inhalt der QuelleRamolia, Nidhi, Pranav Piyushbhai Tank, R. N. Ravikumar, Babar Zeb, Manish Kumar, and Sushil Kumar Singh. "Futuristic Metaverse: Security and Counter Measures." ICCK Transactions on Intelligent Systematics 2, no. 1 (2025): 49. https://doi.org/10.62762/tis.2024.194631.
Der volle Inhalt der QuelleMcCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Der volle Inhalt der QuelleDr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures." Indian Journal of Applied Research 4, no. 4 (2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.
Der volle Inhalt der QuelleD'souza, Jason John, and Seeza Franklin. "Li-Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.
Der volle Inhalt der QuelleGupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar, and Mohinder Singh. "Networking and Security Measures." DESIDOC Bulletin of Information Technology 24, no. 2 (2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.
Der volle Inhalt der QuelleRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (2002): 1. http://dx.doi.org/10.1145/763944.763945.
Der volle Inhalt der QuelleRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (2002): 1. http://dx.doi.org/10.1145/763948.763945.
Der volle Inhalt der QuelleStanton, Ray. "Weighing up security measures." Computer Fraud & Security 2006, no. 1 (2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.
Der volle Inhalt der QuelleWood, Charles Cresson. "Floppy diskette security measures." Computers & Security 4, no. 3 (1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.
Der volle Inhalt der QuelleLi, Yan. "Network Security Protection Measures." Advanced Materials Research 971-973 (June 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.
Der volle Inhalt der QuelleARAVINDA A KUMAR and Divya TL. "Security measures implemented in RESTful API Development." Open Access Research Journal of Engineering and Technology 7, no. 1 (2024): 105–12. http://dx.doi.org/10.53022/oarjet.2024.7.1.0042.
Der volle Inhalt der QuelleValera, Jasmine P., and Sunguk Lee. "Security Measures in Overcoming Mobile IPv6 Security Issues." International Journal of Database Theory and Application 9, no. 7 (2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.
Der volle Inhalt der QuelleKhabirov, Artur Ilfarovich, and Gulnara Mullanurovna Khamitova. "Security Measures and Liability Measures in Loan Agreements." Journal of Politics and Law 12, no. 5 (2019): 1. http://dx.doi.org/10.5539/jpl.v12n5p1.
Der volle Inhalt der QuelleNelson, Masese. "Security Measures for Protecting of Information Technology Assets." International Journal of Science and Research (IJSR) 11, no. 2 (2022): 401–5. http://dx.doi.org/10.21275/sr22129224133.
Der volle Inhalt der QuelleMalazizi, Nahid. "Tourism and International Borders: Global Health Security Measures." International Journal of Science and Research (IJSR) 10, no. 10 (2021): 900–904. https://doi.org/10.21275/sr211012113522.
Der volle Inhalt der QuelleChristin, Nicolas. "The effectiveness of security measures." Communications of the ACM 65, no. 9 (2022): 92. http://dx.doi.org/10.1145/3547132.
Der volle Inhalt der QuelleGupta, Anish, Vimal Bibhu, and Rashid Hussain. "Security Measures in Data Mining." International Journal of Information Engineering and Electronic Business 4, no. 3 (2012): 34–39. http://dx.doi.org/10.5815/ijieeb.2012.03.05.
Der volle Inhalt der QuelleUffen, Jörg, and Michael H. Breitner. "Management of Technical Security Measures." International Journal of Social and Organizational Dynamics in IT 3, no. 1 (2013): 14–31. http://dx.doi.org/10.4018/ijsodit.2013010102.
Der volle Inhalt der QuelleCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Der volle Inhalt der QuelleKeenan, Debra Palmer, Christine Olson, James C. Hersey, and Sondra M. Parmer. "Measures of Food Insecurity/Security." Journal of Nutrition Education 33 (September 2001): S49—S58. http://dx.doi.org/10.1016/s1499-4046(06)60069-9.
Der volle Inhalt der QuelleTREMBLAY, JEAN-FRANÇOIS. "SECURITY MEASURES IMPEDE U.S. VISITS." Chemical & Engineering News 81, no. 11 (2003): 40–41. http://dx.doi.org/10.1021/cen-v081n011.p040.
Der volle Inhalt der QuelleFeher, Ben, Lior Sidi, Asaf Shabtai, Rami Puzis, and Leonardas Marozas. "WebRTC security measures and weaknesses." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.092138.
Der volle Inhalt der QuelleMarozas, Leonardas, Asaf Shabtai, Rami Puzis, Ben Feher, and Lior Sidi. "WebRTC security measures and weaknesses." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.10013302.
Der volle Inhalt der QuelleJ A, Smitha, Rakshith G Raj, Sumanth J Samuel, and Pramath P Yaji. "Security Measures of Textual Data." International Journal of Innovative Research in Information Security 9, no. 03 (2023): 55–60. http://dx.doi.org/10.26562/ijiris.2023.v0903.01.
Der volle Inhalt der QuelleAdıgüzel, Selminaz, and Murat Düzgün. "Air Transportation Security Measures: Ics2." Journal of Aviation 9, no. 1 (2025): 168–80. https://doi.org/10.30518/jav.1591826.
Der volle Inhalt der QuelleMunnangi, Sivasatyanarayanareddy. "Best Practices for Implementing Robust Security Measures." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 2 (2019): 2032–56. https://doi.org/10.61841/turcomat.v10i2.15041.
Der volle Inhalt der QuelleM., Chorna, and Shumilo O. "CREATING A PACKAGE OF MEASURES AIMED AT MANAGING THE ECONOMIC SECURITY OF RETAIL TRADE ENTERPRISES." ECONOMIC STRATEGY AND PROSPECTS OF TRADE AND SERVICES SECTOR DEVELOPMENT 2 (30) (January 9, 2020): 78–88. https://doi.org/10.5281/zenodo.3602147.
Der volle Inhalt der QuelleGadre, Monica. "Data Security in Cloud Security Attacks and Preventive Measures." International Journal for Research in Applied Science and Engineering Technology 6, no. 3 (2018): 529–36. http://dx.doi.org/10.22214/ijraset.2018.3085.
Der volle Inhalt der QuelleKaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.
Der volle Inhalt der QuelleKhan, Koffka. "Securing Immersive Realms: A Review of Security Measures in 360-Degree Virtual Reality Video Streaming." International Journal of Science and Research (IJSR) 12, no. 12 (2023): 727–33. http://dx.doi.org/10.21275/sr231208045505.
Der volle Inhalt der QuelleJason, John D'souza, and Franklin Seeza. "Li Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 2588–90. https://doi.org/10.31142/ijtsrd15706.
Der volle Inhalt der QuellePopescu, Mirona Ana Maria, Andreea Barbu, Petronela Cristina Simion, and Georgiana Moiceanu. "Research on Data Security Measures in Romania." Proceedings of the International Conference on Business Excellence 18, no. 1 (2024): 3277–83. http://dx.doi.org/10.2478/picbe-2024-0267.
Der volle Inhalt der QuelleTorres, C. G., M. E. Turner, J. R. Harkess, and G. R. Istre. "Security measures for AIDS and HIV." American Journal of Public Health 81, no. 2 (1991): 210–11. http://dx.doi.org/10.2105/ajph.81.2.210.
Der volle Inhalt der QuelleZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Der volle Inhalt der QuelleDamoah, Dominic, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-Sam, and Brighter Agyeman. "Improving Security Measures on Grid Computing." International Journal of Computer Applications 83, no. 9 (2013): 6–11. http://dx.doi.org/10.5120/14474-2490.
Der volle Inhalt der QuelleRudakova, O. Yu, T. A. Rudakova, and I. N. Sannikova. "Spatial measures for ensuring economic security." National Interests: Priorities and Security 16, no. 1 (2020): 44–59. http://dx.doi.org/10.24891/ni.16.1.44.
Der volle Inhalt der QuellePevnev, Volodimir, and Serhii Kapchynskyi. "DATABASE SECURITY: THREATS AND PREVENTIVE MEASURES." Advanced Information Systems 2, no. 1 (2018): 69–72. http://dx.doi.org/10.20998/2522-9052.2018.1.13.
Der volle Inhalt der QuelleBenjamin, John, G. Sirmans, and Emily Zietz. "Security Measures and the Apartment Market." Journal of Real Estate Research 14, no. 3 (1997): 347–58. http://dx.doi.org/10.1080/10835547.1997.12090900.
Der volle Inhalt der QuelleFUJITA, Shintaro, and Kenji SAWADA. "Security Measures Technology for Control Systems." Journal of The Institute of Electrical Engineers of Japan 142, no. 4 (2022): 212–14. http://dx.doi.org/10.1541/ieejjournal.142.212.
Der volle Inhalt der QuelleLittlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Der volle Inhalt der QuelleWalsh, Matthew, and William Streilein. "Security Measures for Safeguarding the Bioeconomy." Health Security 18, no. 4 (2020): 313–17. http://dx.doi.org/10.1089/hs.2020.0029.
Der volle Inhalt der QuelleSchuldt, Alison. "Security measures at the nuclear pore." Nature Cell Biology 6, no. 2 (2004): 91. http://dx.doi.org/10.1038/ncb0204-91.
Der volle Inhalt der QuelleSchroden, Jonathan J. "Measures for Security in a Counterinsurgency." Journal of Strategic Studies 32, no. 5 (2009): 715–44. http://dx.doi.org/10.1080/01402390903189394.
Der volle Inhalt der QuelleAlessi, Dario R., and Yogesh Kulathu. "Security measures of a master regulator." Nature 497, no. 7448 (2013): 193–94. http://dx.doi.org/10.1038/nature12101.
Der volle Inhalt der QuelleKITAURA, Shigeru, and Sumiaki OHOTUYAMA. "Verification about security measures for derailment." Proceedings of the Transportation and Logistics Conference 2017.26 (2017): 1018. http://dx.doi.org/10.1299/jsmetld.2017.26.1018.
Der volle Inhalt der QuelleAndrews, Christine. "Improving data security measures in business." Computer Fraud & Security 2009, no. 8 (2009): 8–10. http://dx.doi.org/10.1016/s1361-3723(09)70099-5.
Der volle Inhalt der QuelleHorak, O. J. "Means and Measures for Data Security." IFAC Proceedings Volumes 22, no. 19 (1989): 1–6. http://dx.doi.org/10.1016/s1474-6670(17)52787-1.
Der volle Inhalt der QuelleCollinson, Helen. "Win 95 security measures mollify users." Computers & Security 15, no. 2 (1996): 125–26. http://dx.doi.org/10.1016/0167-4048(96)89336-9.
Der volle Inhalt der QuelleCieśla, Rafał. "Security measures in combating document falsifiers." Nowa Kodyfikacja Prawa Karnego 44 (December 29, 2017): 41–53. http://dx.doi.org/10.19195/2084-5065.44.4.
Der volle Inhalt der Quelle