Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Security threats“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Security threats" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Security threats"
Isokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain." Teisė 122 (March 30, 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.
Der volle Inhalt der QuelleA. K. Bagdat and Z. M. Alimzhanova. "INFORMATION SECURITY THREATS FOR INTEGRATION SYSTEMS." Bulletin of Toraighyrov University. Physics & Mathematics series, no. 4.2024 (December 30, 2024): 20–29. https://doi.org/10.48081/dfqb8925.
Der volle Inhalt der QuellePrayuda, Rendi, Fitrisia Munir, Riezki Adma Jayandi, Dini Tiara Sasmi, Cifebrima Suyastri, and Rio Sundari. "The Global Pandemic of COVID-19 as a Non-Traditional Security Threat in Indonesia." Andalas Journal of International Studies (AJIS) 11, no. 1 (2022): 63. http://dx.doi.org/10.25077/ajis.11.1.63-77.2022.
Der volle Inhalt der QuellePASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.
Der volle Inhalt der QuelleTanvir Rahman Akash, Nusrat Jahan Sany, Lamia Akter, and Sanjida Akter Sarna. "Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 248–63. https://doi.org/10.32996/jcsts.2025.7.3.90.
Der volle Inhalt der QuelleSaddam RA, Angga Pranata, Sugiono, et al. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.
Der volle Inhalt der QuelleJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (2013): 6. http://dx.doi.org/10.33317/ssurj.v3i1.62.
Der volle Inhalt der QuellePOPESCU, Eliza-Elena. "VoIP Security Threats." International Journal of Information Security and Cybercrime 13, no. 1 (2024): 66–70. http://dx.doi.org/10.19107/ijisc.2024.01.06.
Der volle Inhalt der QuelleJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (2013): 6. http://dx.doi.org/10.33317/ssurj.62.
Der volle Inhalt der QuelleSaptono, Edy, Ribka Keiza, and Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia." Technium Social Sciences Journal 23 (September 9, 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.
Der volle Inhalt der QuelleDissertationen zum Thema "Security threats"
Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Der volle Inhalt der QuelleMahmood, Faisal. "SIP Security Threats and Countermeasures." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18126.
Der volle Inhalt der QuelleSafdar, Naveed. "Internal security threats to Pakistan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FSafdar.pdf.
Der volle Inhalt der QuelleXu, Zhang. "Understanding Security Threats in Cloud." W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477067957.
Der volle Inhalt der QuelleCramer, Jane Kellett 1964. "National security panics : overestimating threats to national security." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8312.
Der volle Inhalt der QuelleWullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.
Der volle Inhalt der QuelleByman, G. (Gabriel). "Connected devices:security threats vs. implemented security." Bachelor's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201704111464.
Der volle Inhalt der QuelleBiswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.
Der volle Inhalt der QuelleZakharov, I. "Threats to information security of the enterprise." Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/7954.
Der volle Inhalt der QuelleGong, Xuwei. "Security Threats and Countermeasures for Connected Vehicles." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.
Der volle Inhalt der QuelleBücher zum Thema "Security threats"
1953-, Aldis Anne, and Herd Graeme P, eds. Soft security threats and European security. Routledge, 2005.
Den vollen Inhalt der Quelle findenUnited States. Bureau of Alcohol, Tobacco, and Firearms., ed. Bomb threats and physical security planning. The Bureau, 1987.
Den vollen Inhalt der Quelle findenBarnett, Dana, and Efraim Karsh. Soft Threats to National Security. Routledge, 2021. http://dx.doi.org/10.4324/9781003243151.
Der volle Inhalt der QuelleProbst, Christian W., Jeffrey Hunker, Dieter Gollmann, and Matt Bishop, eds. Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.
Der volle Inhalt der QuelleJones, J. Anthony A., Trahel G. Vardanian, and Christina Hakopian, eds. Threats to Global Water Security. Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2344-5.
Der volle Inhalt der QuelleGaufman, Elizaveta. Security Threats and Public Perception. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-43201-4.
Der volle Inhalt der QuelleApikyan, Samuel, and David Diamond, eds. Nuclear Threats and Security Challenges. Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9894-5.
Der volle Inhalt der QuelleFutter, Andrew, ed. Threats to Euro-Atlantic Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-19730-8.
Der volle Inhalt der QuelleRusdi, Siswanto. Maritime security and its threats. Maritime Security Coordinating Board, 2012.
Den vollen Inhalt der Quelle findenOffice, New Zealand Audit. Managing threats to domestic security. Audit Office, 2003.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Security threats"
Möller, Dietmar P. F. "Threats and Threat Intelligence." In Advances in Information Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_2.
Der volle Inhalt der QuelleDeFranco, Joanna F., and Bob Maley. "Security Threats." In What Every Engineer Should Know About Cyber Security and Digital Forensics, 2nd ed. CRC Press, 2022. http://dx.doi.org/10.1201/9781003245223-1.
Der volle Inhalt der QuelleLal, Rollie. "Economic Threats." In Security Studies, 4th ed. Routledge, 2023. http://dx.doi.org/10.4324/9781003247821-35.
Der volle Inhalt der QuelleKhan, Suhel Ahmad, Rajeev Kumar, and Raees Ahmad Khan. "Threats to Security." In Software Security. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003330516-3.
Der volle Inhalt der QuelleKaunert, Christian, and Ori Wertman. "Reconceptualizing Security Threats." In Handbook of Security Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-91875-4_41.
Der volle Inhalt der QuelleKurze, Arnaud, and Christopher K. Lamont. "Global Security Threats." In Mapping Global Justice. Routledge, 2022. http://dx.doi.org/10.4324/9781003143819-15.
Der volle Inhalt der QuelleKaunert, Christian, and Ori Wertman. "Reconceptualizing Security Threats." In Handbook of Security Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-51761-2_41-1.
Der volle Inhalt der QuelleKhalil, Kasem, Haytham Idriss, Tarek Idriss, and Magdy Bayoumi. "PUF: Security Threats." In Lightweight Hardware Security and Physically Unclonable Functions. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-76328-1_6.
Der volle Inhalt der QuelleFennelly, Lawrence J., and Marianna A. Perry. "Insider Threats." In Security Officers and Supervisors. CRC Press, 2024. http://dx.doi.org/10.4324/9781003402718-124.
Der volle Inhalt der QuelleRenwick, Neil. "Pandemic Threats." In Northeast Asian Critical Security. Palgrave Macmillan UK, 2004. http://dx.doi.org/10.1057/9780230287181_4.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Security threats"
Singh, Kamal, Rohit Saxena, and Brijesh Kumar. "AI Security: Cyber Threats and Threat-Informed Defense." In 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, 2024. https://doi.org/10.1109/csnet64211.2024.10851770.
Der volle Inhalt der QuelleRouzbahani, Mani Asgari, and Hossein Gharaee Garakani. "Blockchain Security Threats: Survey." In 2024 11th International Symposium on Telecommunications (IST). IEEE, 2024. https://doi.org/10.1109/ist64061.2024.10843593.
Der volle Inhalt der QuelleTatarka, Slavomír, Michal Janovec, and Jozef Papán. "IoT Security Threats and Solutions." In 2024 International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2024. https://doi.org/10.1109/iceta63795.2024.10850844.
Der volle Inhalt der QuelleR.Tamilkodi, Mrs.A.Harika, Mogalapalli Harika, P. Venkata Sai Abhilash, Chenagana Harish Sai, and Pranav Ps. "Enhanced Security Measures Against Phishing Threats." In 2024 5th International Conference on Data Intelligence and Cognitive Informatics (ICDICI). IEEE, 2024. https://doi.org/10.1109/icdici62993.2024.10810772.
Der volle Inhalt der QuelleAsassfeh, Mahmoud Rajallah, Esraa Abu Elsoud, Sultan Mohammed Albilasi, et al. "Cloud Security: Analyzing Threats and Challenges." In 2024 25th International Arab Conference on Information Technology (ACIT). IEEE, 2024. https://doi.org/10.1109/acit62805.2024.10877035.
Der volle Inhalt der QuelleAlfaw, Aysha H., and Alauddin Al-Omary. "5G Security Threats." In 2022 International Conference on Data Analytics for Business and Industry (ICDABI). IEEE, 2022. http://dx.doi.org/10.1109/icdabi56818.2022.10041502.
Der volle Inhalt der QuelleShrivas, Mahendra Kumar, Thomas Yeboah Dean, and S. Selva Brunda. "The Disruptive Blockchain Security Threats and Threat Categorization." In 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 2020. http://dx.doi.org/10.1109/icpc2t48082.2020.9071475.
Der volle Inhalt der QuelleAlwaheidi, Mohammed, Shareeful Islam, Spyridon Papastergiou, and Kitty Kioskli. "Integrating Human Factors into Data-driven Threat Management for Overall Security Enhancement." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004778.
Der volle Inhalt der QuelleJames, I. "Modelling ultraviolet threats." In SPIE Security + Defence, edited by David H. Titterton, Robert J. Grasso, and Mark A. Richardson. SPIE, 2016. http://dx.doi.org/10.1117/12.2250332.
Der volle Inhalt der QuellePutz, Benedikt, and Gunther Pernul. "Detecting Blockchain Security Threats." In 2020 IEEE International Conference on Blockchain (Blockchain). IEEE, 2020. http://dx.doi.org/10.1109/blockchain50366.2020.00046.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Security threats"
Ravikumar, Jeevarathinam. Cyber Security Threats - Past|Present|Future. River Publishers, 2017. http://dx.doi.org/10.13052/popcas016.
Der volle Inhalt der QuelleKastner, Ryan, and Ted Huffmire. Threats and Challenges in Reconfigurable Hardware Security. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada511928.
Der volle Inhalt der QuelleWahyono, Pujo. Transnational Crime and Security Threats in Indonesia. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada518422.
Der volle Inhalt der QuelleYi, J., T. Clausen, and U. Herberg. Security Threats to Simplified Multicast Forwarding (SMF). RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7985.
Der volle Inhalt der QuelleTschofenig, H., and D. Kroeselberg. Security Threats for Next Steps in Signaling (NSIS). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4081.
Der volle Inhalt der QuelleResearch Institute (IFPRI), International Food Policy. Migration: Tightening borders and threats to food security. International Food Policy Research Institute, 2018. http://dx.doi.org/10.2499/9780896292970_05.
Der volle Inhalt der QuelleAlbright, David E. Threats to US Security in a Postcontainment World. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada271602.
Der volle Inhalt der QuelleFord, James L., and C. R. Schuller. Controlling Threats to Nuclear Security: A Hollistic Model. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada421832.
Der volle Inhalt der QuelleYi, J., U. Herberg, and T. Clausen. Security Threats for the Neighborhood Discovery Protocol (NHDP). RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7186.
Der volle Inhalt der QuelleBlank, Stephen J. Threats to Russian Security: the View From Moscow. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada382720.
Der volle Inhalt der Quelle