Zeitschriftenartikel zum Thema „Security threats“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Security threats" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Isokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain." Teisė 122 (March 30, 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.
Der volle Inhalt der QuelleA. K. Bagdat and Z. M. Alimzhanova. "INFORMATION SECURITY THREATS FOR INTEGRATION SYSTEMS." Bulletin of Toraighyrov University. Physics & Mathematics series, no. 4.2024 (December 30, 2024): 20–29. https://doi.org/10.48081/dfqb8925.
Der volle Inhalt der QuellePrayuda, Rendi, Fitrisia Munir, Riezki Adma Jayandi, Dini Tiara Sasmi, Cifebrima Suyastri, and Rio Sundari. "The Global Pandemic of COVID-19 as a Non-Traditional Security Threat in Indonesia." Andalas Journal of International Studies (AJIS) 11, no. 1 (2022): 63. http://dx.doi.org/10.25077/ajis.11.1.63-77.2022.
Der volle Inhalt der QuellePASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.
Der volle Inhalt der QuelleTanvir Rahman Akash, Nusrat Jahan Sany, Lamia Akter, and Sanjida Akter Sarna. "Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 248–63. https://doi.org/10.32996/jcsts.2025.7.3.90.
Der volle Inhalt der QuelleSaddam RA, Angga Pranata, Sugiono, et al. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.
Der volle Inhalt der QuelleJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (2013): 6. http://dx.doi.org/10.33317/ssurj.v3i1.62.
Der volle Inhalt der QuellePOPESCU, Eliza-Elena. "VoIP Security Threats." International Journal of Information Security and Cybercrime 13, no. 1 (2024): 66–70. http://dx.doi.org/10.19107/ijisc.2024.01.06.
Der volle Inhalt der QuelleJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (2013): 6. http://dx.doi.org/10.33317/ssurj.62.
Der volle Inhalt der QuelleSaptono, Edy, Ribka Keiza, and Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia." Technium Social Sciences Journal 23 (September 9, 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.
Der volle Inhalt der QuelleSyomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.
Der volle Inhalt der QuelleSliusarenko, Iryna. "Essentiality and Classification of International Security Threats at the Global Level (Based on Resolutions of the UN General Assembly First Committee, 2014–2021)." International Relations: Theory and Practical Aspects, no. 13 (June 26, 2024): 57–70. https://doi.org/10.31866/2616-745X.13.2024.306861.
Der volle Inhalt der QuelleAyub, Kamran, and Roushdy Alshawa. "Threat Modelling and Security Enhancements in Wireless Body Area Networks for Smart Healthcare." Journal of Robotics and Automation Research 5, no. 3 (2024): 01–08. https://doi.org/10.33140/jrar.05.03.09.
Der volle Inhalt der QuelleJaiswal, Shruti, Himani Bansal, Shiv Naresh Shivhare, and Gulshan Shrivastava. "A Novel IoT Framework for Identifying and Mitigating Security Threats." Scalable Computing: Practice and Experience 26, no. 5 (2025): 2165–83. https://doi.org/10.12694/scpe.v26i5.4909.
Der volle Inhalt der QuelleSyed, Farzana Zaheer, and Saba Javed. "Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan." International Journal of Social Sciences and Management 4, no. 4 (2017): 267–74. http://dx.doi.org/10.3126/ijssm.v4i4.18503.
Der volle Inhalt der QuellePendergrass, John C., Karen Heart, C. Ranganathan, and V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine." International Journal of Healthcare Information Systems and Informatics 9, no. 4 (2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.
Der volle Inhalt der QuelleKarpavičiūtė, Ieva. "Securitization and Lithuania’s National Security Change." Lithuanian Foreign Policy Review 36, no. 1 (2017): 9–33. http://dx.doi.org/10.1515/lfpr-2017-0005.
Der volle Inhalt der QuelleAlbarrak, Khalied M. "Securing the Future of Web-Enabled IoT: A Critical Analysis of Web of Things Security." Applied Sciences 14, no. 23 (2024): 10867. http://dx.doi.org/10.3390/app142310867.
Der volle Inhalt der QuelleBeladiya, Vandan, and Mihir Sontakke. "Cyber Security SOC Analyst." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 2409–12. https://doi.org/10.22214/ijraset.2025.67835.
Der volle Inhalt der QuelleShaik Azeeza Farhana, Bommala Jagadeeswari, Chakka Pavani, Poornachand Anumolu, Naga Roop Kumar Ogirala, and Abdul Subhani. "Cyber security in the FinTech Sector: Securing Digital Transactions." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 06 (2025): 2265–67. https://doi.org/10.47392/irjaem.2025.0356.
Der volle Inhalt der QuelleSri, Kanth Mandru. "Explainable AI for Endpoint Security Threat Analysis." European Journal of Advances in Engineering and Technology 11, no. 1 (2024): 56–63. https://doi.org/10.5281/zenodo.13325168.
Der volle Inhalt der QuelleSmirnov, R. A., and S. N. Novikov. "Research on Information Security Risk Assessment Techniques." Interexpo GEO-Siberia 6 (May 18, 2022): 250–57. http://dx.doi.org/10.33764/2618-981x-2022-6-250-257.
Der volle Inhalt der QuelleHojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.
Der volle Inhalt der QuelleBatham, Diksha, Ghanshyam Prasad Dubey, Mohini Sharma, Shailendra Mourya, Ashish Singh, and Anushka Sharma. "Mobile Security – Light on Security Threats." International Journal of Emerging Technology and Advanced Engineering 14, no. 2 (2024): 25–34. https://doi.org/10.46338/ijetae0224_04.
Der volle Inhalt der QuelleMuliński, Tomasz. "ICT security in revenue administration - incidents, security incidents - detection, response, resolve." Studia Informatica. System and information technology 27, no. 2 (2023): 75–93. http://dx.doi.org/10.34739/si.2022.27.04.
Der volle Inhalt der QuelleTanwar, Prof Rakesh. "Cyber Security Challenges." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 564–66. https://doi.org/10.22214/ijraset.2025.66263.
Der volle Inhalt der Quelleصادق, بارزان. "Internal Security Threats on the Kurdistan Region – Iraq." Journal for Political and Security Studies 3, no. 6 (2020): 84–130. http://dx.doi.org/10.31271/jopss.10040.
Der volle Inhalt der QuelleKoper-Staszowska, Wioletta. "Security versus Threat – Interrelations." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 3 (2018): 22–25. http://dx.doi.org/10.5604/01.3001.0012.7517.
Der volle Inhalt der QuelleBiehun, Anatolii, Olha Osypova, Maksym Plakhtii, and Oleksandr Urdenko. "The analysis of external and internal threats of electronic ticket functioning at entertainment events." Modeling and Information Systems in Economics, no. 101 (December 1, 2021): 20–31. https://doi.org/10.33111/mise.101.3.
Der volle Inhalt der QuelleJaźwiński, Ireneusz. "Economic Security Threats. Determinants of State Functioning and Economic Policy." Przegląd Strategiczny, no. 16 (January 22, 2024): 77–88. http://dx.doi.org/10.14746/ps.2023.1.6.
Der volle Inhalt der QuelleAliyu Yauri, Bashir, and Joshua Abah. "Mitigating Security Threats in Virtualized Environments." International Journal of Scientific Engineering and Research 3, no. 5 (2015): 86–92. https://doi.org/10.70729/ijser15175.
Der volle Inhalt der QuelleBari, Ahamed Basha Abdul. "Healthcare Facilities and Cyber Security Threats." Chettinad Health City Medical Journal 11, no. 04 (2022): 1. http://dx.doi.org/10.24321/2278.2044.202232.
Der volle Inhalt der QuelleGuchua, Alika, and Thornike Zedelashvili. "Cyberwar as a Phenomenon of Asymmetric Threat and Cyber-Nuclear Security Threats." Історико-політичні проблеми сучасного світу, no. 40 (December 15, 2019): 50–57. http://dx.doi.org/10.31861/mhpi2019.40.50-57.
Der volle Inhalt der QuelleSmalii, O. B. "A general description of threats to european security at the threshold of the 21st century." Legal horizons, no. 21 (2020): 148–52. http://dx.doi.org/10.21272/legalhorizons.2020.i21.p148.
Der volle Inhalt der QuelleMeland, Per Håkon, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, and Paolo Giorgini. "Threat Analysis in Goal-Oriented Security Requirements Modelling." International Journal of Secure Software Engineering 5, no. 2 (2014): 1–19. http://dx.doi.org/10.4018/ijsse.2014040101.
Der volle Inhalt der QuelleDervišević, Tarik, Sabina Baraković, and Jasmina Baraković Husić. "Case Study: Security of System for Remote Management of Windows." B&H Electrical Engineering 14, no. 2 (2020): 4–12. http://dx.doi.org/10.2478/bhee-2020-0007.
Der volle Inhalt der QuelleYarovenko, Hanna. "Evaluating the threat to national information security." Problems and Perspectives in Management 18, no. 3 (2020): 195–210. http://dx.doi.org/10.21511/ppm.18(3).2020.17.
Der volle Inhalt der QuelleJenab, Kouroush, Sam Khoury, and Kim LaFevor. "Flow-Graph and Markovian Methods for Cyber Security Analysis." International Journal of Enterprise Information Systems 12, no. 1 (2016): 59–84. http://dx.doi.org/10.4018/ijeis.2016010104.
Der volle Inhalt der QuelleLe, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Der volle Inhalt der QuelleWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.pp258-267.
Der volle Inhalt der QuelleWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.p258-267.
Der volle Inhalt der QuelleWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. https://doi.org/10.11591/csit.v4i3.pp258-267.
Der volle Inhalt der QuelleIhor, Ya. Kulyniak, H. Bondarenko Yuliia, and I. Zhygalo Ivan. "Theoretical aspects of the essence and relationship between the shadow economy and the financial and economic security of the state." Economic journal Odessa polytechnic university 1, no. 11 (2020): 29–39. https://doi.org/10.5281/zenodo.3975502.
Der volle Inhalt der QuelleКлимов, Д. В. "External threats to enterprise security." Экономика и предпринимательство, no. 2(115) (May 6, 2020): 805–7. http://dx.doi.org/10.34925/eip.2020.115.2.161.
Der volle Inhalt der QuelleGould, David. "Organizational Resilience Approaches to Cyber Security." International Journal of Smart Education and Urban Society 9, no. 4 (2018): 53–62. http://dx.doi.org/10.4018/ijseus.2018100105.
Der volle Inhalt der QuelleAbhiram reddy bommareddy. "AI-Enhanced Microservice Security in Cloud-Based Financial Platforms: A Case Study of AWS Implementation." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1268–79. https://doi.org/10.32628/cseit241061171.
Der volle Inhalt der QuelleShammugam, Inthrani, Ganthan Narayana Samy, Pritheega Magalingam, Nurazean Maarop, Sundresan Perumal, and Shanmugam6 Bharanidharan. "Information security threats encountered by Malaysian public sector data centers." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1820–29. https://doi.org/10.11591/ijeecs.v21.i3.pp1820-1829.
Der volle Inhalt der QuelleMaher, Zulfikar Ahmed, Ali Ghulam, Muhammad Yaqoob Koondhar, Iftekhar Ahmed Mahar, and Mansoor Hyder. "Security Based SCURM Process (SUBSCRUM) For Secure Agile Development." VFAST Transactions on Software Engineering 12, no. 3 (2024): 138–46. http://dx.doi.org/10.21015/vtse.v12i3.1893.
Der volle Inhalt der QuelleSri, Kanth Mandru. "Explainable AI for Endpoint Security Threat Analysis." European Journal of Advances in Engineering and Technology 11, no. 1 (2024): 56–63. https://doi.org/10.5281/zenodo.13253288.
Der volle Inhalt der QuelleJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "2 Wireless Security Threats." Sir Syed Research Journal of Engineering & Technology 1, no. 1 (2013): 6. http://dx.doi.org/10.33317/ssurj.v1i1.62.
Der volle Inhalt der Quelle