Journal articles on the topic 'Applications security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Applications security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Pita, James, Harish Bellamane, Manish Jain, et al. "Security applications." ACM SIGecom Exchanges 8, no. 2 (2009): 1–4. http://dx.doi.org/10.1145/1980522.1980527.
Full textErbel, Mateusz, and Piotr Kopniak. "Assessment of the web application security effectiveness against various methods of network attacks." Journal of Computer Sciences Institute 9 (December 30, 2018): 340–44. http://dx.doi.org/10.35784/jcsi.707.
Full textKarakaneva, J. "Software applications security." Trakia Journal of Science 12, no. 4 (2014): 418–24. http://dx.doi.org/10.15547/tjs.2014.04.012.
Full textKamil, Mustofa. "Methodology of Security testing of IKID website and Security Vulnerabilities." ACMIT Proceedings 6, no. 1 (2021): 83–90. http://dx.doi.org/10.33555/acmit.v6i1.101.
Full textJovicic, Bojan, and Dejan Simic. "Common web application attack types and security using ASP.NET." Computer Science and Information Systems 3, no. 2 (2006): 83–96. http://dx.doi.org/10.2298/csis0602083j.
Full textMisnik, Oleksii. "Applications containers security model." Collection "Information Technology and Security" 8, no. 1 (2020): 58–66. http://dx.doi.org/10.20535/2411-1031.2020.8.1.218004.
Full textThuraisingham, Bhavani, and Reind van de Riet. "Data and applications security." Data & Knowledge Engineering 43, no. 3 (2002): 235–36. http://dx.doi.org/10.1016/s0169-023x(02)00125-8.
Full textBrown, S. J. S. "Security applications of holography." Physics in Technology 17, no. 5 (1986): 205–11. http://dx.doi.org/10.1088/0305-4624/17/5/i03.
Full textHeinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.
Full textAgrawal, Alka, Mamdouh Alenezi, Rajeev Kumar, and Raees Ahmad Khan. "A Unified Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Method for Evaluating Sustainable-Security of Web Applications." Symmetry 12, no. 3 (2020): 448. http://dx.doi.org/10.3390/sym12030448.
Full textWang, Xin, De Lin Chen, Yue Sun, Xu Wang, and Su Ying Yao. "Security Control for TVOS." Applied Mechanics and Materials 643 (September 2014): 136–41. http://dx.doi.org/10.4028/www.scientific.net/amm.643.136.
Full textAlrawais, Layla Mohammed, Mamdouh Alenezi, and Mohammad Akour. "Security Testing Framework for Web Applications." International Journal of Software Innovation 6, no. 3 (2018): 93–117. http://dx.doi.org/10.4018/ijsi.2018070107.
Full textAdane, D. S., and S. R. Sathe. "A Security Model for Securing Data in Multiagent Applications." Information Security Journal: A Global Perspective 19, no. 1 (2010): 11–21. http://dx.doi.org/10.1080/19393550903534088.
Full textQiu, Qin, Shenglan Liu, Sijia Xu, and Shengquan Yu. "Study on Security and Privacy in 5G-Enabled Applications." Wireless Communications and Mobile Computing 2020 (December 19, 2020): 1–15. http://dx.doi.org/10.1155/2020/8856683.
Full textHeyman, Andrew, Leon Reznik, Michael Negnevitsky, and Andrew Hoffman. "Fuzzy System Design for Security and Environment Control Applications." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 23, Suppl. 1 (2015): 43–56. http://dx.doi.org/10.1142/s0218488515400048.
Full textA.P, Dr Nirmala. "Security Threats and Mitigation Approaches in IoT based Applications." International Journal of Psychosocial Rehabilitation 24, no. 5 (2020): 6948–54. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020694.
Full textHall, Calum, Lynsay Shepherd, and Natalie Coull. "BlackWatch: Increasing Attack Awareness within Web Applications." Future Internet 11, no. 2 (2019): 44. http://dx.doi.org/10.3390/fi11020044.
Full textAndrian, Rian, and Ahmad Fauzi. "Security Scanner For Web Applications Case Study: Learning Management System." Jurnal Online Informatika 4, no. 2 (2020): 63. http://dx.doi.org/10.15575/join.v4i2.394.
Full textRajendran, Jeyavijayan, Ramesh Karri, James B. Wendt, et al. "Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications." Proceedings of the IEEE 103, no. 5 (2015): 829–49. http://dx.doi.org/10.1109/jproc.2014.2387353.
Full textDutta-Roy, Amitava. "Nano meets security: Exploring nanoelectronic devices for security applications." Proceedings of the IEEE 103, no. 5 (2015): 822–28. http://dx.doi.org/10.1109/jproc.2015.2418512.
Full textAlzahrani, Abdulrahman, Ali Alqazzaz, Nabil Almashfi, Huirong Fu, and Ye Zhu. "Web Application Security Tools Analysis." Studies in Media and Communication 5, no. 2 (2017): 118. http://dx.doi.org/10.11114/smc.v5i2.2663.
Full textAbdel-Kader, Rabab F., Mona Nashaat, Mohamed I. Habib, and Hani M. K. Mahdi. "Automated server-side model for recognition of security vulnerabilities in scripting languages." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (2020): 6061. http://dx.doi.org/10.11591/ijece.v10i6.pp6061-6070.
Full text., Awantika, Neha Rawat, Poonam Rawat, and Shikha Singh. "Cloud Computing: Security and Applications." i-manager's Journal on Cloud Computing 1, no. 2 (2014): 1–6. http://dx.doi.org/10.26634/jcc.1.2.3045.
Full textMitrea, Teodor, Vlad Vasile, and Monica Borda. "Mobile Applications - (in) Security Overview." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 3 (2019): 42–45. http://dx.doi.org/10.2478/kbo-2019-0115.
Full textWu, Raymond, and Masayuki Hisada. "SOA Web Security and Applications." Journal of Object Technology 9, no. 2 (2010): 163. http://dx.doi.org/10.5381/jot.2010.9.2.a4.
Full textA. Correa, Roddy, Juan Ram髇 Bermejo Higuera, Javier Bermejo Higuera, Juan Antonio SiciliaMontalvo, Manuel S醤chez Rubio, and �. Alberto Magre襻n. "Hybrid Security AssessmentMethodology forWeb Applications." Computer Modeling in Engineering & Sciences 126, no. 1 (2021): 89–124. http://dx.doi.org/10.32604/cmes.2021.010700.
Full textDesrosiers, Marc F. "Irradiation applications for homeland security." Radiation Physics and Chemistry 71, no. 1-2 (2004): 479–82. http://dx.doi.org/10.1016/j.radphyschem.2004.03.084.
Full textDwan, Berni. "Smart card security and applications." Computer Fraud & Security 1998, no. 10 (1998): 18–19. http://dx.doi.org/10.1016/s1361-3723(98)80028-6.
Full textHendry, Mike. "Smart Card Security and Applications." EDPACS 25, no. 11 (1998): 18. http://dx.doi.org/10.1201/1079/43233.25.11.19980501/30169.6.
Full textRipka, Pavel. "Security applications of magnetic sensors." Journal of Physics: Conference Series 450 (June 26, 2013): 012001. http://dx.doi.org/10.1088/1742-6596/450/1/012001.
Full textTing, T. C. "Modeling security requirements for applications." ACM SIGPLAN Notices 28, no. 10 (1993): 305. http://dx.doi.org/10.1145/167962.165912.
Full textGallery, Eimear, and Chris J. Mitchell. "Trusted Computing: Security and Applications." Cryptologia 33, no. 3 (2009): 217–45. http://dx.doi.org/10.1080/01611190802231140.
Full textHawrami, R., L. Soundara Pandian, E. Ariesanti, et al. "Crystals for Nuclear Security Applications." IEEE Transactions on Nuclear Science 63, no. 2 (2016): 509–12. http://dx.doi.org/10.1109/tns.2016.2522188.
Full textNoor. "E-COMMERCE: SECURITY AND APPLICATIONS." American Journal of Applied Sciences 9, no. 11 (2012): 1868–71. http://dx.doi.org/10.3844/ajassp.2012.1868.1871.
Full textPang, Yachuan, Bin Gao, Bohan Lin, He Qian, and Huaqiang Wu. "Memristors for Hardware Security Applications." Advanced Electronic Materials 5, no. 9 (2019): 1800872. http://dx.doi.org/10.1002/aelm.201800872.
Full textBecidyan, A. Nurhan. "Luminescent pigments in security applications." Color Research & Application 20, no. 2 (1995): 124–30. http://dx.doi.org/10.1002/col.5080200208.
Full textSaleem, Muhammad Qaiser. "Security Problems of SOA Applications." International Journal of Security and Its Applications 11, no. 11 (2017): 31–40. http://dx.doi.org/10.14257/ijsia.2017.11.11.03.
Full textSage, K., and S. Young. "Security applications of computer vision." IEEE Aerospace and Electronic Systems Magazine 14, no. 4 (1999): 19–29. http://dx.doi.org/10.1109/62.756080.
Full textLeng, Xuefei. "Smart card applications and security." Information Security Technical Report 14, no. 2 (2009): 36–45. http://dx.doi.org/10.1016/j.istr.2009.06.006.
Full textMunoz-Ausecha, Cesar, Juan Ruiz-Rosero, and Gustavo Ramirez-Gonzalez. "RFID Applications and Security Review." Computation 9, no. 6 (2021): 69. http://dx.doi.org/10.3390/computation9060069.
Full textUkil, Arijit, Soma Bandyopadhyay, Abhijan Bhattacharyya, Arpan Pal, and Tulika Bose. "Lightweight security scheme for IoT applications using CoAP." International Journal of Pervasive Computing and Communications 10, no. 4 (2014): 372–92. http://dx.doi.org/10.1108/ijpcc-01-2014-0002.
Full textHalili, Festim, and Lirie Koraqi. "The Security Aspect of Applications in Kosovo Companies." Modern Applied Science 13, no. 1 (2018): 221. http://dx.doi.org/10.5539/mas.v13n1p221.
Full textBwalya, Michael, and Christopher Chembe. "A Security Framework for Mobile Application Systems: Case of Android Applications." Zambia ICT Journal 3, no. 2 (2020): 31–43. http://dx.doi.org/10.33260/zictjournal.v3i2.84.
Full textAbozeid, Amr, AbdAllah Adel AlHabshy, and Kamal ElDahshan. "A Software Security Optimization Architecture (SoSOA) and its Adaptation for Mobile Applications." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 11 (2021): 148. http://dx.doi.org/10.3991/ijim.v15i11.20133.
Full textГорелик, В. Ю., and Д. С. Скоморохов. "Networked web application security." Informacionno-technologicheskij vestnik, no. 1(23) (March 11, 2020): 104–9. http://dx.doi.org/10.21499/2409-1650-2020-23-1-104-109.
Full textKuka, Elda, and Rovena Bahiti. "Information Security Management: Password Security Issues." Academic Journal of Interdisciplinary Studies 7, no. 2 (2018): 43–47. http://dx.doi.org/10.2478/ajis-2018-0045.
Full textAbhijit J, Patil, and Dr G. Syam Prasad. "Trust Based Security Model for IoT and Fog based Applications." International Journal of Engineering & Technology 7, no. 2.7 (2018): 691. http://dx.doi.org/10.14419/ijet.v7i2.7.10924.
Full textYao, Jing Jing. "A New Kind of Security Communication Mechanism with Security Sessions." Applied Mechanics and Materials 513-517 (February 2014): 2506–9. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2506.
Full textNagaratnam, N., A. Nadalin, M. Hondo, M. McIntosh, and P. Austel. "Business-driven application security: From modeling to managing secure applications." IBM Systems Journal 44, no. 4 (2005): 847–67. http://dx.doi.org/10.1147/sj.444.0847.
Full textFan, Yi Xing, and Ren Bing Zhang. "Research on Network Security and Identity Authentication." Advanced Materials Research 926-930 (May 2014): 2046–49. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2046.
Full text