Academic literature on the topic 'Comprehensive security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Comprehensive security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Comprehensive security"
Prezelj, Iztok. "Comprehensive Security and Some Implemental Limits." Information & Security: An International Journal 33, no. 1,2 (October 2015): 13–34. http://dx.doi.org/10.11610/isij.3301.
Full textSweijs, Tim. "Assessing Comprehensive Security Approaches in Action: An Introduction." Information & Security: An International Journal 33, no. 1,2 (October 2015): 5–9. http://dx.doi.org/10.11610/isij.3300.
Full textYushmanov, Anton А. "DEVELOP A COMPREHENSIVE SECURITY SYSTEM." Interexpo GEO-Siberia 7, no. 1 (July 8, 2020): 140–48. http://dx.doi.org/10.33764/2618-981x-2020-7-1-140-148.
Full textDewitt, David. "Common, comprehensive, and cooperative security." Pacific Review 7, no. 1 (January 1994): 1–15. http://dx.doi.org/10.1080/09512749408719067.
Full textRix, Alan. "Japan's comprehensive security and Australia." Australian Outlook 41, no. 2 (August 1987): 79–86. http://dx.doi.org/10.1080/10357718708444936.
Full textWatt, Steve. "Computer security — comprehensive controls checklist." Computer Fraud & Security Bulletin 10, no. 4 (February 1988): 15–16. http://dx.doi.org/10.1016/0142-0496(88)90084-7.
Full textGasper, Des, and Oscar A. Gómez. "Human security thinking in practice: ‘personal security’, ‘citizen security' and comprehensive mappings." Contemporary Politics 21, no. 1 (January 2, 2015): 100–116. http://dx.doi.org/10.1080/13569775.2014.993906.
Full textCorrea Chica, Juan Camilo, Jenny Cuatindioy Imbachi, and Juan Felipe Botero Vega. "Security in SDN: A comprehensive survey." Journal of Network and Computer Applications 159 (June 2020): 102595. http://dx.doi.org/10.1016/j.jnca.2020.102595.
Full textWesting, Arthur H. "Comprehensive Human Security and Ecological Realities." Environmental Conservation 16, no. 4 (1989): 295. http://dx.doi.org/10.1017/s037689290000967x.
Full textShabtai, A., Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer. "Google Android: A Comprehensive Security Assessment." IEEE Security & Privacy Magazine 8, no. 2 (March 2010): 35–44. http://dx.doi.org/10.1109/msp.2010.2.
Full textDissertations / Theses on the topic "Comprehensive security"
Feffer, Antonia Lynn. "Comprehensive security strategy for all-optical networks." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/99866.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 107-109).
Optical networking is a powerful means of communication in modem times of high bandwidth demands and high data speeds. While developments in optical networking continue to progress, however, the security implications they create have not yet caught up. In this thesis, we characterize a selection of damaging attacks against optical networks. By providing a detailed description of the attacks, we are also able to better understand their effects across the different layers of the network model. We also propose the current best practices for sensing and detection of these attacks when they occur, as well as mitigation techniques to limit the damage they incur. The attacks are not fully eliminated, however, and so we also identify remaining vulnerabilities these attacks can exploit. After characterizing the attacks, we propose a method for diagnosing attacks as they occur within a network given the analysis we have conducted. We also propose an algorithm for diagnosing attacks, as well as a monitoring system framework that relies on the establishment of autonomous zones of the network in order to efficiently limit damage and quarantine problem areas from the rest of the healthy network. This framework can be applied to a wide variety of network set-ups and topologies, with the ability to customize it to fit the needs of the system.
by Antonia Lynn Feffer.
S.M.
Homer, John. "A comprehensive approach to enterprise network security management." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1372.
Full textSchmid, Markus Thomas. "The concept of comprehensive security a distinctive feature of a shared security culture in Europe? /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FSchmid.pdf.
Full textThesis Advisor(s): Biermann, Rafael ; Knopf, Jeffrey. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 95-105). Also available in print.
Tong, Sui-yip. "The implementation of the policy of comprehensive social security assistance." Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B36449714.
Full textTong, Sui-yip, and 唐瑞葉. "The implementation of the policy of comprehensive social security assistance." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B36449714.
Full textZwolski, Kamil. "The EU as an international security actor : a comprehensive approach." Thesis, University of Salford, 2010. http://usir.salford.ac.uk/26986/.
Full textBrady, Eric Bonham. "Security Analysis: A Suggested Method for a Comprehensive Top-Down Approach." Thesis, The University of Arizona, 2014. http://hdl.handle.net/10150/319941.
Full textSchatz, Daniel. "Towards a comprehensive evidence-based approach for information security value assessment." Thesis, University of East London, 2018. http://roar.uel.ac.uk/7950/.
Full textAl, Mayahi Ibrahim Humaid. "Development of a comprehensive information security system for UAE e-Government." Thesis, Bangor University, 2016. https://research.bangor.ac.uk/portal/en/theses/development-of-a-comprehensive-information-security-system-for-uae-egovernment(190cd7ed-2d1d-4805-963a-5f6d1dc46971).html.
Full textKlenke, Carsten. "Japan's comprehensive National Security and the European Union's Common Foreign and Security Policy convergence towards global cooperation? /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA380827.
Full textThesis advisor(s): Olsen, Edward A. ; Abenheim, Donald. "June 2000." Includes bibliographical references (p. 97-101). Also available online.
Books on the topic "Comprehensive security"
Comprehensive Security Dialogue Project (South Asia), ed. Comprehensive security, environmental dimensions: Comprehensive Security Dialogue Project. New Delhi: Delhi Policy Group, 2004.
Find full textSullivan, Leonard. Comprehensive security and western prosperity. Lanham, MD: University Press of America, 1988.
Find full textWesting, Arthur H. From Environmental to Comprehensive Security. Heidelberg: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-00687-1.
Full textCentre for Land Warfare Studies (New Delhi, India), ed. Security deficit: Comprehensive internal security strategy for India. New Delhi: Centre for Land Warfare Studies, 2012.
Find full textWittkop, Jeremy. Building a Comprehensive IT Security Program. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2053-5.
Full textLiyanage, Madhusanka, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, and Mika Ylianttila, eds. A Comprehensive Guide to 5G Security. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.
Full textCentre for Air Power Studies (New Delhi, India). Comprehensive security for an emerging India. New Delhi: KW Publishers, in association with Centre for Air Power Studies, 2010.
Find full textIndia) Centre for Security Analysis (Chennai. Seminar proceedings, women and comprehensive security. Chennai: Centre for Security Analysis, 2005.
Find full textBiederlack, Lisa. Comprehensive food security & vulnerability analysis (CFSVA): Ghana. Rome, Italy: United Nations World Food Programme, 2009.
Find full textDipankar, Banerjee. Security in South Asia: Comprehensive and cooperative. New Delhi: Manas Publications, 1999.
Find full textBook chapters on the topic "Comprehensive security"
Ahn, Se Hyun. "Comprehensive Security." In Policing Northeast Asia, 35–72. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5116-1_2.
Full textHusain, Javid. "Toward Comprehensive Security." In Pakistan and a World in Disorder, 171–82. New York: Palgrave Macmillan US, 2016. http://dx.doi.org/10.1057/978-1-137-59962-9_10.
Full textMa, Yuxiang, Yulei Wu, and Jingguo Ge. "A Comprehensive Survey." In Accountability and Privacy in Network Security, 11–25. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6575-5_2.
Full textDhanda, Sumit Singh, Brahmjit Singh, and Poonam Jindal. "IoT Security: A Comprehensive View." In Intelligent Systems Reference Library, 467–94. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33596-0_19.
Full textMartis, Maria, Namratha V. Pai, R. S. Pragathi, S. Rakshatha, and Sunanda Dixit. "Comprehensive Survey on Hadoop Security." In Emerging Research in Computing, Information, Communication and Applications, 227–36. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6001-5_17.
Full textDeck, Richard A. "Singapore: Comprehensive Security — Total Defence." In Strategic Cultures in the Asia-Pacific Region, 247–69. London: Palgrave Macmillan UK, 1999. http://dx.doi.org/10.1007/978-1-349-27342-3_12.
Full textKhozin, G. "Space Activity and Comprehensive Security." In Space of Service to Humanity, 39–47. Dordrecht: Springer Netherlands, 1997. http://dx.doi.org/10.1007/978-94-011-5692-9_5.
Full textMonshizadeh, Mehrnoosh, and Vikramajeet Khatri. "IoT Security." In A Comprehensive Guide to 5G Security, 245–66. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.ch11.
Full textLaurenza, Giuseppe, and Riccardo Lazzeretti. "dAPTaset: A Comprehensive Mapping of APT-Related Data." In Computer Security, 217–25. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42051-2_15.
Full textLee, Sooyeon, and Huy Kang Kim. "ADSaS: Comprehensive Real-Time Anomaly Detection System." In Information Security Applications, 29–41. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17982-3_3.
Full textConference papers on the topic "Comprehensive security"
Boulware, Douglas, John Salerno, Richard Bleich, and Michael L. Hinman. "Toward building a comprehensive data mart." In Defense and Security, edited by Belur V. Dasarathy. SPIE, 2004. http://dx.doi.org/10.1117/12.542928.
Full textWang, Guodi, Tong Li, Hao Yue, Zhen Yang, and Runzi Zhang. "Integrating Heterogeneous Security Knowledge Sources for Comprehensive Security Analysis." In 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2021. http://dx.doi.org/10.1109/compsac51774.2021.00103.
Full textRm, Manikandan, and D. Radha. "A Comprehensive Approach for Network Security." In 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE, 2018. http://dx.doi.org/10.1109/icicct.2018.8472952.
Full textUppuluri, Prem, and Jeff Pittges. "A Comprehensive Undergraduate Application Security Project." In 2012 Ninth International Conference on Information Technology: New Generations (ITNG). IEEE, 2012. http://dx.doi.org/10.1109/itng.2012.127.
Full textBasinya, Evgeny A., and Anton A. Yushmanov. "Development of a Comprehensive Security System." In 2019 Dynamics of Systems, Mechanisms and Machines (Dynamics). IEEE, 2019. http://dx.doi.org/10.1109/dynamics47113.2019.8944700.
Full textHu, Zhiyuan, Mingwen Wang, Xueqiang Yan, Yueming Yin, and Zhigang Luo. "A comprehensive security architecture for SDN." In 2015 18th International Conference on Intelligence in Next Generation Networks (ICIN). IEEE, 2015. http://dx.doi.org/10.1109/icin.2015.7073803.
Full textSuthar, Dharmin, and Parag H. Rughani. "A Comprehensive Study of VoIP Security." In 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN). IEEE, 2020. http://dx.doi.org/10.1109/icacccn51052.2020.9362943.
Full textLi, Wenzheng, and Hongdan Zhu. "Research on Comprehensive Enterprise Network Security." In 2021 IEEE 11th International Conference on Electronics Information and Emergency Communication (ICEIEC). IEEE, 2021. http://dx.doi.org/10.1109/iceiec51955.2021.9463823.
Full textDesjardins, Daniel D., Darrel G. Hopper, Peter L. Marasco, James C. Byrd, and Jon Neubauer. "Military display market: fourth comprehensive edition." In Defense and Security Symposium, edited by James C. Byrd, Daniel D. Desjardins, Eric W. Forsythe, and Henry J. Girolamo. SPIE, 2006. http://dx.doi.org/10.1117/12.663675.
Full textMacior, Robert E., Steven M. Mercurio, Sharon M. Walter, Sheila W. Rakowski, Mark P. Kozak, and Michael P. Blount. "A comprehensive simulation environment for sensor fusion." In Defense and Security Symposium, edited by Kevin Schum and Alex F. Sisti. SPIE, 2006. http://dx.doi.org/10.1117/12.665060.
Full textReports on the topic "Comprehensive security"
Vigil, Robyn Ashlee. Los Alamos National Laboratory Comprehensive Security Briefing. Office of Scientific and Technical Information (OSTI), March 2019. http://dx.doi.org/10.2172/1501784.
Full textYamanoue, Testsuro. Japan's Comprehensive Grand Security Strategy in East Asia. Fort Belvoir, VA: Defense Technical Information Center, April 2003. http://dx.doi.org/10.21236/ada415748.
Full textDraelos, T. J., and R. L. Craft. Comprehensive test ban treaty international monitoring system security threats and proposed security attributes. Office of Scientific and Technical Information (OSTI), March 1996. http://dx.doi.org/10.2172/243017.
Full textMurphy, Sandra. Comprehensive Routing Security Development and Deployment for the Internet. Fort Belvoir, VA: Defense Technical Information Center, February 2015. http://dx.doi.org/10.21236/ada619115.
Full textDahlman, Ola, Jenifer Mackby, Bernard Sitt, Andre Poucet, Arend Meerburg, Bernard Massinon, Edward Ifft, Masahiko Asada, and Ralph Alewine. Container Security: A Proposal for a Comprehensive Code of Conduct. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada434718.
Full textChester, Kemp L. A Common Vision for the Common Defense: Toward a More Comprehensive National Security Strategy. Fort Belvoir, VA: Defense Technical Information Center, May 2001. http://dx.doi.org/10.21236/ada394249.
Full textAyyar, Balan R. The Impact of the Comprehensive Test Ban Treaty on Nuclear Non-Proliferation and American Security. Fort Belvoir, VA: Defense Technical Information Center, April 1999. http://dx.doi.org/10.21236/ada388607.
Full textZastrow, Roderick C. From Islands to Networks: A Blueprint for a Comprehensive US Security Strategy in the Asia-Pacific Region. Fort Belvoir, VA: Defense Technical Information Center, May 2002. http://dx.doi.org/10.21236/ada420754.
Full textErkamo, Sanna, Karoliina Pilli-Sihvola, Atte Harjanne, and Heikki Tuomenvirta. Climate Security and Finland – A Review on Security Implications of Climate Change from the Finnish Perspective. Finnish Meteorological Institute, 2021. http://dx.doi.org/10.35614/isbn.9789523361362.
Full textResearch Institute (IFPRI), International Food Policy. Comprehensive typology for food and nutrition security interventions, with application to the rural territories of the Democratic Republic of the Congo (DRC). Washington, DC: International Food Policy Research Institute, 2018. http://dx.doi.org/10.2499/1037800844.
Full text