To see the other types of publications on this topic, follow the link: Comprehensive security.

Journal articles on the topic 'Comprehensive security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Comprehensive security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Prezelj, Iztok. "Comprehensive Security and Some Implemental Limits." Information & Security: An International Journal 33, no. 1,2 (October 2015): 13–34. http://dx.doi.org/10.11610/isij.3301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sweijs, Tim. "Assessing Comprehensive Security Approaches in Action: An Introduction." Information & Security: An International Journal 33, no. 1,2 (October 2015): 5–9. http://dx.doi.org/10.11610/isij.3300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yushmanov, Anton А. "DEVELOP A COMPREHENSIVE SECURITY SYSTEM." Interexpo GEO-Siberia 7, no. 1 (July 8, 2020): 140–48. http://dx.doi.org/10.33764/2618-981x-2020-7-1-140-148.

Full text
Abstract:
The article describes the process of developing an integrated security system based on a single-board NVIDIA Jetson Nano computer. The main objective of the system is to provide profiled access to the room for trusted users. As a result of the work, a face recognition mechanism based on the convolutional neural network was designed and implemented. Face detection is implemented using histograms of directional gradients. Then, thе face is centered and processed by the trained convolutional neural network, out the characteristic features of the image supplied to the image classifier, which gives the percentage of image matching with the reference images. In the process of implementing the system, a framework was developed that allows implementing a complex security system, regardless of hardware components. To ensure the protection of the room, smoke detectors, opened doors and windows were added to the system. The scientific novelty of tht work is the encapsulation of all transmitted system traffic to overlay networks to ensure confidentiality.
APA, Harvard, Vancouver, ISO, and other styles
4

Dewitt, David. "Common, comprehensive, and cooperative security." Pacific Review 7, no. 1 (January 1994): 1–15. http://dx.doi.org/10.1080/09512749408719067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rix, Alan. "Japan's comprehensive security and Australia." Australian Outlook 41, no. 2 (August 1987): 79–86. http://dx.doi.org/10.1080/10357718708444936.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Watt, Steve. "Computer security — comprehensive controls checklist." Computer Fraud & Security Bulletin 10, no. 4 (February 1988): 15–16. http://dx.doi.org/10.1016/0142-0496(88)90084-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gasper, Des, and Oscar A. Gómez. "Human security thinking in practice: ‘personal security’, ‘citizen security' and comprehensive mappings." Contemporary Politics 21, no. 1 (January 2, 2015): 100–116. http://dx.doi.org/10.1080/13569775.2014.993906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Correa Chica, Juan Camilo, Jenny Cuatindioy Imbachi, and Juan Felipe Botero Vega. "Security in SDN: A comprehensive survey." Journal of Network and Computer Applications 159 (June 2020): 102595. http://dx.doi.org/10.1016/j.jnca.2020.102595.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Westing, Arthur H. "Comprehensive Human Security and Ecological Realities." Environmental Conservation 16, no. 4 (1989): 295. http://dx.doi.org/10.1017/s037689290000967x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shabtai, A., Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer. "Google Android: A Comprehensive Security Assessment." IEEE Security & Privacy Magazine 8, no. 2 (March 2010): 35–44. http://dx.doi.org/10.1109/msp.2010.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Fouinat, François. "A comprehensive framework for human security." Conflict, Security & Development 4, no. 3 (December 2004): 289–97. http://dx.doi.org/10.1080/1467880042000319872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Apakan, Ertugrul, and Wolfgang Sporrer. "Comprehensive Security in a Conflict Environment." Security and Human Rights 29, no. 1-4 (December 12, 2018): 83–89. http://dx.doi.org/10.1163/18750230-02901001.

Full text
Abstract:
For the past five years, the osce Special Monitoring Mission has been implementing its mandate, partially in an environment of ongoing violence. This article describes ways in which the conflict continues to impact the lives of civilians and describes the humanitarian-security nexus in the Ukrainian conflict. As well, the article draws conclusions, which contributions an international monitoring mission can make to mitigate the human cost of the conflict and pursue a comprehensive concept of security and to prevention, even while operating under the conditions of an ongoing conflict.
APA, Harvard, Vancouver, ISO, and other styles
13

Westing, Arthur H. "The Environmental Component of Comprehensive Security." Bulletin of Peace Proposals 20, no. 2 (April 1989): 129–34. http://dx.doi.org/10.1177/096701068902000203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Swain, Sunita, and Rajesh Kumar Tiwari. "CLOUD SECURITY RESEARCH- A COMPREHENSIVE SURVEY." International Journal of Electronics Engineering and Applications VIII, no. II (December 1, 2020): 29. http://dx.doi.org/10.30696/ijeea.viii.ii.2020.29-39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Chen, Yan, K. (Ram) Ramamurthy, and Kuang-Wei Wen. "Impacts of Comprehensive Information Security Programs on Information Security Culture." Journal of Computer Information Systems 55, no. 3 (March 2015): 11–19. http://dx.doi.org/10.1080/08874417.2015.11645767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Poposka, Vesna. "The Urge for Comprehensive Cyber Security Strategies in the Western Balkan." Information & Security: An International Journal 34 (2016): 25–36. http://dx.doi.org/10.11610/isij.3402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Casarini, Nicola. "Europe’s comprehensive approach to Northeast Asia’s security." Monde chinois 53, no. 1 (2018): 94. http://dx.doi.org/10.3917/mochi.053.0094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Alger, Chadwick. "A Comprehensive Overview of the Security Council." International Studies Review 7, no. 1 (March 2005): 122–24. http://dx.doi.org/10.1111/j.1521-9488.2005.00476.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Norton, RA. "Food security issues-a potential comprehensive plan." Poultry Science 82, no. 6 (June 2003): 958–63. http://dx.doi.org/10.1093/ps/82.6.958.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Kralik, Lukas, Roman Senkerik, and Roman Jasek. "Model for comprehensive approach to security management." International Journal of System Assurance Engineering and Management 7, no. 2 (February 3, 2016): 129–37. http://dx.doi.org/10.1007/s13198-016-0420-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Zheng, Qun-Wei, Wei-Ci Su, Feng-Tai Zhang, and Zi-Qin Zhou. "Evaluation of Water Resources Security in the Karst Region from the “Man-Land-Water” Perspective: A Case Study of Guizhou Province." Water 11, no. 2 (January 29, 2019): 224. http://dx.doi.org/10.3390/w11020224.

Full text
Abstract:
This paper constructs a water resources security evaluation model from the “man (human activity intensity)-land (geological and geomorphological features)-water (water resources background conditions)” perspective, which accounts for the characteristics of hydrology and water resources in karst areas. A water resources security evaluation index system is established from three aspects (i.e., the background conditions of water resources, human activity intensity and geological and geomorphological features). The evaluation standard threshold is determined in accordance with relevant standards and domestic/foreign development experience. Both the comprehensive weights obtained by the Lagrange coefficient and the multi-objective fuzzy membership functions are used to comprehensively evaluate the spatial and temporal evolution of water resources security in Guizhou Province from 2001 to 2015. The results show that the water resources security comprehensive index of Guizhou Province was between 0.6 and 0.8 during this time (relatively safe type) and the safety was trending upwards. However, the comprehensive index of water resources security of each city in Guizhou Province demonstrates significant spatiotemporal variation. Whilst the comprehensive index was low in the Western part and high in the Eastern part of the province, it generally improved over time for the entire province. Moreover, the criteria layer indexes of water resources security in Guizhou Province and all cities also showed different degrees of variation and regional consistency across space and time. The interaction among these three aspects promoted the spatiotemporal variation of the Water Resources Security Comprehensive Index. In order to safeguard and improve water resources security, it is important to strengthen ecological and environmental management, promote the efficient use of water resources, establish sound management measures and security system related institutions and ensure water resources security.
APA, Harvard, Vancouver, ISO, and other styles
22

Zhang, Pu, and Huan Wang. "Comprehensive Evaluation and Analysis of China’s Energy Security." Advanced Materials Research 1008-1009 (August 2014): 1415–20. http://dx.doi.org/10.4028/www.scientific.net/amr.1008-1009.1415.

Full text
Abstract:
This paper evaluates of the overall situation of China’s energy security. Firstly, analyzes the current situation of China’s energy security. Secondly, according to the Chinese Energy Statistical Yearbook and BP Energy Statistical Yearbook, induces 10 measures. Thirdly, defines the similar weight by similar figures and scores the 10 measures. Finally, the research shows the 10 measures’ security situation, at the same times gives some advices according to the result.
APA, Harvard, Vancouver, ISO, and other styles
23

Espinosa García, Javier, Luis Hernández Encinas, and Alberto Peinado Domínguez. "A Comprehensive Security Framework Proposal to Contribute to Sustainability." Sustainability 13, no. 12 (June 18, 2021): 6901. http://dx.doi.org/10.3390/su13126901.

Full text
Abstract:
Well-known international security frameworks try to eliminate or mitigate different kinds of risks on the assets covered by their scopes (e.g., people, goods, information, and reputation). To date, to the best of our knowledge, any of these approaches neither provide a comprehensive perspective on security (considered as the merge of physical and logical security) nor consider sustainability as one of the levers for their design, implementation, and execution. This work presents a comprehensive security proposal through a framework that fits to the organizational security needs and contributes to the achievement of the sustainability objectives of an organization by avoiding duplicities and large security gaps from disjointed approaches. The work is supported by a methodology, which is the result of the wide and long work experience of the co-authors on security over the years in different organizations, businesses, and scopes. As it is shown in the theoretical exemplification included in the paper, the proposed framework combines the complementary and joint action of various actors for the protection of assets capable of achieving efforts and dedication efficiency, by merging the aspects of physical and logical security.
APA, Harvard, Vancouver, ISO, and other styles
24

Bhatia, Manjot Kaur, Akash Bhardwaj, and Diksha Singla. "A Comprehensive Study of Security in Cloud Computing." International Journal of Computer Sciences and Engineering 6, no. 12 (December 31, 2018): 394–98. http://dx.doi.org/10.26438/ijcse/v6i12.394398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Khan, Najeeb Ahmad, V. K. Panchal, and Safdar Tanweer. "Comprehensive analysis of data storage security in cloud." Global Sci-Tech 11, no. 2 (2019): 82. http://dx.doi.org/10.5958/2455-7110.2019.00012.0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

McDermott, Paul. "Personal firewalls…One more step towards comprehensive security." Network Security 2000, no. 11 (November 2000): 11–14. http://dx.doi.org/10.1016/s1353-4858(00)85024-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ramachandra, Gururaj, Mohsin Iftikhar, and Farrukh Aslam Khan. "A Comprehensive Survey on Security in Cloud Computing." Procedia Computer Science 110 (2017): 465–72. http://dx.doi.org/10.1016/j.procs.2017.06.124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Jeyadurga, P., S. Ebenezer Juliet, I. Joshua Selwyn, and P. Sivanisha. "Security in Smart Healthcare System: A Comprehensive Survey." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 10 (October 30, 2017): 39. http://dx.doi.org/10.23956/ijarcsse.v7i10.423.

Full text
Abstract:
The Internet of things (IoT) is one of the emerging technologies that brought revolution in many application domains such as smart cities, smart retails, healthcare monitoring and so on. As the physical objects are connected via internet, security risk may arise. This paper analyses the existing technologies and protocols that are designed by different authors to ensure the secure communication over internet. It additionally focuses on the advancement in healthcare systems while deploying IoT services.
APA, Harvard, Vancouver, ISO, and other styles
29

Sharma, Saloni, and Anuj Kumar Gupta. "A Comprehensive Review of Security Issues in Manets." International Journal of Computer Applications 69, no. 21 (May 31, 2013): 32–37. http://dx.doi.org/10.5120/12097-8277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Griffith, Melissa K. "A comprehensive security approach: bolstering Finnish cybersecurity capacity." Journal of Cyber Policy 3, no. 3 (September 2, 2018): 407–29. http://dx.doi.org/10.1080/23738871.2018.1561919.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Banerjee, Dipankar. "Towards Comprehensive and Cooperative Security in South Asia." South Asian Survey 6, no. 2 (September 1999): 305–18. http://dx.doi.org/10.1177/097152319900600211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Chapsos, Ioannis, and James A. Malcolm. "Maritime security in Indonesia: Towards a comprehensive agenda?" Marine Policy 76 (February 2017): 178–84. http://dx.doi.org/10.1016/j.marpol.2016.11.033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

., Annie Sujith. "COMPREHENSIVE OVERVIEW ON SECURITY SOLUTIONS FOR MOBILE DEVICES." International Journal of Research in Engineering and Technology 05, no. 16 (May 25, 2016): 110–15. http://dx.doi.org/10.15623/ijret.2016.0516024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Bobrow, Davis B., Robert W. Barnett, Robert S. Ozaki, and Walter Arnold. "Beyond War. Japan's Concept of Comprehensive National Security." Pacific Affairs 58, no. 4 (1985): 697. http://dx.doi.org/10.2307/2758494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Guski, R., J. C. Dayka, L. N. Distel, W. B. Farrell, K. A. Gdaniec, M. J. Kelly, M. A. Nelson, L. H. Overby, and L. G. Robinson. "Security on z/OS: Comprehensive, current, and flexible." IBM Systems Journal 40, no. 3 (2001): 696–720. http://dx.doi.org/10.1147/sj.403.0696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Zheng, Yunhong, and Kai Li. "Ecological security comprehensive evaluation on mineral-resource enterprises." Chinese Journal of Geochemistry 25, S1 (March 2006): 44. http://dx.doi.org/10.1007/bf02839818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Akberdina, V. V., A. V. Grebenkin, and O. P. Smirnova. "Comprehensive Assessment of Industries Economic Security: Regional Aspect." Economy of Region 4 (November 2017): 1264–79. http://dx.doi.org/10.17059/2017-4-23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Zagoria, Donald S., Robert W. Barnett, and Edwin P. Hoyt. "Beyond War: Japan's Concept of Comprehensive National Security." Foreign Affairs 64, no. 1 (1985): 193. http://dx.doi.org/10.2307/20042551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Gul, Shabnam, Muhammad Faizan Asghar, and Zara Qurban. "Narrative Building for Comprehensive National Security of Pakistan." Global Strategic & Securities Studies Review VI, no. I (March 30, 2021): 38–46. http://dx.doi.org/10.31703/gsssr.2021(vi-i).05.

Full text
Abstract:
The debate about building a national narrative for the state of Pakistan could be seen among academia, think tanks and media personnel for the last few years. It is believed that 'national narratives' help project the world-view of a nation, which is considered important in the contemporary world. The paper in hand pleads that narrative-building is a delicate exercise, which needs a major intellectual effort. Narratives encompass the ideological, historical, socio-economic and cultural perspectives of any nation. Pakistan is a State which had the narrative beforehand the inception of the state. The paper argues that there is a need to constitute a 'Committee of top academics, intellectuals and religious scholars of the country', who should deliberate and build a comprehensive national narrative, allinclusive in approach and leaving out no segment of the society. Meanwhile, the paper presents a few recommendations, which proffer some measures to address the prevailing security concerns.
APA, Harvard, Vancouver, ISO, and other styles
40

McAteer, Ian, Ahmed Ibrahim, Guanglou Zheng, Wencheng Yang, and Craig Valli. "Integration of Biometrics and Steganography: A Comprehensive Review." Technologies 7, no. 2 (April 8, 2019): 34. http://dx.doi.org/10.3390/technologies7020034.

Full text
Abstract:
The use of an individual’s biometric characteristics to advance authentication and verification technology beyond the current dependence on passwords has been the subject of extensive research for some time. Since such physical characteristics cannot be hidden from the public eye, the security of digitised biometric data becomes paramount to avoid the risk of substitution or replay attacks. Biometric systems have readily embraced cryptography to encrypt the data extracted from the scanning of anatomical features. Significant amounts of research have also gone into the integration of biometrics with steganography to add a layer to the defence-in-depth security model, and this has the potential to augment both access control parameters and the secure transmission of sensitive biometric data. However, despite these efforts, the amalgamation of biometric and steganographic methods has failed to transition from the research lab into real-world applications. In light of this review of both academic and industry literature, we suggest that future research should focus on identifying an acceptable level steganographic embedding for biometric applications, securing exchange of steganography keys, identifying and address legal implications, and developing industry standards.
APA, Harvard, Vancouver, ISO, and other styles
41

Wang, Yufei, Tengbiao Zhang, and Qian Ye. "Situation awareness framework for industrial control system based on cyber kill chain." MATEC Web of Conferences 336 (2021): 02013. http://dx.doi.org/10.1051/matecconf/202133602013.

Full text
Abstract:
Information and cyber security of Industrial Control Systems (ICS) has gained considerable importance. Situation Awareness (SA) is an exciting mechanism to achieve the perception, comprehension and projection of the ICS information security status. Based on the Purdue Enterprise Reference Architecture (PERA), a situation awareness framework for ICS is presented considering the ICS cyber kill chain. The proposed framework consists of IT SA Centre, OT SA Centre, and Comprehensive SA Centre. Comprehensive SA Centre is responsible for creating and maintaining an integrated and high level of security visibility into the whole environments. The introduced framework can be used to guide the development of the situation awareness infrastructure in organization with industrial control systems.
APA, Harvard, Vancouver, ISO, and other styles
42

Shyla and Vishal Bhatnagar. "Comprehensive Examination of Network Intrusion Detection Models on Data Science." International Journal of Information Retrieval Research 11, no. 4 (October 2021): 14–40. http://dx.doi.org/10.4018/ijirr.2021100102.

Full text
Abstract:
The increased requirement of data science in recent times has given rise to the concept of data security, which has become a major issue; thus, the amalgamation of data science methodology with intrusion detection systems as a field of research has acquired a lot of prominence. The level of access to the information system and its visibility to user pursuit was required to operate securely. Intrusion detection has been gaining popularity in the area of data science to incorporate the overall information security infrastructure, where regular operations depend upon shared use of information. The problems are to build an intrusion detection system efficient enough for detecting attacks and to reduce the false positives with a high detection rate. In this paper, the authors analyse various techniques of intrusion detection combined with data science, which will help in understanding the best fit technique under different circumstances.
APA, Harvard, Vancouver, ISO, and other styles
43

Bhargavi, M., and Dr M.Nagabhushana Rao. "Security Issues and Challenges in IOT: a Comprehensive Study." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 298. http://dx.doi.org/10.14419/ijet.v7i2.32.15700.

Full text
Abstract:
The Internet of Things (IoT) is a revolutionary model, with rising wireless sensor network technology. In IoT network devices are connected and communicated with each other or with human. IoT is extremely available to security assaults. In recent years, the internet of things has a continuous support in research. In the upcoming scenario, IoT will play an important role and changes our day-to-day life, principles as well as industry models. In this paper we provide ensuring security of data exchange, IoT architecture and IoT Security architecture, applications, drawbacks of IoT. We study about various security issues, Problems, normal and Denial of service attacks in different layers, issues and research defy in IoT are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
44

Häusler, Hermann. "Military Geology and Comprehensive Security Geology – Applied Geologic Contributions to New Austrian Security Strategy." Austrian Journal of Earth Sciences 108, no. 2 (2015): 302–16. http://dx.doi.org/10.17738/ajes.2015.0027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Nasir, Akhyari, Ruzaini Abdullah Arshah, and Mohd Rashid Ab Hamid. "The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study." Advanced Science Letters 24, no. 10 (October 1, 2018): 7690–95. http://dx.doi.org/10.1166/asl.2018.13001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Radtke, Kurt. "VII. Sino-Indian Relations: Security Dilemma, Ideological Polarization, or Cooperation Based on 'Comprehensive Security'?" Perspectives on Global Development and Technology 2, no. 3 (2003): 499–520. http://dx.doi.org/10.1163/156915003322986370.

Full text
Abstract:
AbstractGeopolitics in Central Asia are not wholly determined by its giant neighbors China, India, and Russia, but the strategic approaches adopted by these three countries have a major impact on the dynamics of Central Asia. This contribution aims to throw more light on the nature of the strategic and security discourse between China and India as one way to increase our understanding of the context in which Central Asian states operate. Despite globalization, Asian governments tend to cling to static approaches. China in particular emphasizes the role of "large powers" (daguo) in determining the global structure, and regards itself as one of those large powers. Cooperation with other powers demands a minimum level of agreement on common goals for the future global system, but recent emphasis on moral, and thus ideological elements in US global strategies has the potential to reimpose ideological polarization on the global system. Countries in Southeast or Central Asia tend to adopt policies of diversification by strengthening their links with all major global powers, including the United States, hoping to avoid polarization while at the same time staying clear of bandwagoning. This is one of the reasons why the New Great Game cannot simply be described in terms of Great Powers that engage among themselves in maneuvers of bandwagoning and balancing. Sharing concepts such as "comprehensive security" may provide greater leeway for policymakers who do not wish to become prisoners of man-made dilemmas. Nineteenth-century concepts of balance of power seem no shining beacon for policymakers of Eurasia and the United States in the twenty-first century.
APA, Harvard, Vancouver, ISO, and other styles
47

POTOČNIK, VIKTOR. "ČETRTA GENERACIJA VOJSKOVANJA 2. del: CELOVITA PRENOVA NACIONALNOVARNOSTNEGA SISTEMA." REPUBLIKA SLOVENIJA – PRVIH SAMOSTOJNIH PETINDVAJSET LET V MEDNARODNEM VARNOSTNEM OKOLJU/ REPUBLIC OF SLOVENIA – THE FIRST TWENTY-FIVE YEARS OF INDEPENDENCE IN THE INTERNATIONAL SECURITY ENVIRONMENT, VOLUME 2016/ ISSUE 18/4 (October 30, 2016): 51–66. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.18.4.3.

Full text
Abstract:
V prispevku avtor nadaljuje obravnavo četrte generacije vojskovanja in se osredotoča na nujne spremembe v nacionalnovarnostnem sistemu. Najprej pa skuša osvetliti nekatere alternativne predloge ureditve nacionalnovarnostnega sistema, in sicer z vidikov, ki v Sloveniji niso pogosto izpostavljeni. Podrobneje opredeli glavne elemente četrte generacije vojskovanja, ki bistveno vplivajo na postavitev ustreznega nacionalnovarnostnega sistema. Avtor nima ambicije podrobneje opredeljevati vseh elementov tega sistema, želi pa izpostaviti tiste ključne spremembe, ki bi omogočale ustrezne odzive na četrto generacijo vojskovanja, Slovenski vojski pa, da se ustrezno odzove nanjo. The article continues the discussion on the fourth generation warfare and focuses on the changes necessary in the national-security system. But first, it attempts to highlight some alternative views on how to restructure Slovenian national-security system through arguments that are not often presented to the public. To better understand why a new national-security system is needed, it analyses key elements of the fourth generation warfare. The article does not attempt to analyse in detail all the elements of a national-security system, but rather points to the key changes needed to set up a national-security system appropriate for the fourth generation warfare.
APA, Harvard, Vancouver, ISO, and other styles
48

Al-Marghilani, A. "Comprehensive Analysis of IoT Malware Evasion Techniques." Engineering, Technology & Applied Science Research 11, no. 4 (August 21, 2021): 7495–500. http://dx.doi.org/10.48084/etasr.4296.

Full text
Abstract:
Malware detection in Internet of Things (IoT) devices is a great challenge, as these devices lack certain characteristics such as homogeneity and security. Malware is malicious software that affects a system as it can steal sensitive information, slow its speed, cause frequent hangs, and disrupt operations. The most common malware types are adware, computer viruses, spyware, trojans, worms, rootkits, key loggers, botnets, and ransomware. Malware detection is critical for a system's security. Many security researchers have studied the IoT malware detection domain. Many studies proposed the static or dynamic analysis on IoT malware detection. This paper presents a survey of IoT malware evasion techniques, reviewing and discussing various researches. Malware uses a few common evasion techniques such as user interaction, environmental awareness, stegosploit, domain and IP identification, code obfuscation, code encryption, timing, and code compression. A comparative analysis was conducted pointing various advantages and disadvantages. This study provides guidelines on IoT malware evasion techniques.
APA, Harvard, Vancouver, ISO, and other styles
49

Yang, Renyi, Wanying Du, and Zisheng Yang. "Spatiotemporal Evolution and Influencing Factors of Urban Land Ecological Security in Yunnan Province." Sustainability 13, no. 5 (March 8, 2021): 2936. http://dx.doi.org/10.3390/su13052936.

Full text
Abstract:
(1) Background: Urban land ecological security is the basis and premise to ensure the sustainable utilization of urban land resources and regional sustainable development. However, urban land ecological security and its influencing factors have not been studied thoroughly. (2) Methods: An index system of urban land ecological security in Yunnan Province from 2010 to 2019 was constructed, and a comprehensive index of urban land ecological security was calculated by using analytic hierarchy process, entropy weight method, and comprehensive index method, and the LSDVC (Biased-corrected Least Square Dummy Variables) dynamic panel model was constructed from the economic, social and geographical dimensions to systematically analyze the influencing factors of urban land ecological security in Yunnan Province. (3) Results: The comprehensive index of urban land ecological security was significantly affected by the previous period, showing obvious inertia; with the improvement of urbanization level, the comprehensive index of urban land ecological security showed an inverted “U” shape, which first increased and then decreased; the decrease in comprehensive energy consumption per unit of industry and the improvement of fixed-asset investment level, science and technology level, and GDP will significantly promote the ecological security of urban land.
APA, Harvard, Vancouver, ISO, and other styles
50

Et. al., Suneetha Bulla,. "A Comprehensive Survey on Cryptography Evaluation in Mobile (MANETs)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 3406–16. http://dx.doi.org/10.17762/turcomat.v12i2.2402.

Full text
Abstract:
With the rapid development in network technology new network types based on wireless communication have emerged. A large family of wireless communication networks is the Mobile Ad hoc Networks (MANETs). While MANETs mobile devices should be able to connect with each other at any time and place, the vulnerabilities of MANET structure also introduce a wide range of attacks and present new challenges for the design of security mechanism ranging from developing and implementing lightweight cryptographic primitives to designing and analyzing secure protocols. Numerous security solutions and key management schemes such as symmetric and asymmetric cryptography have been used to support MANET environment. This paper conducted survey to gain a quick knowledge of security design demand and cryptography solutions to secure MANET. This survey focused on security schemas and case studies of cryptography techniques on Ad Hoc networks. Finally, conclusions are discussed.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography