Journal articles on the topic 'Comprehensive security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Comprehensive security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Prezelj, Iztok. "Comprehensive Security and Some Implemental Limits." Information & Security: An International Journal 33, no. 1,2 (October 2015): 13–34. http://dx.doi.org/10.11610/isij.3301.
Full textSweijs, Tim. "Assessing Comprehensive Security Approaches in Action: An Introduction." Information & Security: An International Journal 33, no. 1,2 (October 2015): 5–9. http://dx.doi.org/10.11610/isij.3300.
Full textYushmanov, Anton А. "DEVELOP A COMPREHENSIVE SECURITY SYSTEM." Interexpo GEO-Siberia 7, no. 1 (July 8, 2020): 140–48. http://dx.doi.org/10.33764/2618-981x-2020-7-1-140-148.
Full textDewitt, David. "Common, comprehensive, and cooperative security." Pacific Review 7, no. 1 (January 1994): 1–15. http://dx.doi.org/10.1080/09512749408719067.
Full textRix, Alan. "Japan's comprehensive security and Australia." Australian Outlook 41, no. 2 (August 1987): 79–86. http://dx.doi.org/10.1080/10357718708444936.
Full textWatt, Steve. "Computer security — comprehensive controls checklist." Computer Fraud & Security Bulletin 10, no. 4 (February 1988): 15–16. http://dx.doi.org/10.1016/0142-0496(88)90084-7.
Full textGasper, Des, and Oscar A. Gómez. "Human security thinking in practice: ‘personal security’, ‘citizen security' and comprehensive mappings." Contemporary Politics 21, no. 1 (January 2, 2015): 100–116. http://dx.doi.org/10.1080/13569775.2014.993906.
Full textCorrea Chica, Juan Camilo, Jenny Cuatindioy Imbachi, and Juan Felipe Botero Vega. "Security in SDN: A comprehensive survey." Journal of Network and Computer Applications 159 (June 2020): 102595. http://dx.doi.org/10.1016/j.jnca.2020.102595.
Full textWesting, Arthur H. "Comprehensive Human Security and Ecological Realities." Environmental Conservation 16, no. 4 (1989): 295. http://dx.doi.org/10.1017/s037689290000967x.
Full textShabtai, A., Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, and C. Glezer. "Google Android: A Comprehensive Security Assessment." IEEE Security & Privacy Magazine 8, no. 2 (March 2010): 35–44. http://dx.doi.org/10.1109/msp.2010.2.
Full textFouinat, François. "A comprehensive framework for human security." Conflict, Security & Development 4, no. 3 (December 2004): 289–97. http://dx.doi.org/10.1080/1467880042000319872.
Full textApakan, Ertugrul, and Wolfgang Sporrer. "Comprehensive Security in a Conflict Environment." Security and Human Rights 29, no. 1-4 (December 12, 2018): 83–89. http://dx.doi.org/10.1163/18750230-02901001.
Full textWesting, Arthur H. "The Environmental Component of Comprehensive Security." Bulletin of Peace Proposals 20, no. 2 (April 1989): 129–34. http://dx.doi.org/10.1177/096701068902000203.
Full textSwain, Sunita, and Rajesh Kumar Tiwari. "CLOUD SECURITY RESEARCH- A COMPREHENSIVE SURVEY." International Journal of Electronics Engineering and Applications VIII, no. II (December 1, 2020): 29. http://dx.doi.org/10.30696/ijeea.viii.ii.2020.29-39.
Full textChen, Yan, K. (Ram) Ramamurthy, and Kuang-Wei Wen. "Impacts of Comprehensive Information Security Programs on Information Security Culture." Journal of Computer Information Systems 55, no. 3 (March 2015): 11–19. http://dx.doi.org/10.1080/08874417.2015.11645767.
Full textPoposka, Vesna. "The Urge for Comprehensive Cyber Security Strategies in the Western Balkan." Information & Security: An International Journal 34 (2016): 25–36. http://dx.doi.org/10.11610/isij.3402.
Full textCasarini, Nicola. "Europe’s comprehensive approach to Northeast Asia’s security." Monde chinois 53, no. 1 (2018): 94. http://dx.doi.org/10.3917/mochi.053.0094.
Full textAlger, Chadwick. "A Comprehensive Overview of the Security Council." International Studies Review 7, no. 1 (March 2005): 122–24. http://dx.doi.org/10.1111/j.1521-9488.2005.00476.x.
Full textNorton, RA. "Food security issues-a potential comprehensive plan." Poultry Science 82, no. 6 (June 2003): 958–63. http://dx.doi.org/10.1093/ps/82.6.958.
Full textKralik, Lukas, Roman Senkerik, and Roman Jasek. "Model for comprehensive approach to security management." International Journal of System Assurance Engineering and Management 7, no. 2 (February 3, 2016): 129–37. http://dx.doi.org/10.1007/s13198-016-0420-8.
Full textZheng, Qun-Wei, Wei-Ci Su, Feng-Tai Zhang, and Zi-Qin Zhou. "Evaluation of Water Resources Security in the Karst Region from the “Man-Land-Water” Perspective: A Case Study of Guizhou Province." Water 11, no. 2 (January 29, 2019): 224. http://dx.doi.org/10.3390/w11020224.
Full textZhang, Pu, and Huan Wang. "Comprehensive Evaluation and Analysis of China’s Energy Security." Advanced Materials Research 1008-1009 (August 2014): 1415–20. http://dx.doi.org/10.4028/www.scientific.net/amr.1008-1009.1415.
Full textEspinosa García, Javier, Luis Hernández Encinas, and Alberto Peinado Domínguez. "A Comprehensive Security Framework Proposal to Contribute to Sustainability." Sustainability 13, no. 12 (June 18, 2021): 6901. http://dx.doi.org/10.3390/su13126901.
Full textBhatia, Manjot Kaur, Akash Bhardwaj, and Diksha Singla. "A Comprehensive Study of Security in Cloud Computing." International Journal of Computer Sciences and Engineering 6, no. 12 (December 31, 2018): 394–98. http://dx.doi.org/10.26438/ijcse/v6i12.394398.
Full textKhan, Najeeb Ahmad, V. K. Panchal, and Safdar Tanweer. "Comprehensive analysis of data storage security in cloud." Global Sci-Tech 11, no. 2 (2019): 82. http://dx.doi.org/10.5958/2455-7110.2019.00012.0.
Full textMcDermott, Paul. "Personal firewalls…One more step towards comprehensive security." Network Security 2000, no. 11 (November 2000): 11–14. http://dx.doi.org/10.1016/s1353-4858(00)85024-2.
Full textRamachandra, Gururaj, Mohsin Iftikhar, and Farrukh Aslam Khan. "A Comprehensive Survey on Security in Cloud Computing." Procedia Computer Science 110 (2017): 465–72. http://dx.doi.org/10.1016/j.procs.2017.06.124.
Full textJeyadurga, P., S. Ebenezer Juliet, I. Joshua Selwyn, and P. Sivanisha. "Security in Smart Healthcare System: A Comprehensive Survey." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 10 (October 30, 2017): 39. http://dx.doi.org/10.23956/ijarcsse.v7i10.423.
Full textSharma, Saloni, and Anuj Kumar Gupta. "A Comprehensive Review of Security Issues in Manets." International Journal of Computer Applications 69, no. 21 (May 31, 2013): 32–37. http://dx.doi.org/10.5120/12097-8277.
Full textGriffith, Melissa K. "A comprehensive security approach: bolstering Finnish cybersecurity capacity." Journal of Cyber Policy 3, no. 3 (September 2, 2018): 407–29. http://dx.doi.org/10.1080/23738871.2018.1561919.
Full textBanerjee, Dipankar. "Towards Comprehensive and Cooperative Security in South Asia." South Asian Survey 6, no. 2 (September 1999): 305–18. http://dx.doi.org/10.1177/097152319900600211.
Full textChapsos, Ioannis, and James A. Malcolm. "Maritime security in Indonesia: Towards a comprehensive agenda?" Marine Policy 76 (February 2017): 178–84. http://dx.doi.org/10.1016/j.marpol.2016.11.033.
Full text., Annie Sujith. "COMPREHENSIVE OVERVIEW ON SECURITY SOLUTIONS FOR MOBILE DEVICES." International Journal of Research in Engineering and Technology 05, no. 16 (May 25, 2016): 110–15. http://dx.doi.org/10.15623/ijret.2016.0516024.
Full textBobrow, Davis B., Robert W. Barnett, Robert S. Ozaki, and Walter Arnold. "Beyond War. Japan's Concept of Comprehensive National Security." Pacific Affairs 58, no. 4 (1985): 697. http://dx.doi.org/10.2307/2758494.
Full textGuski, R., J. C. Dayka, L. N. Distel, W. B. Farrell, K. A. Gdaniec, M. J. Kelly, M. A. Nelson, L. H. Overby, and L. G. Robinson. "Security on z/OS: Comprehensive, current, and flexible." IBM Systems Journal 40, no. 3 (2001): 696–720. http://dx.doi.org/10.1147/sj.403.0696.
Full textZheng, Yunhong, and Kai Li. "Ecological security comprehensive evaluation on mineral-resource enterprises." Chinese Journal of Geochemistry 25, S1 (March 2006): 44. http://dx.doi.org/10.1007/bf02839818.
Full textAkberdina, V. V., A. V. Grebenkin, and O. P. Smirnova. "Comprehensive Assessment of Industries Economic Security: Regional Aspect." Economy of Region 4 (November 2017): 1264–79. http://dx.doi.org/10.17059/2017-4-23.
Full textZagoria, Donald S., Robert W. Barnett, and Edwin P. Hoyt. "Beyond War: Japan's Concept of Comprehensive National Security." Foreign Affairs 64, no. 1 (1985): 193. http://dx.doi.org/10.2307/20042551.
Full textGul, Shabnam, Muhammad Faizan Asghar, and Zara Qurban. "Narrative Building for Comprehensive National Security of Pakistan." Global Strategic & Securities Studies Review VI, no. I (March 30, 2021): 38–46. http://dx.doi.org/10.31703/gsssr.2021(vi-i).05.
Full textMcAteer, Ian, Ahmed Ibrahim, Guanglou Zheng, Wencheng Yang, and Craig Valli. "Integration of Biometrics and Steganography: A Comprehensive Review." Technologies 7, no. 2 (April 8, 2019): 34. http://dx.doi.org/10.3390/technologies7020034.
Full textWang, Yufei, Tengbiao Zhang, and Qian Ye. "Situation awareness framework for industrial control system based on cyber kill chain." MATEC Web of Conferences 336 (2021): 02013. http://dx.doi.org/10.1051/matecconf/202133602013.
Full textShyla and Vishal Bhatnagar. "Comprehensive Examination of Network Intrusion Detection Models on Data Science." International Journal of Information Retrieval Research 11, no. 4 (October 2021): 14–40. http://dx.doi.org/10.4018/ijirr.2021100102.
Full textBhargavi, M., and Dr M.Nagabhushana Rao. "Security Issues and Challenges in IOT: a Comprehensive Study." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 298. http://dx.doi.org/10.14419/ijet.v7i2.32.15700.
Full textHäusler, Hermann. "Military Geology and Comprehensive Security Geology – Applied Geologic Contributions to New Austrian Security Strategy." Austrian Journal of Earth Sciences 108, no. 2 (2015): 302–16. http://dx.doi.org/10.17738/ajes.2015.0027.
Full textNasir, Akhyari, Ruzaini Abdullah Arshah, and Mohd Rashid Ab Hamid. "The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study." Advanced Science Letters 24, no. 10 (October 1, 2018): 7690–95. http://dx.doi.org/10.1166/asl.2018.13001.
Full textRadtke, Kurt. "VII. Sino-Indian Relations: Security Dilemma, Ideological Polarization, or Cooperation Based on 'Comprehensive Security'?" Perspectives on Global Development and Technology 2, no. 3 (2003): 499–520. http://dx.doi.org/10.1163/156915003322986370.
Full textPOTOČNIK, VIKTOR. "ČETRTA GENERACIJA VOJSKOVANJA 2. del: CELOVITA PRENOVA NACIONALNOVARNOSTNEGA SISTEMA." REPUBLIKA SLOVENIJA – PRVIH SAMOSTOJNIH PETINDVAJSET LET V MEDNARODNEM VARNOSTNEM OKOLJU/ REPUBLIC OF SLOVENIA – THE FIRST TWENTY-FIVE YEARS OF INDEPENDENCE IN THE INTERNATIONAL SECURITY ENVIRONMENT, VOLUME 2016/ ISSUE 18/4 (October 30, 2016): 51–66. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.18.4.3.
Full textAl-Marghilani, A. "Comprehensive Analysis of IoT Malware Evasion Techniques." Engineering, Technology & Applied Science Research 11, no. 4 (August 21, 2021): 7495–500. http://dx.doi.org/10.48084/etasr.4296.
Full textYang, Renyi, Wanying Du, and Zisheng Yang. "Spatiotemporal Evolution and Influencing Factors of Urban Land Ecological Security in Yunnan Province." Sustainability 13, no. 5 (March 8, 2021): 2936. http://dx.doi.org/10.3390/su13052936.
Full textEt. al., Suneetha Bulla,. "A Comprehensive Survey on Cryptography Evaluation in Mobile (MANETs)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 3406–16. http://dx.doi.org/10.17762/turcomat.v12i2.2402.
Full text