Academic literature on the topic 'ENHANCING SECURITY'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ENHANCING SECURITY.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "ENHANCING SECURITY"

1

Bellamkonda Sunderajulu, Kishore. "Enhancing Payment Transaction Security." International Journal of Science and Research (IJSR) 13, no. 11 (2024): 680–84. http://dx.doi.org/10.21275/sr241110202744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jaswal, Vivek. "Enhancing Cryptocurrency Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30683.

Full text
Abstract:
Cryptocurrency, a decentralized frame of computerized cash, has picked up ubiquity around the world. In any case, its broad selection has brought consideration to noteworthy security concerns. This paper presents a exhaustive examination of cryptocurrency security, distinguishing key challenges and proposing arrangements to support the security of advanced assets. The paper starts by talking about the foundational innovation of cryptocurrencies, specifically blockchain, which offers straightforwardness and unchanging nature but is defenceless to assaults such as 51% assaults and double-spendin
APA, Harvard, Vancouver, ISO, and other styles
3

J, Stephen, and Vidyavati Ramteke. "Enhancing Security Issues in Online Games." Journal of Advanced Research in Dynamical and Control Systems 12, no. 8 (2020): 95–103. http://dx.doi.org/10.5373/jardcs/v12i8/20202451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Haedar Akib,, Lutfi Saefullah, Husain Syam, Hamsu Abdul Gani,. "ENHANCING MARITIME SECURITY COOPERATION." Psychology and Education Journal 58, no. 2 (2021): 4769–75. http://dx.doi.org/10.17762/pae.v58i2.2868.

Full text
Abstract:
Seaborne trade is an important component of world trade by which, Indonesia’s water becomes very important and vital in contributing to the world economy. Notwithstanding the strategic meaning of Indonesian water to the World, Indonesian water is still the full responsibility of Indonesia. Indonesia has made substantial and sustained efforts to maintain the safety and security of its sea lanes of communication by updating paper charts, installing navigational aids, broadcasting maritime hazards and weather forecasts, and patrolling certain areas. These efforts show that Indonesia, somewhat, ha
APA, Harvard, Vancouver, ISO, and other styles
5

Shonola, Shaibu Adekunle, and Mike Joy. "Enhancing Mobile Learning Security." International Journal on Integrating Technology in Education 5, no. 3 (2016): 01–15. http://dx.doi.org/10.5121/ijite.2016.5301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hudson, R. B. "Enhancing Elderly Financial Security." Public Policy & Aging Report 19, no. 3 (2009): 2. http://dx.doi.org/10.1093/ppar/19.3.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pangalos, G., M. Khair, and L. Bozios. "Enhancing medical database security." Journal of Medical Systems 18, no. 4 (1994): 159–71. http://dx.doi.org/10.1007/bf00996700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wilkinson, Paul. "Enhancing global aviation security?" Terrorism and Political Violence 10, no. 3 (1998): 147–66. http://dx.doi.org/10.1080/09546559808427475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Arazi, B. "Enhancing Security with Nanotechnology." Computer 39, no. 10 (2006): 106–7. http://dx.doi.org/10.1109/mc.2006.338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

van der Meer, Sico. "Enhancing International Cyber Security." Security and Human Rights 26, no. 2-4 (2015): 193–205. http://dx.doi.org/10.1163/18750230-02602004.

Full text
Abstract:
Cyber aggression is an increasing threat to international security and stability. While national policies intended to deter cyber aggression may offer some solution in the short term, their effects in the long term are doubtful. National cyber-deterrence policies entail the risk of an on-going cyber arms race and a cycle of escalation between potential cyber opponents. Diplomacy may offer fewer results in the short term, but it is more promising in the long term. Confidence-building measures and international norms and values may not be easy to reach, but in the end they could be more effectiv
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "ENHANCING SECURITY"

1

Zhang, Linfan, and Shuang Zheng. "Enhancing QR Code Security." Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-14145.

Full text
Abstract:
Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come after. We also give an objective evaluation on the outcome in comparison to existing QR products. They ar
APA, Harvard, Vancouver, ISO, and other styles
2

Yue, Chuan. "Enhancing Web Browsing Security." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623575.

Full text
Abstract:
Web browsing has become an integral part of our lives, and we use browsers to perform many important activities almost everyday and everywhere. However, due to the vulnerabilities in Web browsers and Web applications and also due to Web users' lack of security knowledge, browser-based attacks are rampant over the Internet and have caused substantial damage to both Web users and service providers. Enhancing Web browsing security is therefore of great need and importance.;This dissertation concentrates on enhancing the Web browsing security through exploring and experimenting with new approaches
APA, Harvard, Vancouver, ISO, and other styles
3

H, Fruchter Nathaniel. "Enhancing ISP-consumer security notifications." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122916.

Full text
Abstract:
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2019<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 79-85).<br>Security notification schemes hold great promise for improving both consumer cybersecurity and general network health as malware and other sources of malici
APA, Harvard, Vancouver, ISO, and other styles
4

Mohammed, Ali, Sachin Sama, and Majeed Mohammed. "Enhancing Network Security in Linux Environment." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17144.

Full text
Abstract:
Designing a secured network is the most important task in any enterprise or organization development. Securing a network mainly involves applying policies and procedures to protect different network devices from unauthorized access. Servers such as web servers, file servers, mail servers, etc., are the important devices in a network. Therefore, securing these servers is the first and foremost step followed in every security implementation mechanism. To implement this, it is very important to analyse and study the security mechanisms provided by the operating system. This makes it easier for se
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Ying. "Enhancing security for XML Web services." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27531.

Full text
Abstract:
The XML-based interoperable characteristics make enhancing security for XML Web Services a lot different from that of the traditional network-based applications. SSL VPN gateways are usually used to provide security for traditional network-based applications, but not for Web Services. This thesis presents an integrated security solution for securing both traditional network-based applications and Web Services. The integrated security solution includes a VPN framework and a Web Services framework. Considering that we have already had an SSL VPN gateway developed by our lab, we take it as the mo
APA, Harvard, Vancouver, ISO, and other styles
6

Kadhum, Hamza. "Enhancing Zigbee Security for Industrial Implementation." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279559.

Full text
Abstract:
Zigbee network is a popular choice for deploying low power personal area network (LoWPAN). The application areas vary but the most popular are industrial area monitoring and home automation. But Zigbee has been identified to have weak security and is not applicable for industrial implementation. This paper is collaboration with Ericsson to investigate Zigbee network security and implementation. This paper will cover security solutions for Zigbee and touch on how to configure Zigbee network such that it can operate for a long period of time without battery changes. The security solutions will d
APA, Harvard, Vancouver, ISO, and other styles
7

Makkar, Ankush. "Enhancing IoT Security Using 5G Capabilities." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85109.

Full text
Abstract:
Internet of Things (IoT) is an ecosystem comprises CT (Communication Technology),IT (Information Technology) and sometime OT (Operational Technologies) wheredifferent machines and devices can interact with each other and exchange useful datawhich can be processed using different IoT applications to take decisions and performrequired actions. Number of IoT devices and IoT networks are growing exponentially.Security is of utmost importance and without proper security implementation, IoTNetworks with billions of devices will be hacked and used as botnets which can createdisaster. The new IoT use
APA, Harvard, Vancouver, ISO, and other styles
8

Fekete, Florian. "Civil-military relations : enhancing international security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FFekete.pdf.

Full text
Abstract:
Thesis (M.A. in International Security and Civil-Military Relations)--Naval Postgraduate School, March 2003.<br>Thesis advisor(s): Donald Abenheim, Karen Guttieri. Includes bibliographical references (p. 65-70). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
9

Kirkham, E., and C. Flew. "Strengthening embargoes and enhancing human security." Thesis, International Alert, Saferworld and University of Bradford, Department of Peace Studies, Centre for International Co-operation and Security, 2003. http://hdl.handle.net/10454/4275.

Full text
Abstract:
yes<br>Arms embargoes are one of the principal tools of states in seeking to prevent, limit and bring an end to armed conflict and human rights abuses. Despite the frequency with which arms embargoes have been imposed, there are significant problems with their implementation. Pressure is therefore growing for the international governmental community to act in order to ensure that the political commitment embodied by the imposition of arms embargoes is matched by the commitment to ensure their rigorous enforcement and to achieve enhanced human security on the ground. Increasing the effecti
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Man Hee. "Architectural support for enhancing security in clusters." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2889.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "ENHANCING SECURITY"

1

Cuthbertson, Ian M., and David Robertson. Enhancing European Security. Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shultz, George Pratt. Enhancing diplomatic security. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rowny, Edward L. SDI, enhancing security and stability. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rowny, Edward L. SDI, enhancing security and stability. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rowny, Edward L. SDI, enhancing security and stability. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rao, Vemuri V., ed. Enhancing computer security with smart technology. Auerbach Publications, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Congressional Budget Office, ed. Enhancing U.S. security through foreign aid. Congress of the U.S., Congressional Budget Office., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congressional Budget Office, ed. Enhancing U.S. security through foreign aid. Congress of the U.S., Congressional Budget Office., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Congressional Budget Office., ed. Enhancing U.S. security through foreign aid. Congress of the U.S., Congressional Budget Office., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Congressional Budget Office., ed. Enhancing U.S. security through foreign aid. Congress of the U.S., Congressional Budget Office., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "ENHANCING SECURITY"

1

Verma, Himanshu, and Nimish Kumar. "Enhancing Security." In Internet of Things Vulnerabilities and Recovery Strategies. Auerbach Publications, 2024. http://dx.doi.org/10.1201/9781003474838-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Coffin, David. "Enhancing Security." In Expert Oracle and Java Security. Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3832-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Menkes, Jerzy. "Enhancing security resilience." In Regional Cooperation and Resilience in East Asia. Routledge, 2024. http://dx.doi.org/10.4324/9781003458357-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alshar'e, Marwan, Abdallah Abualkishik, Khaled Abuhmaidan, and Ahmad Kayed. "Enhancing Project Security." In 5G Enabled Technology for Smart City and Urbanization System. Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781003467892-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cuthbertson, Ian M., and David Robertson. "Security Through Behavioral Modification." In Enhancing European Security. Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cuthbertson, Ian M., and David Robertson. "Introduction." In Enhancing European Security. Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cuthbertson, Ian M., and David Robertson. "Arms Control and All That." In Enhancing European Security. Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cuthbertson, Ian M., and David Robertson. "Combining Control and Enhancement." In Enhancing European Security. Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cuthbertson, Ian M., and David Robertson. "Why Was INF Needed, and Would It Have Been Used?" In Enhancing European Security. Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cuthbertson, Ian M., and David Robertson. "Conventional Force Imbalances: How to Count, and Can We Count?" In Enhancing European Security. Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-20682-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "ENHANCING SECURITY"

1

Leong, Wai Yie, Yuan Zhi Leong, and Wai San Leong. "Enhancing Blockchain Security." In 2024 IEEE Symposium on Wireless Technology & Applications (ISWTA). IEEE, 2024. http://dx.doi.org/10.1109/iswta62130.2024.10651753.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Khan, Mansoor, Muhammad Ilyas, and Oguz Bayat. "Enhancing IoT Security Through Hardware Security Modules (HSMs)." In 2024 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS). IEEE, 2024. https://doi.org/10.1109/iccns62192.2024.10776375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sengupta, Disha, Subhash A. Nalawade, Lakshmi Sharma, Mrunal Sanjay Jagtap Kakade, Vishal Kisan Borate, and Yogesh Kisan Mali. "Enhancing File Security Using Hybrid Cryptography." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Arepalli, Gopi Suresh, Paluvai Bhavana, Yakkanti Venkata Sai Krishna, and Chittibomma Surendrababu. "Enhancing Transaction Security through Iris Recognition." In 2024 International Conference on Expert Clouds and Applications (ICOECA). IEEE, 2024. http://dx.doi.org/10.1109/icoeca62351.2024.00124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

P, Keerthana, Prasath S, Tamilmani S, and Veeragokulraj S. "Enhancing Campus Security Through Smart Surveillance System." In 2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2024. http://dx.doi.org/10.1109/icaccs60874.2024.10716961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maram, Balajee, Ashwini Mandale-Jadhav, Ratnababu Pilli, Neeraj Sharma, Joel Krupakar Gutla, and G. Charles Babu. "Enhancing Cryptographic Security through Recurrent Neural Networks." In 2024 5th International Conference on Smart Electronics and Communication (ICOSEC). IEEE, 2024. http://dx.doi.org/10.1109/icosec61587.2024.10722049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vakkund, Sharan, Sachin Kumar, Shaifali Rao, Anusha Hegde H, and Biswajit Bhowmik. "Enhancing Big Data Security Through Anomaly Detection." In 2024 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER). IEEE, 2024. http://dx.doi.org/10.1109/discover62353.2024.10750765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Xiaopeng, Hao Li, Xiaobo Guo, Lizhe Liu, Chunxu Kuang, and Yangyang Zhao. "Enhancing BGP security based on decentralized authentication." In 4th International Conference on Green Communication, Network, and Internet of Things (CNIoT 2024), edited by Xiangjie Kong and Cheng Siong Chin. SPIE, 2024. http://dx.doi.org/10.1117/12.3052469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ayush, Pradhyumn Singh, Vanshit Saini, Pratham Jain, Kashish Kumari, and Parveen Kumar Bajaj. "Enhancing Home Security Using Internet Of Things." In 2024 IEEE 4th International Conference on ICT in Business Industry & Government (ICTBIG). IEEE, 2024. https://doi.org/10.1109/ictbig64922.2024.10911286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mirda, Irfan, Adifa Widyadhani Chanda D'Layla, Ntivuguruzwa Jean De La Croix, and Tohari Ahmad. "Enhancing Data Security Through Double Steganography Approaches." In 2025 10th International Conference on Signal Processing and Communication (ICSC). IEEE, 2025. https://doi.org/10.1109/icsc64553.2025.10968981.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "ENHANCING SECURITY"

1

Rowny, Edward L. SDI: Enhancing Security and Stability. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada351518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pregenzer, A. L. Enhancing regional security agreements through cooperative monitoring. Office of Scientific and Technical Information (OSTI), 1995. http://dx.doi.org/10.2172/79720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yunus, Sarıkaya, and Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yunus, Sarıkaya, and Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Albek, Aminuddin. The ASEAN Political-Security Community: Enhancing Defense Cooperation. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ad1009058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Garza, Christopher. Enhancing Cyber Insurance Underwriting Through Existing Security Frameworks. Iowa State University, 2021. http://dx.doi.org/10.31274/cc-20240624-621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Research Institute (IFPRI), International Food Policy. Increasing agricultural productivity and enhancing food security in Africa. International Food Policy Research Institute, 2012. http://dx.doi.org/10.2499/9780896297937.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fritz, Tucker. Enhancing Reliability of Classified Shipments Between the Nuclear Security Enterprise. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1764607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Barbeau, Sean. Enhancing Transit Safety and Security with Wireless Detection and Communication Technologies. University of South Florida, 2008. http://dx.doi.org/10.5038/cutr-nctr-rr-2007-02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cruz, Alfredo, Jeff Duffany, and Alexander Lopez. Enhancing Research in Networking & System Security, and Forensics, in Puerto Rico. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada622717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!