Academic literature on the topic 'Hybrid security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hybrid security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hybrid security"
Enns, Charis, Nathan Andrews, and J. Andrew Grant. "Security for whom? Analysing hybrid security governance in Africa's extractive sectors." International Affairs 96, no. 4 (July 1, 2020): 995–1013. http://dx.doi.org/10.1093/ia/iiaa090.
Full textSaravanan, V., M. Sathishkumar, and M. Babu. "ATM Security System by using Hybrid Authentication." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 1977–79. http://dx.doi.org/10.31142/ijtsrd11535.
Full textSenhaji, Youssef, and Hicham Medromi. "Network Security: Hybrid IDPS." International Journal of Applied Information Systems 9, no. 5 (August 6, 2015): 5–8. http://dx.doi.org/10.5120/ijais2015451408.
Full textCUREA, Cătălina-Gabriela. "А HYBRID SECURITY THREAT." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 24 (July 28, 2023): 67–72. http://dx.doi.org/10.19062/2247-3173.2023.24.9.
Full textAkrap, Gordan. "Hybrid Challenges Require Hybrid, Scientifically Based, Responses." National security and the future 20, no. 1-2 (January 9, 2020): 25–33. http://dx.doi.org/10.37458/nstf.20.1-2.4.
Full textKuppuswamy, Prakash, Saeed Qasim Yahya Al Khalidi Al-Maliki, Rajan John, Mohammad Haseebuddin, and Ahmed Ali Shaik Meeran. "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm." Bulletin of Electrical Engineering and Informatics 12, no. 2 (April 1, 2023): 1148–58. http://dx.doi.org/10.11591/eei.v12i2.4967.
Full textA. Correa, Roddy, Juan Ram髇 Bermejo Higuera, Javier Bermejo Higuera, Juan Antonio SiciliaMontalvo, Manuel S醤chez Rubio, and �. Alberto Magre襻n. "Hybrid Security AssessmentMethodology forWeb Applications." Computer Modeling in Engineering & Sciences 126, no. 1 (2021): 89–124. http://dx.doi.org/10.32604/cmes.2021.010700.
Full textAbdul Majeed Haleem, Alyaa. "Voice Security Using Hybrid Algorithm." AL-Rafidain Journal of Computer Sciences and Mathematics 7, no. 2 (December 1, 2010): 107–18. http://dx.doi.org/10.33899/csmj.2010.163889.
Full textOSTROVSKA, Iryna. "HYBRID THREATS TO GLOBAL SECURITY." Public Administration and Civil Service, no. 1-76 (March 31, 2021): 68–78. http://dx.doi.org/10.52123/1994-2370-2021-76-1-63.
Full textMANISHA, KUMARI, EKKA DEEKSHA, and YADAV NISHI. "A NOVEL HYBRID SECURITY ALGORITHM." i-manager's Journal on Information Technology 7, no. 2 (2018): 37. http://dx.doi.org/10.26634/jit.7.2.14651.
Full textDissertations / Theses on the topic "Hybrid security"
Chaulagain, Dewan. "Hybrid Analysis of Android Applications for Security Vetting." Bowling Green State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1555608766287613.
Full textMundi, Anuj V. "PLC-WiFi hybrid broadband Internet deployment and security /." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0006964.
Full textTeo, Hong-Siang. "Security of sensor networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FTeo.pdf.
Full textThesis Advisor(s): John McEachen. "June 2006." Includes bibliographical references (p. 49-51). Also available in print.
Van, der Horst Timothy W. "Thor : the hybrid online repository /." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd696.pdf.
Full textCheng, Carol Shaoyu. "A hybrid approach to power system voltage security assessment." Diss., Georgia Institute of Technology, 1991. http://hdl.handle.net/1853/15469.
Full textKatsis, Grigorios. "Multistage security mechanism for hybrid, large scale wireless sensor networks." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Jun%5FKatsis.pdf.
Full textThesis Advisor(s): Murali Tummala, Gamani Karunasiri. "June 2007." Includes bibliographical references (p. 57-59). Also available in print.
Warmington, Sheray Kimberlyn. "State failure and hybrid security governance : the case of Jamaica." Thesis, University of York, 2017. http://etheses.whiterose.ac.uk/21205/.
Full textSuru, Hassan U. "Security and usability in a hybrid property based graphical authentication system." Thesis, University of Salford, 2018. http://usir.salford.ac.uk/48724/.
Full textСабадаш, Віктор Володимирович, Виктор Владимирович Сабадаш, Viktor Volodymyrovych Sabadash, and В. В. Сабадаш. "The security challenges of hybrid work formats in a digital economy." Thesis, ДВНЗ «Приазовський державний технічний університет», 2021. https://essuir.sumdu.edu.ua/handle/123456789/84066.
Full textИсследованы ключевые вызовы безопасности гибридных форматов работы в цифровой экономике
The key security challenges of hybrid work formats in the digital economy are investigated
Sunkaralakunta, Venkatarama Reddy Rakesh. "A User-Centric Security Policy Enforcement Framework for Hybrid Mobile Applications." University of Dayton / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1564744609523447.
Full textBooks on the topic "Hybrid security"
Tyagi, I. D. Hybrid vegetables for nutritional security. New Delhi: South Asian Publishers, 1998.
Find full text1946-, Schmidt Peter, ed. A hybrid relationship: Transatlantic security cooperation beyond NATO. Frankfurt am Main: Peter Lang Publishing, 2008.
Find full textHanoi, Vietnam) International Symposium on Hybrid Rice (4th 2002. Hybrid rice for food security, poverty alleviation, and environmental protection. Metro Manila, Philippines: IRRI, 2003.
Find full textHerrero, Alvaro. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
Find full textBanasik, Mirosław. Wojna hybrydowa i jej konsekwencje dla bezpieczeństwa euroatlantyckiego. Warszawa: Wydawnictwo "Difin", 2018.
Find full textSayed-Mouchaweh, Moamar, ed. Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74962-4.
Full textHybrid and cyber war as consequences of the asymmetry: A comprehensive approach answering hybrid actors and activities in cyberspace : political social and military responses. Frankfurt am Main: Peter Lang, 2011.
Find full textBartosh, A. A. Serai︠a︡ zona: Teatr gibridnoĭ voĭny. Moskva: Gori︠a︡chai︠a︡ linii︠a︡ - Telekom, 2021.
Find full textBook chapters on the topic "Hybrid security"
Gentile, Anthony, and Lauren R. Shapiro. "Security: Hybrid." In Encyclopedia of Security and Emergency Management, 1–3. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_293-1.
Full textGentile, Anthony, and Lauren R. Shapiro. "Security: Hybrid." In Encyclopedia of Security and Emergency Management, 872–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_293.
Full textMac Ginty, Roger. "Hybrid Security: Afghanistan." In International Peacebuilding and Local Resistance, 91–114. London: Palgrave Macmillan UK, 2011. http://dx.doi.org/10.1057/9780230307032_5.
Full textPrischink, Michael, Christian Kloimüllner, Benjamin Biesinger, and Günther R. Raidl. "Districting and Routing for Security Control." In Hybrid Metaheuristics, 87–103. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39636-1_7.
Full textvan Os, Elsine. "Security in the Hybrid Organisation." In Leading Hybrid Organisations, 89–116. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003387602-6.
Full textKurosawa, Kaoru. "Hybrid Encryption." In Encyclopedia of Cryptography and Security, 570–72. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_321.
Full textTurner, Mandy. "Security, Cooptation and Resistance." In Hybrid Forms of Peace, 188–207. London: Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9780230354234_10.
Full textEl Balbali, Hiba, Anas Abou El Kalam, and Mohamed Talha. "Big Data Between Quality and Security." In Hybrid Intelligent Systems, 1315–26. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27409-1_120.
Full textTarannum, Sabrina, Syed Md Minhaz Hossain, and Taufique Sayeed. "Cyber Security Issues: Web Attack Investigation." In Hybrid Intelligent Systems, 1254–69. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27409-1_115.
Full textCho, Sung-Bae, and Sang-Jun Han. "Intrusion Detection for Computer Security." In Computationally Intelligent Hybrid Systems, 245–72. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9780471683407.ch8.
Full textConference papers on the topic "Hybrid security"
Yeun-hee Jei, Ick-whan Bae, Sung-ja Choi, and Gang-soo Lee. "An Information Security Engineering Paradigm for Overcoming Information Security Crisis." In 2006 International Conference on Hybrid Information Technology. IEEE, 2006. http://dx.doi.org/10.1109/ichit.2006.253526.
Full textGray, George R., Edem Ibragimov, Joseph Sluz, and Raymond Sova. "Hybrid polarization control." In Defense and Security, edited by Andrew R. Pirich, Michael J. Hayduk, Eric J. Donkor, and Peter J. Delfyett, Jr. SPIE, 2005. http://dx.doi.org/10.1117/12.606952.
Full textSilva, Otávio A. A., and Paulo Lício de Geus. "Lokke, a hybrid security hypervisor." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19238.
Full textDonadio, Pasquale, Giovanni B. Fioccola, Roberto Canonico, and Giorgio Ventre. "Network security for Hybrid Cloud." In 2014 Euro Med Telco Conference (EMTC). IEEE, 2014. http://dx.doi.org/10.1109/emtc.2014.6996640.
Full textGandotra, Vandana, Archana Singhal, and Punam Bedi. "Identifying Security Requirements Hybrid Technique." In 2009 Fourth International Conference on Software Engineering Advances (ICSEA). IEEE, 2009. http://dx.doi.org/10.1109/icsea.2009.65.
Full textCogburn, Gabriel. "Chalcogenide and germanium hybrid optics." In SPIE Security + Defence, edited by Roberto Zamboni, François Kajzar, Attila A. Szep, Colin Lewis, Douglas Burgess, Mark T. Gruneisen, Miloslav Dusek, and John G. Rarity. SPIE, 2011. http://dx.doi.org/10.1117/12.897757.
Full textKyo-il Chung. "Security Framework for Remote Access to Home Network." In 2006 International Conference on Hybrid Information Technology. IEEE, 2006. http://dx.doi.org/10.1109/ichit.2006.253456.
Full textEun-Jun Yoon and Kee-Young Yoo. "Security of Authenticated Encryption Scheme with Message Linkages." In 2006 International Conference on Hybrid Information Technology. IEEE, 2006. http://dx.doi.org/10.1109/ichit.2006.253532.
Full textYoon, Eun-jun, and Kee-young Yoo. "Security Analysis of Hsieh-Sun's Deniable Authentication Protocol." In 2006 International Conference on Hybrid Information Technology. IEEE, 2006. http://dx.doi.org/10.1109/ichit.2006.253587.
Full textLee, Shinkyung, Namje Park, and Dooho Choi. "Security Management System for Sensor Network." In 2008 International Conference on Convergence and Hybrid Information Technology. IEEE, 2008. http://dx.doi.org/10.1109/ichit.2008.254.
Full textReports on the topic "Hybrid security"
Freddy, Imelda, and Gede Endy Gupta. Strengthening Food Security Policy: Reforms on Hybrid Maize Seeds Delivery Mechanism. Jakarta, Indonesia: Center for Indonesian Policy Studies, 2018. http://dx.doi.org/10.35497/271863.
Full textGaston, Erica, and András Derzsi-Horváth. Iraq after ISIL: An Analysis of Local, Hybrid, and Sub-State Security Forces. Institute of Regional and International Studies, August 2017. http://dx.doi.org/10.26598/auis_iris_2017_08_21.
Full textErkamo, Sanna, Karoliina Pilli-Sihvola, Atte Harjanne, and Heikki Tuomenvirta. Climate Security and Finland – A Review on Security Implications of Climate Change from the Finnish Perspective. Finnish Meteorological Institute, 2021. http://dx.doi.org/10.35614/isbn.9789523361362.
Full textThomas, Jakana. Duty and Defiance: Women in Community-based Armed Groups in West Africa. RESOLVE Network, March 2021. http://dx.doi.org/10.37805/cbags2021.1.
Full textLyzanchuk, Vasyl. COMMUNICATIVE SYNERGY OF UKRAINIAN NATIONAL VALUES IN THE CONTEXT OF THE RUSSIAN HYBRID WAR. Ivan Franko National University of Lviv, February 2021. http://dx.doi.org/10.30970/vjo.2021.49.11077.
Full textLyammouri, Rida. Central Mali: Armed Community Mobilization in Crisis. RESOLVE Network, November 2021. http://dx.doi.org/10.37805/cbags2021.4.
Full textClark, Helen. Environment of Peace. Stockholm International Peace Research Institute, August 2022. http://dx.doi.org/10.55163/fwdp2737.
Full textBattersby, Jane, Mercy Brown-Luthango, Issahaka Fuseini, Herry Gulabani, Gareth Haysom, Ben Jackson, Vrashali Khandelwal, et al. Living Off-Grid Food and Infrastructure Collaboration Working Paper 1: Concepts and Assumptions. Institute of Development Studies, May 2023. http://dx.doi.org/10.19088/logic.2023.001.
Full textLutz, Carsten, Carlos Areces, Ian Horrocks, and Ulrike Sattler. Keys, Nominals, and Concrete Domains. Technische Universität Dresden, 2002. http://dx.doi.org/10.25368/2022.122.
Full textDavies, Will. Improving the engagement of UK armed forces overseas. Royal Institute of International Affairs, January 2022. http://dx.doi.org/10.55317/9781784135010.
Full text