Journal articles on the topic 'Hybrid security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hybrid security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Enns, Charis, Nathan Andrews, and J. Andrew Grant. "Security for whom? Analysing hybrid security governance in Africa's extractive sectors." International Affairs 96, no. 4 (July 1, 2020): 995–1013. http://dx.doi.org/10.1093/ia/iiaa090.
Full textSaravanan, V., M. Sathishkumar, and M. Babu. "ATM Security System by using Hybrid Authentication." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 1977–79. http://dx.doi.org/10.31142/ijtsrd11535.
Full textSenhaji, Youssef, and Hicham Medromi. "Network Security: Hybrid IDPS." International Journal of Applied Information Systems 9, no. 5 (August 6, 2015): 5–8. http://dx.doi.org/10.5120/ijais2015451408.
Full textCUREA, Cătălina-Gabriela. "А HYBRID SECURITY THREAT." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 24 (July 28, 2023): 67–72. http://dx.doi.org/10.19062/2247-3173.2023.24.9.
Full textAkrap, Gordan. "Hybrid Challenges Require Hybrid, Scientifically Based, Responses." National security and the future 20, no. 1-2 (January 9, 2020): 25–33. http://dx.doi.org/10.37458/nstf.20.1-2.4.
Full textKuppuswamy, Prakash, Saeed Qasim Yahya Al Khalidi Al-Maliki, Rajan John, Mohammad Haseebuddin, and Ahmed Ali Shaik Meeran. "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm." Bulletin of Electrical Engineering and Informatics 12, no. 2 (April 1, 2023): 1148–58. http://dx.doi.org/10.11591/eei.v12i2.4967.
Full textA. Correa, Roddy, Juan Ram髇 Bermejo Higuera, Javier Bermejo Higuera, Juan Antonio SiciliaMontalvo, Manuel S醤chez Rubio, and �. Alberto Magre襻n. "Hybrid Security AssessmentMethodology forWeb Applications." Computer Modeling in Engineering & Sciences 126, no. 1 (2021): 89–124. http://dx.doi.org/10.32604/cmes.2021.010700.
Full textAbdul Majeed Haleem, Alyaa. "Voice Security Using Hybrid Algorithm." AL-Rafidain Journal of Computer Sciences and Mathematics 7, no. 2 (December 1, 2010): 107–18. http://dx.doi.org/10.33899/csmj.2010.163889.
Full textOSTROVSKA, Iryna. "HYBRID THREATS TO GLOBAL SECURITY." Public Administration and Civil Service, no. 1-76 (March 31, 2021): 68–78. http://dx.doi.org/10.52123/1994-2370-2021-76-1-63.
Full textMANISHA, KUMARI, EKKA DEEKSHA, and YADAV NISHI. "A NOVEL HYBRID SECURITY ALGORITHM." i-manager's Journal on Information Technology 7, no. 2 (2018): 37. http://dx.doi.org/10.26634/jit.7.2.14651.
Full textGostev, A. N. "HYBRID WAR: PRACTICE, SECURITY ISSUES." Innovatics and Expert Examination, no. 1(26) (March 15, 2019): 237–57. http://dx.doi.org/10.35264/1996-2274-2019-1-237-257.
Full textGordon, Adam. "The Hybrid Cloud Security Professional." IEEE Cloud Computing 3, no. 1 (January 2016): 82–86. http://dx.doi.org/10.1109/mcc.2016.21.
Full textKulkarni, Utkarsha, Rosemeen Mansuri, and Riya Adikane. "File Storage on Cloud Using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 1950–53. http://dx.doi.org/10.22214/ijraset.2022.42652.
Full textFairosebanu, Abdul Azis, and Antony Cruz Nisha Jebaseeli. "Data security in cloud environment using cryptographic mechanism." Bulletin of Electrical Engineering and Informatics 12, no. 1 (February 1, 2023): 462–71. http://dx.doi.org/10.11591/eei.v12i1.4590.
Full textStreltsov, Volodymyr, and Oleksandr Moskalenko. "Shaping a Hybrid CFSP to Face Hybrid Security Challenges." European Foreign Affairs Review 22, Issue 4 (December 1, 2017): 513–32. http://dx.doi.org/10.54648/eerr2017038.
Full textSchroeder, Ursula C., Fairlie Chappuis, and Deniz Kocak. "Security Sector Reform and the Emergence of Hybrid Security Governance." International Peacekeeping 21, no. 2 (March 15, 2014): 214–30. http://dx.doi.org/10.1080/13533312.2014.910405.
Full textLee, Jun Hee. "Hybrid Data Management in Cloud Security." Asia-pacific Journal of Convergent Research Interchange 1, no. 4 (December 30, 2015): 29–35. http://dx.doi.org/10.21742/apjcri.2015.12.05.
Full textShalish, Wasim, A. Ghalwash, H. El-Deeb, and K. Badran. "Hybrid Database Performance Evaluation Achieving Security." International Conference on Electrical Engineering 8, no. 8th (May 1, 2012): 1–14. http://dx.doi.org/10.21608/iceeng.2012.30664.
Full textMandeep Kaur, Neha,. "Enhanced Security using Hybrid Encryption Algorithm." International Journal of Innovative Research in Computer and Communication Engineering 4, no. 7 (July 30, 2016): 13001–7. http://dx.doi.org/10.15680/ijircce.2016.0407001.
Full textOrobosade, Alabi, Thompson Aderonke, Alese Boniface, and Arome J. "Cloud Application Security using Hybrid Encryption." Communications on Applied Electronics 7, no. 33 (May 29, 2020): 25–31. http://dx.doi.org/10.5120/cae2020652866.
Full textMitrović, Miroslav. "Hybrid warfare and asymmetric security threats." Vojno delo 69, no. 7 (2017): 333–47. http://dx.doi.org/10.5937/vojdelo1705333m.
Full textBagayoko, Niagalé. "Introduction: Hybrid Security Governance in Africa." IDS Bulletin 43, no. 4 (July 2012): 1–13. http://dx.doi.org/10.1111/j.1759-5436.2012.00330.x.
Full textSood, Sandeep K. "Hybrid Data Security Model for Cloud." International Journal of Cloud Applications and Computing 3, no. 3 (July 2013): 50–59. http://dx.doi.org/10.4018/ijcac.2013070104.
Full textAhmed, Musa Midila. "Hybrid Encryption for Messages’ Confidentiality in SOSE-Based IOT Service Systems." International Journal of Innovative Computing 11, no. 2 (October 31, 2021): 1–6. http://dx.doi.org/10.11113/ijic.v11n2.292.
Full textKalaiselvi, K., N. Jayashri, and G. Saraswathi. "Protected Data Using Hybrid Algorithm in Cloud." International Journal of Engineering & Technology 7, no. 3.27 (August 15, 2018): 318. http://dx.doi.org/10.14419/ijet.v7i3.27.17898.
Full textManap, A. T., and G. A. Abitova. "Development of information technology for secure file storage based on hybrid cryptography methods." Bulletin of Shakarim University. Technical Sciences 1, no. 4(12) (December 28, 2023): 39–46. http://dx.doi.org/10.53360/2788-7995-2023-4(12)-6.
Full textBriggs, Chad. "Climate Change and Hybrid Warfare Strategies." Journal of Strategic Security 13, no. 4 (December 2020): 45–57. http://dx.doi.org/10.5038/1944-0472.13.4.1864.
Full textPatwa, Sanjivani, and Jayram Dwivedi. "Authentication based Hybrid Security Method for Securing Data in Cloud Environment." International Journal of Computer Applications 139, no. 7 (April 15, 2016): 27–31. http://dx.doi.org/10.5120/ijca2016909202.
Full textSTONIČ, DAVID. "PREDSTAVITEV MODELA ZA PREPOZNAVANJE HIBRIDNIH GROŽENJ." 20 YEARS OF CONTEMPORARY MILITARY CHALLENGES/20 LET SODOBNIH VOJAŠKIH IZZIVOV, VOLUME 2018, ISSUE 20/4 (October 15, 2018): 105–18. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.20.4.5.
Full textDr Asha Ambhaikar, Mr Abhishek Guru,. "AES AND RSA-BASED HYBRID ALGORITHMS FOR MESSAGE ENCRYPTION & DECRYPTION." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 1, 2021): 273–79. http://dx.doi.org/10.17762/itii.v9i1.129.
Full textBalto, Karl Edvard, Muhammad Mudassar Yamin, Andrii Shalaginov, and Basel Katt. "Hybrid IoT Cyber Range." Sensors 23, no. 6 (March 13, 2023): 3071. http://dx.doi.org/10.3390/s23063071.
Full textTaji, Khaoula, Badr Elkhalyly, Yassine Taleb Ahmad, Ilyas Ghanimi, and Fadoua Ghanimi. "Securing Smart Agriculture: Proposed Hybrid Meta-Model and Certificate-based Cyber Security Approaches." Data and Metadata 2 (December 30, 2023): 155. http://dx.doi.org/10.56294/dm2023155.
Full textNenad, Nenad, and Rina Kirkova. "THE CONCEPT OF HYBRID THREATS." Knowledge International Journal 28, no. 6 (December 10, 2018): 1795–99. http://dx.doi.org/10.35120/kij28061795n.
Full textVarnalii, Z., and T. Tomashevskyi. "Financial Security of Ukraine in Hybrid War." Bulletin of Taras Shevchenko National University of Kyiv. Economics, no. 204 (2019): 6–13. http://dx.doi.org/10.17721/1728-2667.2019/204-3/1.
Full textWunderer, Thomas. "A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack." Journal of Mathematical Cryptology 13, no. 1 (March 1, 2019): 1–26. http://dx.doi.org/10.1515/jmc-2016-0044.
Full textRatushnyi, Roman, and Anatoliy Tryhuba. "Features of Identification of Hybrid Projects of Public Security Systems and Their Process Management." Internal Security 13, no. 1 (September 27, 2021): 77–88. http://dx.doi.org/10.5604/01.3001.0015.2901.
Full textKhriapynskyi, Anton, Ihor Khmyrov, Ivo Svoboda, Mykhailo Shevchuk, and Vira Iastrebova. "State information security strategies in conditions of hybrid threats." Revista Amazonia Investiga 12, no. 69 (September 30, 2023): 84–93. http://dx.doi.org/10.34069/ai/2023.69.09.7.
Full textParakhonsky, Borys, and Galina Yavorska. "DESTABILIZING EUROPE: RUSSIA’S HYBRID WARFARE." Strategic Panorama, no. 1-2 (December 7, 2021): 5–29. http://dx.doi.org/10.53679/2616-9460.1-2.2021.01.
Full textS, Prabu, Gpinath Ganapathy, and Ranjan Goyal. "Enhanced Data Security for Public Cloud Environment with Secured Hybrid Encryption Authentication Mechanisms." Scalable Computing: Practice and Experience 19, no. 4 (December 29, 2018): 351–60. http://dx.doi.org/10.12694/scpe.v19i4.1422.
Full textSavla, Dhairya, and Prof Ruchi Rautela. "Design and Improvement of Caesar Cipher." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (July 31, 2023): 1190–94. http://dx.doi.org/10.22214/ijraset.2023.54819.
Full textSubbarayudu, Yerragudipadu, Gurram Vijendar Reddy, Merugu Shankar, Mailagani Ven, P. K. Abhilash, and Archana Sehgal. "Cipher Craft: Design and Analysis of Advanced Cryptographic Techniques for Secure Communication Systems." MATEC Web of Conferences 392 (2024): 01112. http://dx.doi.org/10.1051/matecconf/202439201112.
Full textDai, Honglong, Ding Wang, Jinyong Chang, and Maozhi Xu. "On the RCCA Security of Hybrid Signcryption for Internet of Things." Wireless Communications and Mobile Computing 2018 (November 12, 2018): 1–11. http://dx.doi.org/10.1155/2018/8646973.
Full textObinna, Franklin. "Hybrid Regional Order." Journal of International Peacekeeping 20, no. 3-4 (August 17, 2016): 363–94. http://dx.doi.org/10.1163/18754112-02003013.
Full textAbdallah, Hanaa A., Reem Alkanhel, and Abdelhamied A. Ateya. "Novel Hybrid Fusion-Based Technique for Securing Medical Images." Electronics 11, no. 20 (October 21, 2022): 3421. http://dx.doi.org/10.3390/electronics11203421.
Full textAfifi Al-Atsari, Hilmi, and Imam Suharjo. "Integrasi Server On-Premise dengan Server Cloud Menggunakan Cloud VPN dan Mikrotik Ipsec Untuk Peningkatan Keamanan Koneksi." Jurnal Syntax Admiration 4, no. 11 (November 14, 2023): 1977–96. http://dx.doi.org/10.46799/jsa.v4i11.757.
Full textDaniel, Jan, and Jakub Eberle. "Hybrid Warriors: Transforming Czech Security through the 'Russian Hybrid Warfare' Assemblage." Czech Sociological Review 54, no. 6 (December 1, 2018): 907–32. http://dx.doi.org/10.13060/00380288.2018.54.6.435.
Full textRodachin, V. M. "Hybrid War and the National Security of Russia." Humanities and Social Sciences. Bulletin of the Financial University 9, no. 4 (December 4, 2019): 93–99. http://dx.doi.org/10.26794/2226-7867-2019-9-4-93-99.
Full textBorsukovskyi, Yurii. "DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 1." Cybersecurity: Education, Science, Technique, no. 5 (2019): 61–72. http://dx.doi.org/10.28925/2663-4023.2019.5.6172.
Full textCrihan, Georgiana, Marian Craciun, and Luminita Dumitriu. "HYBRID METHODS OF AUTHENTICATION IN NETWORK SECURITY." Annals of “Dunarea de Jos“ University of Galati. Fascicle III, Electrotechnics, Electronics, Automatic Control, Informatics 45, no. 1 (February 21, 2023): 7. http://dx.doi.org/10.35219/eeaci.2022.1.02.
Full textJunca Paredes, John Jairo, Jesús Fernando Florez, Karen Johanna Enciso Valencia, Luís Miguel Hernández Mahecha, Natalia Triana Ángel, and Stefan Burkart. "Potential Forage Hybrid Markets for Enhancing Sustainability and Food Security in East Africa." Foods 12, no. 8 (April 10, 2023): 1607. http://dx.doi.org/10.3390/foods12081607.
Full text