Academic literature on the topic 'Quality securing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Quality securing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Quality securing":

1

Russ-Mohl, Stephan. "Securing journalistic quality." Studies in Communication Sciences 12, no. 1 (January 2012): 61. http://dx.doi.org/10.1016/j.scoms.2012.06.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cook, Michael B., and Rosseel Kevin. "Securing Improvements in Water Quality." Journal of Structured Finance 3, no. 3 (October 31, 1997): 29–36. http://dx.doi.org/10.3905/jsf.3.3.29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hattingh, J., and M. Claassen. "Securing Water Quality for Life." International Journal of Water Resources Development 24, no. 3 (June 17, 2008): 401–15. http://dx.doi.org/10.1080/07900620802127333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Palmer, R. Heather. "Securing Health Care Quality for Medicare." Health Affairs 14, no. 4 (January 1995): 89–100. http://dx.doi.org/10.1377/hlthaff.14.4.89.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Deleuran, L. C., and B. Boelt. "ORGANIC LEEK SEED PRODUCTION - SECURING SEED QUALITY." Acta Horticulturae, no. 898 (June 2011): 151–57. http://dx.doi.org/10.17660/actahortic.2011.898.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lagerberg, Ingrid, Tim Evans, and Manocher Asaadi. "Quality Protocols for Biosolids – Securing the Future." Proceedings of the Water Environment Federation 2008, no. 3 (January 1, 2008): 599–606. http://dx.doi.org/10.2175/193864708788806269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vlkovský, Martin, and Petr Veselík. "Cargo Securing – Comparison of Different Quality Roads." Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 67, no. 4 (2019): 1015–23. http://dx.doi.org/10.11118/actaun201967041015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The article deals with the subject of the impact which road surfaces have onto cargo and the securing of cargo against shocks during road transport. The applicability of the key EN 12191‑1:2010 standard is discussed, not only for common conditions, but also for specific transport conditions on low‑quality road surfaces. Part of the article involves carrying out a transport experiment on a road paved with granite blocks and on a highway, from which data on the impact of shocks on cargo (acceleration coefficients values) were obtained. The data were statistically evaluated and compared to the normatively determined values of these acceleration coefficients. A parametric statistical analysis (two‑sample t‑test) was used to compare the values of the acceleration coefficients from the two types of surfaces. The analysis conducted shows statistically significant differences between the data measured on the road paved with granite blocks and on the highway. Using correlation analysis, the dependence of the acceleration coefficient values and inertial forces affecting cargo during transport were verified. For the relevant axes (x – longitudinal and y – transverse), a very strong correlation was found.
8

George, Geogen, and Aditya Anil. "Securing Fog Gateways with Assured Quality of Service." Research Journal of Engineering and Technology 9, no. 4 (2018): 363. http://dx.doi.org/10.5958/2321-581x.2018.00049.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gollmann, Dieter. "Securing Web applications." Information Security Technical Report 13, no. 1 (2008): 1–9. http://dx.doi.org/10.1016/j.istr.2008.02.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Helmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (September 1, 2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This research aims to: (1) Assess and evaluate the pattern containedsystem in the Securing of National Vital Objectsby Vital Object Security Directorate of Polda Kalimantan Selatan; and (2) Assess and evaluate the obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan. It can be concluded that: 1. The system pattern contained in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan not stated clearly and explicitly in the legislation pam obvitnas, but in the Presidential Decree No. 63 of 2004 on the Securing of National Vital Security Object there is described that pattern Sispamobvitnas, they are: (1) The main executor of the system Securing of National Vital Objek is obvitnas management authority, in this case the Police through Dirpamobvit; (2) Police are obliged to provide security assistance obvitnas; (3) priority preemptive and preventive activities; (4) in an integrated and simultaneous shared obvitnas managers implement security systems obvitnas; and (5) and against obvitnas is an organic part of or including the military, the security environment remain to be implemented, although the security environment outside Obvitnas or process interruption handling defense and security. 2. The obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan, they are: (1) Lack of quality personnel guard PT. Pertamina (Persero) BBM Terminal Banjarmasin due to lack of professional recruitment system; (2) Insufficient number of security officers compared to the vulnerability of the region; (3) Infrastructure security Obvit Of Polda Kalimantan Selatan are limited;(4) The lack of security coordination between Ditpamobvit Polda Kalimantan Selatan with regional security managers of the company, and the company's internal security guard at the Police Post.

Dissertations / Theses on the topic "Quality securing":

1

Tantiwiwathanapan, Siriporn. "Securing Quality in Private Kindergartens in Bangkok Thailand: Perspectives of the Parents and the Kindergarten Directors." Thesis, University of Reading, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.487293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
From an international perspective, there has been a growing recognition of the value and benefits of early childhood education and care for the development of young children. Nevertheless, professionals in this important field continue to explore how programmes are best organised to deliver positive outcomes for children. This includes a focus on how quality may be defined and assessed as a means of promoting effective practice and consistency in 'standards. A valuable tool which has been developed and widely applied as a global standard for quality assessment is the Early Childhood Environmental Rating Scale (ECERS). Alongside such universal approaches, there has also been an acknowledgement of the context, values, complexity and subjectivity in any definition of quality which need to be considered in the environment being studied. Based on the study of three private kindergartens in Bangkok, Thailand, this research investigates how views and perspectives on quality from the western world apply in the Thai context. The private sector is a dominant and influential sector and it is important to look closely at provision since it will likely lead the way for future development of early childhood practice. Semi-structured interviews and indirect observation are used to understand how the programmes are organised and perspectives of the directors and Thai parents towards early childhood education and the developing views of early childhood professionals. This includes a first attempt to evaluate how appropriate the ECERS framework is to the assessment of quality in Thai private kindergartens. Thailand has a rich cultural and religious background which influences perceptions of the role of the child and how they are seen to best learn and develop. Across the Thai early childhood system, there has been increased focus on the use of childcentred approaches, based on views of effective practice adopted elsewhere in the world. The director and parent interviews, however, indicate that many Thai parents perceive the role of early childhood education as the preparation of children for primary school with traditional approaches emphasising the use of teacher-directed activities. This creates a tension between how programmes are designed to meet parental needs but also align with developing views of high quality practice. This research hopes to create awareness towards how quality assurance may be secured in the Thai kindergarten and the challenges moving forward. I believe a balanced approach is needed which combines understanding the Thai context, stakeholder perceptions and emerging views of best practice such as those presented in ECERS. This may be promoted by closer partnership ~etween parents and those involved in delivery of the programmes to develop shared knowledge and common goals.
2

Shafae, Mohammed Saeed Abuelmakarm. "Advancing the Utility of Manufacturing Data for Modeling, Monitoring, and Securing Machining Processes." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/96812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The growing adoption of smart manufacturing systems and its related technologies (e.g., embedded sensing, internet-of-things, cyber-physical systems, big data analytics, and cloud computing) is promising a paradigm shift in the manufacturing industry. Such systems enable extracting and exchanging actionable knowledge across the different entities of the manufacturing cyber-physical system and beyond. From a quality control perspective, this allows for more opportunities to realize proactive product design; real-time process monitoring, diagnosis, prognosis, and control; and better product quality characterization. However, a multitude of challenges are arising, with the growing adoption of smart manufacturing, including industrial data characterized by increasing volume, velocity, variety, and veracity, as well as the security of the manufacturing system in the presence of growing connectivity. Taking advantage of these emerging opportunities and tackling the upcoming challenges require creating novel quality control and data analytics methods, which not only push the boundaries of the current state-of-the-art research, but discover new ways to analyze the data and utilize it. One of the key pillars of smart manufacturing systems is real-time automated process monitoring, diagnosis, and control methods for process/product anomalies. For machining applications, traditionally, deterioration in quality measures may occur due to a variety of assignable causes of variation such as poor cutting tool replacement decisions and inappropriate choice cutting parameters. Additionally, due to increased connectivity in modern manufacturing systems, process/product anomalies intentionally induced through malicious cyber-attacks -- aiming at degrading the process performance and/or the part quality -- is becoming a growing concern in the manufacturing industry. Current methods for detecting and diagnosing traditional causes of anomalies are primarily lab-based and require experts to perform initial set-ups and continual fine-tuning, reducing the applicability in industrial shop-floor applications. As for efforts accounting for process/product anomalies due cyber-attacks, these efforts are in early stages. Therefore, more foundational research is needed to develop a clear understanding of this new type of cyber-attacks and their effects on machining processes, to ensure smart manufacturing security both on the cyber and the physical levels. With primary focus on machining processes, the overarching goal of this dissertation work is to explore new ways to expand the use and value of manufacturing data-driven methods for better applicability in industrial shop-floors and increased security of smart manufacturing systems. As a first step toward achieving this goal, the work in this dissertation focuses on adopting this goal in three distinct areas of interest: (1) Statistical Process Monitoring of Time-Between-Events Data (e.g., failure-time data); (2) Defending against Product-Oriented Cyber-Physical Attacks on Intelligent Machining Systems; and (3) Modeling Machining Process Data: Time Series vs. Spatial Point Cloud Data Structures.
PHD
3

Olivier, Tomás, and Tomás Olivier. "Institutional Design and Adaptation in Regional-Scale Common-Pool Resource Institutions: Securing Access to High-Quality Drinking Water in Boston, New York, Portland, and San Francisco." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This dissertation develops and assesses hypotheses regarding the design and adaptation of institutions for maintaining the quality of a shared natural resource at regional scales. The analysis is centered on arrangements created by governmental actors for deciding how to jointly govern a resource producing high-quality drinking water. The cases studied are Boston (Massachusetts), New York City (New York), Portland (Oregon), and San Francisco (California). Drinking water in each of these cities is provided unfiltered, and it is sourced from lands located in other jurisdictions. To maintain water quality, both providers and landowners in the watersheds have reached agreements defining how to jointly govern the resource. This dissertation studies the design of these arrangements. Studying these dynamics, particularly in a federal regime, highlights the limits that governmental actors face in making decisions with other governments at different levels. The dissertation contains three empirical papers addressing aspects of design in these arrangements. The empirical chapters are structured as separate papers that follow a common theme. Throughout the dissertation, insights from various research traditions are brought in to complement the analysis of institutional design. The studies in this dissertation combine arguments from the Institutional Analysis and Development Framework, Common-Pool Resource Theory, Transaction Cost Economics, social network analysis, Adaptive Governance, and theories of information processing stemming from the Punctuated Equilibrium literature in public policy.
4

Hwang, JeeHyun. "Improving the Quality of Security Policies." Thesis, North Carolina State University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3584006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:

Systems such as web applications, database systems, and cloud services regulate users’ access control to sensitive resources based on security policies. Organizations often manage security policies in an ad-hoc and inconsistent manner due to a lack of budget, resources, and staff. This management could cause crucial security problems such as unauthorized access to sensitive resources.

A security policy is a set of restrictions and properties that specify how a computing system prevents information and computing resources from being used in violation of an organization’s security laws, rules, and practices. In computer systems, security policies are enforced to ensure correct functioning of access control such as “who” (e.g., authorized users or processes) can perform actions under “what” conditions.

Policy authors may follow common patterns in specifying and maintaining security policies. Researchers applied data mining techniques for deriving (implicit) patterns such as a group of users (i.e., roles in RBAC policies) who have the same access permissions. Policy authors reuse common patterns to reduce mistakes. Anomalies of those patterns are candidates for inspection to determine whether these anomalies expose faults.

Faults (i.e., misconfigurations) in security policies could result in tragic consequences, such as disallowing an authorized user to access her/his resources and allowing malicious users to access critical resources. Therefore, to improve the quality of security policies in terms of policy correctness, policy authors must conduct rigorous testing and verification during testing and maintenance phases of software development process. However, manual test-input generation and verification is an error-prone, time-consuming, and tedious task.

In this dissertation, we propose approaches that help improve the quality of security policies automatically. Our research goal is to help policy authors through automated pattern mining and testing techniques in the efficient detection and removal of faults. This dissertation is comprised of three research projects where each project focuses on a specific software engineering task. The three research projects are as follows:

Pattern Mining. We present an approach to mine patterns from security policies used in open source software products. Our approach applies data mining techniques on policy evolution and specification data of those security policies to identify common patterns, which represent usage of security policies. Our approach uses mined patterns as policy specification rules and detect faults in security policies under analysis as deviations from the mined patterns.

Automated Test Generation. We present a systematic structural testing approach for security policies. Our approach is based on the concept of policy coverage, which helps test a policy’s structural entities (i.e., rules, predicates, and clauses) to check whether each entity is specified correctly. Our approach analyzes security policies under test and generates test cases automatically to achieve high structural coverage. These test cases can achieve high fault-detection capability (i.e., detecting faults).

Automated Test Selection for Regression Testing. We present a safe-test-selection approach for regression testing of security policies. Among given initial test cases in access control systems under test, our approach selects and executes only test cases that could expose different policy behaviors across multiple versions of security policies. Our approach helps detect unexpected policy behaviors (i.e., regression faults) caused by policy changes efficiently.

These three research project have resulted in the following contributions:

• Patterns characterizing correlations of attributes in security policies help detect faults.

• Structural coverage for security policies is closely related to fault-detection capability. An original set of test cases with higher structural coverage often achieves higher fault-detection capability. Furthermore, its reduced set of test cases while maintaining the same structural coverage achieves similar fault-detection capability with the original set.

• Substantial number of test cases for regression testing can be reduced to help improve performance.

5

Parada, Saul. "Impact of network security on spech quality." Master's thesis, Universidade de Aveiro, 2008. http://hdl.handle.net/10773/2185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Mestrado em Engenharia Electrónica e Telecomunicações
This dissertation is about the impact of secure network environments on speech quality of IP Telephony. Results of the analysis of voice over different unsecure and secure communication links, such as IPsec and TLS, are presented. The use of secure network environments can affect speech quality. There is also a performance comparison of different cipher algorithms and a description on how the used security mechanisms influence the final MOS and R-factor variables. The presented results are based on numerous experiments which have been performed on a real IP-based network.
6

Epstein, Clare Anne. "Transit security : quality of life issues and strategies." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/65986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kane, Kathleen Joanne. "Diet quality and Food Security of Cancer Patients." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1524141604292618.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ali, Wajahat, and Asad Muhammad. "Response Time Effects on Quality of Security Experience." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The recent decade has witnessed an enormous development in internet technology worldwide. Initially internet was designed for applications such as Electronic Mail and File Transfer. With technology evolving and becoming popular, people use internet for e-banking, e-shopping, social networking, e-gaming, voice and a lot of other applications. Most of the internet traffic is generated by activities of end users, when they request a specific webpage or web based application. The high demand for internet applications has driven service operators to provide reliable services to the end user and user satisfaction has now become a major challenge. Quality of Service is a measure of the performance of a particular service. Quality of Experience is a subjective measure of user’s perception of the overall performance of network. The high demand for internet usage in everyday life has got people concerned about security of information over web pages that require authentication. User perceived Quality of Security Experience depends on Quality of Experience and Response Time for web page authentication. Different factors such as jitter, packet loss, delay, network speed, supply chains and the type of security algorithm play a vital role in the response time for authentication. In this work we have tried to do qualitative and quantitative analysis of user perceived security and Quality of Experience with increasing and decreasing Response Times towards a web page authentication. We have tried to derive a relationship between Quality of Experience of security and Response Time.
Phone Numbers: (1) Wajahat Ali (+923349783252) (2) Asad Muhammad (+923455172792)
9

Ahl, Gullan. "Reliabilitets- och validitetstestning av ADL-instrument RAINBOW - ett teamdokument." Thesis, Högskolan i Örebro, 1998. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-54256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Ett nytt instrument utvecklades från Katz´ ADL-index, vilket visat sig vara ett allt för grovt instrument, för att kartlägga patientens aktivitetsförmåga och självständighetsutveckling. Bedömningsinstrumentet innehåller patientdata samt kategori-index och kom att kallas RAINBOW på grund av att instrumentet är i fyrfärgstryck. En kontroll av det nykonstruerade team-instrumentet utfördes i syfte att mäta dess tillförlitlighet. Mellanbedömar reliabilitet mellan oberoende bedömare har prövats. Validiteten har analyserats på 4 patienter ur materialet och jämförts med Katz´ ADl-index. Studien, som bestod av parvisa oberoende bedömningar, utfördes av sjuksköterskor, sjukgymnaster och arbetsterapeuter. 40 patienter deltog i studien. Delaktivitetsbedömningarna uppgick till 950 och innehöll 36 avvikelser. Resultaten visade på 96 % samstämmighet i bedömningarna. Den kvalitativa analysen visade, i jämförelse med Katz´ ADL-index, att RAINBOW kategori-index gav utförligare information om patientens självständighetsnivå samt hjälpbehov. I denna studie bedömdes endast strokepatienter, men då begreppen som ingår i instrumentet kan anses allmängiltiga, torde det även kunna användas på andra diagnosgrupper. En gemensam rehabiliteringsterminologi gav teamarbetet en ökad kvalitet gällande bedömning, planering samt utvärdering av den enskilde patientens aktivitetsförmåga.

Uppsatsarbete omfattande 10 poäng, C-nivå, inom ramen för arbetsterapeutprogrammet 120 p., Högskolan i Örebro, Institutionen för vårdvetenskap och omsorg. Författarens namn i uppsatsen är Gull-Britt Johansson.

10

Tomur, Emrah. "Security And Quality Of Service For Wireless Sensor Networks." Phd thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/12609359/index.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Security and quality of service (QoS) issues in cluster-based wireless sensor networks are investigated. The QoS perspective is mostly at application level consisting of four attributes, which are spatial resolution, coverage, system lifetime and packet loss due to collisions. The addressed security aspects are message integrity and authentication. Under this scope, the interactions between security and service quality are analyzed with particular emphasis on the tradeoff between security and spatial resolution for channel capacity. The optimal security and spatial resolution levels which yield the best tradeoff are determined. In addition, a control strategy is proposed to achieve the desired quality of service and security levels during the entire operation of a cluster-based sensor network. Compared to the existing studies, the proposed method is simpler and has superior performance.

Books on the topic "Quality securing":

1

Great Britain. Department of Health. Working together: Securing a quality workforce for the NHS. London: Department of Health, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hampshire Inspection and Advisory Service. Securing high quality history work at key stage 1: Inset materials produced by the Hampshire history team : Key Stage 1. Winchester: Hampshire County Council, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Porter, Brenda. Securing quality audit(or)s: Attempts at finding a solution in the United States, United Kingdom, Canada and New Zealand. Cranfield: Cranfield University School of Management, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Russ-Mohl, Stephan. Regulating self-regulation: The neglected case of journalism policies ; Securing quality in journalism and building media infrastructures on a European scale. Badia Fiesolana, Firenze: European University Institute, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Government Accountability Office. Securing wastewater facilities: Utilities have made important upgrades but further improvements to key system components may be limited by costs and other constraints : report to the Chairman, Committee on Environment and Public Works, U.S. Senate. Washington, D.C: GAO, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Flaningam, Carl. Securing the future for Americans over sixty-five: An overview of the issues surrounding the quality of life for aging U.S. citizens. Lincolnwood, Ill. USA: National Texbook Co., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Committee, Wisconsin Governor's Health Care Worker Shortage. Health care Wisconsin: A collaborative agenda for solving Wisconsin's health care worker shortage and securing delivery of high quality health care for Wisconsin's citizens : a report. [Madison, Wis.?]: Governor's Health Care Worker Shortage Committee, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lal, R., and B. A. Stewart. Food security and soil quality. Edited by Lal R and Stewart B. A. 1932-. Boca Raton: Taylor & Francis, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tang, Seok-Yee, Peter Müller, and Hamid R. Sharif, eds. WiMAX Security and Quality of Service. Chichester, UK: John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470665749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dustin, Elfriede. Quality Web systems: Performance, security, and usability. Boston: Addison-Wesley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Quality securing":

1

Price, Trevor, and Werner Schmitz-Thrun. "Securing e-Business." In Software Quality and Software Testing in Internet Times, 187–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-642-56333-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bondar, Sergej, Christoph Ruppert, and Josip Stjepandic. "Securing Data Quality along the Supply Chain." In Product Lifecycle Management for Society, 702–11. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41501-2_69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ramya, P., and T. SairamVamsi. "Securing MANETs Using SHA3 Keccak Algorithm." In ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management, 328–35. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-8461-5_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brill, Eyal. "Implementing Machine Learning Algorithms for Water Quality Event Detection: Theory and Practice." In Securing Water and Wastewater Systems, 107–22. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-01092-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ølnes, Jon, Leif Buene, Anette Andresen, Håvard Grindheim, Jörg Apitzsch, and Adriano Rossi. "A General Quality Classification System for eIDs and e-Signatures." In ISSE 2009 Securing Electronic Business Processes, 72–86. Wiesbaden: Vieweg+Teubner, 2010. http://dx.doi.org/10.1007/978-3-8348-9363-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Balboni, Paolo. "Managing the Legal Risk in Providing Online Quality Certification Services in EU." In ISSE 2005 — Securing Electronic Business Processes, 189–200. Wiesbaden: Vieweg+Teubner Verlag, 2005. http://dx.doi.org/10.1007/978-3-322-85237-3_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kieseberg, Peter, and Edgar Weippl. "Securing Information Against Manipulation in the Production Systems Engineering Process." In Security and Quality in Cyber-Physical Systems Engineering, 335–56. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25312-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Holdgate, D. P., and E. A. Zandvoort. "Securing Cost Effective Product Quality, an Essential for Sustainable Business." In Plant Biotechnology and In Vitro Biology in the 21st Century, 709–12. Dordrecht: Springer Netherlands, 1999. http://dx.doi.org/10.1007/978-94-011-4661-6_159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Woodfield, N. K., J. W. S. Longhurst, C. I. Beattie, and D. P. H. Laxen. "Designating Air Quality Management Areas (AQMAs) in the UK: Implications for Securing UK Air Quality Objectives." In Urban Air Quality — Recent Advances, 677–88. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-010-0312-4_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vlkovský, Martin, and Hana Vlachová. "Comparison of Cargo Securing Methods During Transport on Different Quality Roads." In Communications in Computer and Information Science, 200–219. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68028-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Quality securing":

1

Kim, Donghoon, and Mladen A. Vouk. "Securing Scientific Workflows." In 2015 International Conference on Software Quality, Reliability and Security - Companion (QRS-C). IEEE, 2015. http://dx.doi.org/10.1109/qrs-c.2015.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yin, Heng, Bo Sheng, Haining Wang, and Jianping Pan. "Securing BGP through Keychain-based Signatures." In 2007 Fifteenth IEEE International Workshop on Quality of Service. IEEE, 2007. http://dx.doi.org/10.1109/iwqos.2007.376562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guse, Frank, Axel Kasper, and Bob Zinter. "Securing quality of camera-based biomedical optics." In SPIE BiOS: Biomedical Optics, edited by Ramesh Raghavachari and Rongguang Liang. SPIE, 2009. http://dx.doi.org/10.1117/12.812401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Grau, M., J. Stjepandic, and C. Rupert. "Securing Data Quality Along the Supply Chain." In International Conference on Computer Applications in Shipbuilding 2013. RINA, 2013. http://dx.doi.org/10.3940/rina.iccas.2013.68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Karmakar, Rajit, and Santanu Chattopadhyay. "On Securing Scan Obfuscation Strategies Against ScanSAT Attack." In 2020 21st International Symposium on Quality Electronic Design (ISQED). IEEE, 2020. http://dx.doi.org/10.1109/isqed48828.2020.9137003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Zhiming, Laurent Njilla, Charles Kamhoua, Kevin Kwiat, and Qiaoyan Yu. "Securing FPGA-based obsolete component replacement for legacy systems." In 2018 19th International Symposium on Quality Electronic Design (ISQED). IEEE, 2018. http://dx.doi.org/10.1109/isqed.2018.8357320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vlkovský, Martin, and Hana Vlachová. "Securing Cargo during Transport on Roads of Different Quality." In 5th International Conference on Vehicle Technology and Intelligent Transport Systems. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0007617900250032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shining Wu, Yang Chen, Xiaoming Fu, and Jun Li. "NCShield: Securing decentralized, matrix factorization-based network coordinate systems." In 2012 IEEE 20th International Workshop on Quality of Service (IWQoS). IEEE, 2012. http://dx.doi.org/10.1109/iwqos.2012.6245983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nath, Arijit, Manik B. Bhosle, and Hemangee K. Kapoor. "SeNonDiv: Securing Non-Volatile Memory using Hybrid Memory and Critical Data Diversion." In 2021 22nd International Symposium on Quality Electronic Design (ISQED). IEEE, 2021. http://dx.doi.org/10.1109/isqed51717.2021.9424292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Carelli, Alberto, Carlo Alberto Cristofanini, Alessandro Vallero, Cataldo Basile, Paolo Prinetto, and Stefano Di Carlo. "Securing bitstream integrity, confidentiality and authenticity in reconfigurable mobile heterogeneous systems." In 2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR). IEEE, 2018. http://dx.doi.org/10.1109/aqtr.2018.8402795.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Quality securing":

1

Levin, Timothy E., Cynthia E. Irvine, and Evdoxia Spyropoulou. Quality of Security Service: Adaptive Security. Fort Belvoir, VA: Defense Technical Information Center, December 2004. http://dx.doi.org/10.21236/ada435861.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mead, Nancy R., Eric D. Hough, II Stehney, and Theodore R. Security Quality Requirements Engineering (SQUARE) Methodology. Fort Belvoir, VA: Defense Technical Information Center, November 2005. http://dx.doi.org/10.21236/ada443493.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Irvine, Cynthia, and Tim Levin. Quality of Security Service: An Introduction. Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada572032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Spyropoulou, Evdoxia, Chris Agar, Timothy Levin, and Cynthia Irvine. IPsec Modulation for Quality of Security Service. Fort Belvoir, VA: Defense Technical Information Center, March 2003. http://dx.doi.org/10.21236/ada423568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Spyropoulou, Evdoxia, Timothy Levin, and Cynthia Irvine. Calculating Costs for Quality of Security Service. Fort Belvoir, VA: Defense Technical Information Center, December 2000. http://dx.doi.org/10.21236/ada423571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Irvine, Cynthis E., and Timothy E. Levin. An Introduction to Quality of Security Services. Fort Belvoir, VA: Defense Technical Information Center, June 1999. http://dx.doi.org/10.21236/ada379660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

DEFENSE LOGISTICS AGENCY FORT BELVOIR VA. Office of Command Security Total Quality Management Plan. Fort Belvoir, VA: Defense Technical Information Center, July 1989. http://dx.doi.org/10.21236/ada212906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Spyropoulou, Evdoxin, Timothy E. Levin, and Cynthia E. Irvine. Demonstration of Quality of Security Service Awareness for IPsec. Fort Belvoir, VA: Defense Technical Information Center, September 2002. http://dx.doi.org/10.21236/ada407599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Spyropoulou, Evdoxia, Timothy Levin, and Cynthia E. Irvine. Quality of Security Service Costing Demonstration for the MSHN Project. Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada377414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mercado, Leo A. The National Security Strategy and National Interests: Quantity or Quality? Fort Belvoir, VA: Defense Technical Information Center, April 2001. http://dx.doi.org/10.21236/ada393498.

Full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography