Academic literature on the topic 'Research security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Research security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Research security"

1

Zh. Stoyanov, Stiliyan. "Space research and national security." Journal scientific and applied research 1, no. 1 (2012): 154–57. http://dx.doi.org/10.46687/jsar.v1i1.33.

Full text
Abstract:
In the current stage of human evolution, it is necessary and important to receive information about risks and threats which concern the national security in times of peace, as well as in times of different crises and conflicts. The paper makes a link between the space research and national security. Special attention is paid to the optical methods and means for discovery and research of processes, phenomena and objects in the atmos-phere, as well as on the earth surface.
APA, Harvard, Vancouver, ISO, and other styles
2

Szpyra, Ryszard. "Military Security within the Framework of Security Studies: Research Results." Connections: The Quarterly Journal 13, no. 3 (2014): 59–82. http://dx.doi.org/10.11610/connections.13.3.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gannon, John C., Richard A. Meserve, and Maria T. Zuber. "Reconsidering Research Security." Issues in Science and Technology 41, no. 2 (2025): 90–93. https://doi.org/10.58875/onga4344.

Full text
Abstract:
Research security isn’t only about defending against external threats; it also requires ensuring that the United States remains a leader in global innovation by supporting the people and infrastructure that fuel it.
APA, Harvard, Vancouver, ISO, and other styles
4

Cohen, Eliot A. "Taiwan Security Research." Foreign Affairs 79, no. 4 (2000): 154. http://dx.doi.org/10.2307/20049846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mitka, Mike. "Research Laboratory Security." JAMA 302, no. 10 (2009): 1050. http://dx.doi.org/10.1001/jama.2009.1271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

CR, Rachana. "Data Security in Cloud Computing: A Research Perspective." International Journal of Research and Review 9, no. 11 (2022): 325–30. http://dx.doi.org/10.52403/ijrr.20221144.

Full text
Abstract:
Security plays a very important role in the life of every living being. Today, in the ‘Technology’ engulfed businesses, data security is crucial for users and vendors alike. Cloud computing as a technology is the driving force behind all the financial transactions being completed every second across the globe. In the current context, Cloud data security is crucial and is of utmost importance. Data Security in the cloud refers to the technologies, policies, services, security controls that protect data in the cloud from loss, leakage or misuse through security breaches and unauthorized access.
APA, Harvard, Vancouver, ISO, and other styles
7

Tang, Jian Gang, Shi Jun Zhang, and Ji Jiang. "Research on Network Security Issues and Security Model." Applied Mechanics and Materials 519-520 (February 2014): 128–31. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.128.

Full text
Abstract:
Network security issues came from traditional network, wireless network and cloud computing environment. Large-scale cloud computing, versatility and virtualization features of network security had become a hidden threat source. This paper analyzed the sources of network security threats, and established a network security model which encompasses all types of currently known network security factors; it could provide countermeasures to ensure network security. The security model had capabilities of real-time detection, rapid response, immediate recovery, and interaction between various indepen
APA, Harvard, Vancouver, ISO, and other styles
8

Changchit, Chuleeporn. "Security Systems Framework, Security-Related Research, Web Threats." Journal of Information Privacy and Security 7, no. 4 (2011): 1–2. http://dx.doi.org/10.1080/15536548.2011.10855920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Yan Kun. "Computer Network Security Threats and Security Technology Research." Advanced Materials Research 971-973 (June 2014): 1440–43. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1440.

Full text
Abstract:
Networksecurity network system is presented, including hardware, software, and itstransmission in the network information security, network security threatsmainly include: software vulnerabilities, improper configuration, safetyconsciousness is not strong, virus, hacker attacks, etc. Is not only afirewall, network security is not anti-virus, intrusion monitoring, firewall,identity authentication, encryption, and other products of simple stack, butfrom the system to the application, from the device to the service ofrelatively complete, the system of the combination of security products.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Zhi Gang, Chang Zhen Hu, Ming Lei Hao, and Fang Lu. "Cyber Security Datasets Research." Advanced Materials Research 659 (January 2013): 191–95. http://dx.doi.org/10.4028/www.scientific.net/amr.659.191.

Full text
Abstract:
Data is the basis for cyber security research. Correct understanding and rapid access to rich and reliable data is a good beginning of our research work. In this paper we present a novel classification method of cyber security data. In addition, we collect and list some datasets, which can better help you to carry out research.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Research security"

1

Forman, Peter James. "Securing natural gas : entity-attentive security research." Thesis, Durham University, 2017. http://etheses.dur.ac.uk/12139/.

Full text
Abstract:
Natural gas is a troublesome and ‘wayward’ material (Bridge, 2004; 396). Amongst other qualities, it is invisible, intangible, naturally odorless, highly inflammable, and constantly resistant to the forces that contain it. This thesis provides an account of how these qualities both introduce a series of insecurities to everyday social environments, and also make it a challenging material to govern. Specifically, I examine the way that security is performed around gas circulations in the UK’s transmission and distribution pipelines, and I describe how a range of specialized security practices h
APA, Harvard, Vancouver, ISO, and other styles
2

Bruner, William W. "National Security Implications of Inexpensive Space Access." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/brunerww.htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Martonosi, Susan Elizabeth. "An Operations Research approach to aviation security." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33671.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center, 2005.<br>Includes bibliographical references (p. 151-163).<br>Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore first whether securing aviation deserves priority over other potential targets. We compare the historical risk of aviation terrorism to that posed by other forms of terrorism and conclude that the focus on a
APA, Harvard, Vancouver, ISO, and other styles
4

Wenhua, Qi, Zhang Qishan, and Liu Hailong. "RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606688.

Full text
Abstract:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>Security hardware based on asymmetric algorithm is the key component of Public Key Infrastructure (PKI), which decides the safety and performance of system. Security device in server or client have some common functions. We designed the client token and cryptographic server to improve the performance of PKI, and got obvious effect.
APA, Harvard, Vancouver, ISO, and other styles
5

Daehnick, Christian C. "Blueprints For The Future Comparing National Security Space Architectures /." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/daehnicc.htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Seidel, Scott B. "Planning combat outposts to maximize population security." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/61195.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center, 2010.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 123-124).<br>Combat outposts (COPs) are small, well-protected bases from which soldiers reside and conduct operations from. Used extensively during the "Surge" in Iraq, COPs are usually established in populated areas and are prevalent in the counterinsurgency operations in Afghanistan in 2010. This research models population security to determine combat outpost locations in a battalion area of ope
APA, Harvard, Vancouver, ISO, and other styles
7

Young, Jason Osgood Ewen. "Novel Materials for Use in Homeland Security Research." TopSCHOLAR®, 2013. http://digitalcommons.wku.edu/theses/1241.

Full text
Abstract:
Organometallic pyridazines and compounds derived from them have been of interest in polymer research due to their atypical environmental stability (as compared to other non-aromatic organic semiconductors) as well as their conductivity. The off-metal synthesis and characterization of several pyridazyl thallium, manganese, and rhenium complexes, beginning with fulvenes 1,2- C5H3(COHR)(COR), are reported here. The diacyl fulvenes were treated with hydrazine hydrate to ring close to pyridazines. Next, the pyridazines were converted to their respective thallium salts through treatment with thalliu
APA, Harvard, Vancouver, ISO, and other styles
8

Ashenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.

Full text
Abstract:
Large-scale data losses experienced across both public and private sector organisations have led to expectations that organisations will develop a culture that supports information security aims and objectives. Despite the fact that many organisations now run awareness, education and training programmes for their employees, however, information security incidents due to employee misuse of information still keep occurring. This suggests that these programmes are not working. The research presented in this thesis examines ways to better understand employees’ attitudes towards information securit
APA, Harvard, Vancouver, ISO, and other styles
9

Wai, Hor Cheong. "Research in computer forensics." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FHor.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Miko, Katharina, and Elisabeth Mayr. "Trading Places: Power Distributions in participatory research projects as exemplified by security research." WU Vienna University of Economics and Business, 2015. http://epub.wu.ac.at/4727/1/MikoMayr2015.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Research security"

1

Chen, Liqun, and Chris Mitchell, eds. Security Standardisation Research. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14054-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Lidong, David McGrew, and Chris Mitchell, eds. Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cremers, Cas, and Anja Lehmann, eds. Security Standardisation Research. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04762-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

van der Merwe, Thyla, Chris Mitchell, and Maryam Mehrnezhad, eds. Security Standardisation Research. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64357-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Liqun, and Shin'ichiro Matsuo, eds. Security Standardisation Research. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27152-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Günther, Felix, and Julia Hesse, eds. Security Standardisation Research. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30731-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lu, Xianhui, and Chris J. Mitchell, eds. Security Standardisation Research. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-87541-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Great Britain. Department of Social Security., ed. Social security research yearbook. HMSO, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Great Britain. Department of Social Security., ed. Social security research yearbook. HMSO, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Great Britain. Department of Social Security., ed. Social security research yearbook. HMSO., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Research security"

1

Hirsch Ballin, Ernst, Huub Dijstelbloem, and Peter de Goede. "Human Security and Flow Security in Dutch Security Policy." In Research for Policy. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37606-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Krishnan, Padmanabhan. "Security Research: Program Analysis Meets Security." In Formal Methods for an Informal World. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-43678-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barrett, Christopher B., Jeffrey Cason, and Erin C. Lentz. "Safety and security matters." In Overseas Research. Routledge, 2020. http://dx.doi.org/10.4324/9780367257095-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lunt, Teresa F. "Strategic Directions in Computer Security Research." In Database Security. Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khan, Suhel Ahmad, Rajeev Kumar, and Raees Ahmad Khan. "Research Trends in Software Security Estimation." In Software Security. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003330516-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cameron, Catherine Ann, Ayshe Talay-Ongan, Roger Hancock, and Sombat Tapanya. "Emotional Security." In International Perspectives on Early Childhood Research. Palgrave Macmillan UK, 2010. http://dx.doi.org/10.1057/9780230251373_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schilling, Andreas. "Robust Optimization of IT Security Safeguards Using Standard Security Data." In Operations Research Proceedings. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-42902-1_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sakurada, Hideki, Kazuki Yoneyama, Yoshikazu Hanatani, and Maki Yoshida. "Analyzing and Fixing the QACCE Security of QUIC." In Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hanatani, Yoshikazu, Naoki Ogura, Yoshihiro Ohba, Lidong Chen, and Subir Das. "Secure Multicast Group Management and Key Distribution in IEEE 802.21." In Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McGrew, David, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag, Denis Butin, and Johannes Buchmann. "State Management for Hash-Based Signatures." In Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Research security"

1

Mikhnev, Ilia Pavlovich, and Svetlana Vladimirovna Mikhneva. "Ensuring the security of critical information infrastructure: the powers of the federal government bodies of the Russian Federation." In International Research-to-practice conference. Publishing house Sreda, 2019. http://dx.doi.org/10.31483/r-32617.

Full text
Abstract:
The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rig
APA, Harvard, Vancouver, ISO, and other styles
2

Bunin, Barry J., Alexander Sutin, and Michael S. Bruno. "Maritime security laboratory for maritime security research." In Defense and Security Symposium, edited by Theodore T. Saito, Daniel Lehrfeld, and Michael J. DeWeert. SPIE, 2007. http://dx.doi.org/10.1117/12.718040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nie, Xiao, and Xiaobing Zhai. "M2M security threat and security mechanism research." In 2013 3rd International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2013. http://dx.doi.org/10.1109/iccsnt.2013.6967252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Perrig, Adrian. "Exciting Security Research Opportunity." In CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014. http://dx.doi.org/10.1145/2660267.2661034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Hanrong, and JunMei He. "E-commerce Security Research." In 2nd International Conference on Computer Application and System Modeling. Atlantis Press, 2012. http://dx.doi.org/10.2991/iccasm.2012.115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dai, Kuobin. "Network Security Mechanisms Research." In 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing (IPTC). IEEE, 2011. http://dx.doi.org/10.1109/iptc.2011.65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Semenov, Serhii, Viacheslav Davydov, Nina Kuchuk, and Inna Petrovskaya. "Software security threat research." In 2021 XXXI International Scientific Symposium Metrology and Metrology Assurance (MMA). IEEE, 2021. http://dx.doi.org/10.1109/mma52675.2021.9610877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Herrmann, Jonathan G. "Research to protect water infrastructure: EPA's water security research program." In Defense and Security, edited by Theodore T. Saito. SPIE, 2005. http://dx.doi.org/10.1117/12.606957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gallagher, Kyle A., Gregory J. Mazzaro, Anthony F. Martone, Kelly D. Sherbondy, and Ram M. Narayanan. "Recent non-linear radar research at the Army Research Laboratory." In SPIE Defense + Security, edited by Kenneth I. Ranney and Armin Doerry. SPIE, 2017. http://dx.doi.org/10.1117/12.2266266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pollehn, Herbert, K. K. Choi, Stefan Svensson, and Nibir Dhar. "IR material research at the Army Research Laboratory." In Defense and Security Symposium, edited by Bjørn F. Andresen, Gabor F. Fulop, and Paul R. Norton. SPIE, 2007. http://dx.doi.org/10.1117/12.723659.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Research security"

1

Ali, Alee. National Security Research Center. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1779649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ali, Alee. National Security Research Center. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1781340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jansen, Wayne. Directions in security metrics research. National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7564.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mislove, Michael. Collaborative Research on Systems and Security. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada608315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hird, Geoffrey R., Daryl McCullough, Stephen Brackin, and Doug Long. Research Advances in Handling Adaptive Security. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada297004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Burns, Rae K. Research Directions in Database Security IV. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada268885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jenkins, Chris. Systems Security Architecture Research and Development. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1488465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ek, David R. Risk Based Security Management at Research Reactors. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1222990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wiskoff, Martin F. Personnel Security and Reliability: Psychological Research Issues. Defense Technical Information Center, 1987. http://dx.doi.org/10.21236/ada207148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Steeves, Brye, Mercedes Martinez, Paul Ziomek, and Alee Ali. National Security Research Center 2021 Strategic Plan. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1669084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!