Academic literature on the topic 'Research security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Research security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Research security"
Zh. Stoyanov, Stiliyan. "Space research and national security." Journal scientific and applied research 1, no. 1 (2012): 154–57. http://dx.doi.org/10.46687/jsar.v1i1.33.
Full textSzpyra, Ryszard. "Military Security within the Framework of Security Studies: Research Results." Connections: The Quarterly Journal 13, no. 3 (2014): 59–82. http://dx.doi.org/10.11610/connections.13.3.04.
Full textGannon, John C., Richard A. Meserve, and Maria T. Zuber. "Reconsidering Research Security." Issues in Science and Technology 41, no. 2 (2025): 90–93. https://doi.org/10.58875/onga4344.
Full textCohen, Eliot A. "Taiwan Security Research." Foreign Affairs 79, no. 4 (2000): 154. http://dx.doi.org/10.2307/20049846.
Full textMitka, Mike. "Research Laboratory Security." JAMA 302, no. 10 (2009): 1050. http://dx.doi.org/10.1001/jama.2009.1271.
Full textCR, Rachana. "Data Security in Cloud Computing: A Research Perspective." International Journal of Research and Review 9, no. 11 (2022): 325–30. http://dx.doi.org/10.52403/ijrr.20221144.
Full textTang, Jian Gang, Shi Jun Zhang, and Ji Jiang. "Research on Network Security Issues and Security Model." Applied Mechanics and Materials 519-520 (February 2014): 128–31. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.128.
Full textChangchit, Chuleeporn. "Security Systems Framework, Security-Related Research, Web Threats." Journal of Information Privacy and Security 7, no. 4 (2011): 1–2. http://dx.doi.org/10.1080/15536548.2011.10855920.
Full textZhang, Yan Kun. "Computer Network Security Threats and Security Technology Research." Advanced Materials Research 971-973 (June 2014): 1440–43. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1440.
Full textWang, Zhi Gang, Chang Zhen Hu, Ming Lei Hao, and Fang Lu. "Cyber Security Datasets Research." Advanced Materials Research 659 (January 2013): 191–95. http://dx.doi.org/10.4028/www.scientific.net/amr.659.191.
Full textDissertations / Theses on the topic "Research security"
Forman, Peter James. "Securing natural gas : entity-attentive security research." Thesis, Durham University, 2017. http://etheses.dur.ac.uk/12139/.
Full textBruner, William W. "National Security Implications of Inexpensive Space Access." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/brunerww.htm.
Full textMartonosi, Susan Elizabeth. "An Operations Research approach to aviation security." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33671.
Full textWenhua, Qi, Zhang Qishan, and Liu Hailong. "RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606688.
Full textDaehnick, Christian C. "Blueprints For The Future Comparing National Security Space Architectures /." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/daehnicc.htm.
Full textSeidel, Scott B. "Planning combat outposts to maximize population security." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/61195.
Full textYoung, Jason Osgood Ewen. "Novel Materials for Use in Homeland Security Research." TopSCHOLAR®, 2013. http://digitalcommons.wku.edu/theses/1241.
Full textAshenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.
Full textWai, Hor Cheong. "Research in computer forensics." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FHor.pdf.
Full textMiko, Katharina, and Elisabeth Mayr. "Trading Places: Power Distributions in participatory research projects as exemplified by security research." WU Vienna University of Economics and Business, 2015. http://epub.wu.ac.at/4727/1/MikoMayr2015.pdf.
Full textBooks on the topic "Research security"
Chen, Liqun, and Chris Mitchell, eds. Security Standardisation Research. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14054-4.
Full textChen, Lidong, David McGrew, and Chris Mitchell, eds. Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4.
Full textCremers, Cas, and Anja Lehmann, eds. Security Standardisation Research. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04762-7.
Full textvan der Merwe, Thyla, Chris Mitchell, and Maryam Mehrnezhad, eds. Security Standardisation Research. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64357-7.
Full textChen, Liqun, and Shin'ichiro Matsuo, eds. Security Standardisation Research. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27152-1.
Full textGünther, Felix, and Julia Hesse, eds. Security Standardisation Research. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30731-7.
Full textLu, Xianhui, and Chris J. Mitchell, eds. Security Standardisation Research. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-87541-0.
Full textGreat Britain. Department of Social Security., ed. Social security research yearbook. HMSO, 1993.
Find full textGreat Britain. Department of Social Security., ed. Social security research yearbook. HMSO, 1994.
Find full textGreat Britain. Department of Social Security., ed. Social security research yearbook. HMSO., 1991.
Find full textBook chapters on the topic "Research security"
Hirsch Ballin, Ernst, Huub Dijstelbloem, and Peter de Goede. "Human Security and Flow Security in Dutch Security Policy." In Research for Policy. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37606-2_3.
Full textKrishnan, Padmanabhan. "Security Research: Program Analysis Meets Security." In Formal Methods for an Informal World. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-43678-9_6.
Full textBarrett, Christopher B., Jeffrey Cason, and Erin C. Lentz. "Safety and security matters." In Overseas Research. Routledge, 2020. http://dx.doi.org/10.4324/9780367257095-6.
Full textLunt, Teresa F. "Strategic Directions in Computer Security Research." In Database Security. Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_1.
Full textKhan, Suhel Ahmad, Rajeev Kumar, and Raees Ahmad Khan. "Research Trends in Software Security Estimation." In Software Security. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003330516-13.
Full textCameron, Catherine Ann, Ayshe Talay-Ongan, Roger Hancock, and Sombat Tapanya. "Emotional Security." In International Perspectives on Early Childhood Research. Palgrave Macmillan UK, 2010. http://dx.doi.org/10.1057/9780230251373_4.
Full textSchilling, Andreas. "Robust Optimization of IT Security Safeguards Using Standard Security Data." In Operations Research Proceedings. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-42902-1_45.
Full textSakurada, Hideki, Kazuki Yoneyama, Yoshikazu Hanatani, and Maki Yoshida. "Analyzing and Fixing the QACCE Security of QUIC." In Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4_1.
Full textHanatani, Yoshikazu, Naoki Ogura, Yoshihiro Ohba, Lidong Chen, and Subir Das. "Secure Multicast Group Management and Key Distribution in IEEE 802.21." In Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4_10.
Full textMcGrew, David, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag, Denis Butin, and Johannes Buchmann. "State Management for Hash-Based Signatures." In Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4_11.
Full textConference papers on the topic "Research security"
Mikhnev, Ilia Pavlovich, and Svetlana Vladimirovna Mikhneva. "Ensuring the security of critical information infrastructure: the powers of the federal government bodies of the Russian Federation." In International Research-to-practice conference. Publishing house Sreda, 2019. http://dx.doi.org/10.31483/r-32617.
Full textBunin, Barry J., Alexander Sutin, and Michael S. Bruno. "Maritime security laboratory for maritime security research." In Defense and Security Symposium, edited by Theodore T. Saito, Daniel Lehrfeld, and Michael J. DeWeert. SPIE, 2007. http://dx.doi.org/10.1117/12.718040.
Full textNie, Xiao, and Xiaobing Zhai. "M2M security threat and security mechanism research." In 2013 3rd International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2013. http://dx.doi.org/10.1109/iccsnt.2013.6967252.
Full textPerrig, Adrian. "Exciting Security Research Opportunity." In CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014. http://dx.doi.org/10.1145/2660267.2661034.
Full textChen, Hanrong, and JunMei He. "E-commerce Security Research." In 2nd International Conference on Computer Application and System Modeling. Atlantis Press, 2012. http://dx.doi.org/10.2991/iccasm.2012.115.
Full textDai, Kuobin. "Network Security Mechanisms Research." In 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing (IPTC). IEEE, 2011. http://dx.doi.org/10.1109/iptc.2011.65.
Full textSemenov, Serhii, Viacheslav Davydov, Nina Kuchuk, and Inna Petrovskaya. "Software security threat research." In 2021 XXXI International Scientific Symposium Metrology and Metrology Assurance (MMA). IEEE, 2021. http://dx.doi.org/10.1109/mma52675.2021.9610877.
Full textHerrmann, Jonathan G. "Research to protect water infrastructure: EPA's water security research program." In Defense and Security, edited by Theodore T. Saito. SPIE, 2005. http://dx.doi.org/10.1117/12.606957.
Full textGallagher, Kyle A., Gregory J. Mazzaro, Anthony F. Martone, Kelly D. Sherbondy, and Ram M. Narayanan. "Recent non-linear radar research at the Army Research Laboratory." In SPIE Defense + Security, edited by Kenneth I. Ranney and Armin Doerry. SPIE, 2017. http://dx.doi.org/10.1117/12.2266266.
Full textPollehn, Herbert, K. K. Choi, Stefan Svensson, and Nibir Dhar. "IR material research at the Army Research Laboratory." In Defense and Security Symposium, edited by Bjørn F. Andresen, Gabor F. Fulop, and Paul R. Norton. SPIE, 2007. http://dx.doi.org/10.1117/12.723659.
Full textReports on the topic "Research security"
Ali, Alee. National Security Research Center. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1779649.
Full textAli, Alee. National Security Research Center. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1781340.
Full textJansen, Wayne. Directions in security metrics research. National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7564.
Full textMislove, Michael. Collaborative Research on Systems and Security. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada608315.
Full textHird, Geoffrey R., Daryl McCullough, Stephen Brackin, and Doug Long. Research Advances in Handling Adaptive Security. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada297004.
Full textBurns, Rae K. Research Directions in Database Security IV. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada268885.
Full textJenkins, Chris. Systems Security Architecture Research and Development. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1488465.
Full textEk, David R. Risk Based Security Management at Research Reactors. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1222990.
Full textWiskoff, Martin F. Personnel Security and Reliability: Psychological Research Issues. Defense Technical Information Center, 1987. http://dx.doi.org/10.21236/ada207148.
Full textSteeves, Brye, Mercedes Martinez, Paul Ziomek, and Alee Ali. National Security Research Center 2021 Strategic Plan. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1669084.
Full text