To see the other types of publications on this topic, follow the link: Research security.

Journal articles on the topic 'Research security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Research security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zh. Stoyanov, Stiliyan. "Space research and national security." Journal scientific and applied research 1, no. 1 (2012): 154–57. http://dx.doi.org/10.46687/jsar.v1i1.33.

Full text
Abstract:
In the current stage of human evolution, it is necessary and important to receive information about risks and threats which concern the national security in times of peace, as well as in times of different crises and conflicts. The paper makes a link between the space research and national security. Special attention is paid to the optical methods and means for discovery and research of processes, phenomena and objects in the atmos-phere, as well as on the earth surface.
APA, Harvard, Vancouver, ISO, and other styles
2

Szpyra, Ryszard. "Military Security within the Framework of Security Studies: Research Results." Connections: The Quarterly Journal 13, no. 3 (2014): 59–82. http://dx.doi.org/10.11610/connections.13.3.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gannon, John C., Richard A. Meserve, and Maria T. Zuber. "Reconsidering Research Security." Issues in Science and Technology 41, no. 2 (2025): 90–93. https://doi.org/10.58875/onga4344.

Full text
Abstract:
Research security isn’t only about defending against external threats; it also requires ensuring that the United States remains a leader in global innovation by supporting the people and infrastructure that fuel it.
APA, Harvard, Vancouver, ISO, and other styles
4

Cohen, Eliot A. "Taiwan Security Research." Foreign Affairs 79, no. 4 (2000): 154. http://dx.doi.org/10.2307/20049846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mitka, Mike. "Research Laboratory Security." JAMA 302, no. 10 (2009): 1050. http://dx.doi.org/10.1001/jama.2009.1271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

CR, Rachana. "Data Security in Cloud Computing: A Research Perspective." International Journal of Research and Review 9, no. 11 (2022): 325–30. http://dx.doi.org/10.52403/ijrr.20221144.

Full text
Abstract:
Security plays a very important role in the life of every living being. Today, in the ‘Technology’ engulfed businesses, data security is crucial for users and vendors alike. Cloud computing as a technology is the driving force behind all the financial transactions being completed every second across the globe. In the current context, Cloud data security is crucial and is of utmost importance. Data Security in the cloud refers to the technologies, policies, services, security controls that protect data in the cloud from loss, leakage or misuse through security breaches and unauthorized access.
APA, Harvard, Vancouver, ISO, and other styles
7

Tang, Jian Gang, Shi Jun Zhang, and Ji Jiang. "Research on Network Security Issues and Security Model." Applied Mechanics and Materials 519-520 (February 2014): 128–31. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.128.

Full text
Abstract:
Network security issues came from traditional network, wireless network and cloud computing environment. Large-scale cloud computing, versatility and virtualization features of network security had become a hidden threat source. This paper analyzed the sources of network security threats, and established a network security model which encompasses all types of currently known network security factors; it could provide countermeasures to ensure network security. The security model had capabilities of real-time detection, rapid response, immediate recovery, and interaction between various indepen
APA, Harvard, Vancouver, ISO, and other styles
8

Changchit, Chuleeporn. "Security Systems Framework, Security-Related Research, Web Threats." Journal of Information Privacy and Security 7, no. 4 (2011): 1–2. http://dx.doi.org/10.1080/15536548.2011.10855920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Yan Kun. "Computer Network Security Threats and Security Technology Research." Advanced Materials Research 971-973 (June 2014): 1440–43. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1440.

Full text
Abstract:
Networksecurity network system is presented, including hardware, software, and itstransmission in the network information security, network security threatsmainly include: software vulnerabilities, improper configuration, safetyconsciousness is not strong, virus, hacker attacks, etc. Is not only afirewall, network security is not anti-virus, intrusion monitoring, firewall,identity authentication, encryption, and other products of simple stack, butfrom the system to the application, from the device to the service ofrelatively complete, the system of the combination of security products.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Zhi Gang, Chang Zhen Hu, Ming Lei Hao, and Fang Lu. "Cyber Security Datasets Research." Advanced Materials Research 659 (January 2013): 191–95. http://dx.doi.org/10.4028/www.scientific.net/amr.659.191.

Full text
Abstract:
Data is the basis for cyber security research. Correct understanding and rapid access to rich and reliable data is a good beginning of our research work. In this paper we present a novel classification method of cyber security data. In addition, we collect and list some datasets, which can better help you to carry out research.
APA, Harvard, Vancouver, ISO, and other styles
11

Swift, Nan. "Security Guard Research Review." Annals of Improbable Research 11, no. 3 (2005): 28. http://dx.doi.org/10.3142/107951405781345695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Hancock, Bill. "Security research alliance begins." Computers & Security 18, no. 2 (1999): 95. http://dx.doi.org/10.1016/s0167-4048(99)90021-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ratnasiri, Nalini. "Research and Energy Security." Journal of the National Science Foundation of Sri Lanka 37, no. 1 (2009): 1. http://dx.doi.org/10.4038/jnsfsr.v37i1.451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Szewior, Krzysztof. "Scientific Research in Austrian Security Strategies and Research on Security and Defence." Przegląd Strategiczny, no. 15 (February 15, 2023): 415–31. http://dx.doi.org/10.14746/ps.2022.1.24.

Full text
Abstract:
Official documents of the Austrian government indicate the growing dependence of the economy and society on technical infrastructure, which required continuous research. Austria has developed a national research program to promote its economy, technology and cooperation. It is also intended to support the Austrian defence and civilian economy as a coherent part of the EU’s research, technology and economic structures. This text is based in particular on primary literature, which includes documents of EU institutions, Austrian security and defence strategies, and statements of the Ministry of D
APA, Harvard, Vancouver, ISO, and other styles
15

Côté-Boucher, Karine, Federica Infantino, and Mark B. Salter. "Border security as practice: An agenda for research." Security Dialogue 45, no. 3 (2014): 195–208. http://dx.doi.org/10.1177/0967010614533243.

Full text
Abstract:
The ambition of this special issue is to contribute to contemporary scholarly analyses of border security by bringing more focus onto a specific field of inquiry: the practices of the plurality of power-brokers involved in the securing of borders. Border security is addressed from the angle of the everyday practices of those who are appointed to carry it out; considering border security as practice is essential for shedding light on contemporary problematizations of security. Underscoring the methodological specificity of fieldwork research, we call for a better grounding of scholarship within
APA, Harvard, Vancouver, ISO, and other styles
16

Kanu, Ved Prakash Sah, Yusuf Ai Naiem, and Sudha Shanker Prasad. "A Research of Cybersecurity and Threats in Emerging Technologies." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 2935–38. http://dx.doi.org/10.22214/ijraset.2022.41858.

Full text
Abstract:
Abstract: Cyber security is crucial in the information technology field in today's world. Because every piece of data is now housed online, securing data has become one of the most challenging responsibilities. The first thing that comes to mind when we think of cyber security is cyber criminals, namely hacking, which is on the rise. To tackle cybercrime, several governments and corporations are pursuing several measures. Aside from spectacular attempts, many people still have concerns about cyber security. This study focuses mostly on the issues that cyber security faces with emerging technol
APA, Harvard, Vancouver, ISO, and other styles
17

Khatri, Sonam. "Comprehensive Research on Cyber - Attacks and Cyber Security." International Journal of Science and Research (IJSR) 11, no. 6 (2022): 1058–62. http://dx.doi.org/10.21275/sr22616122234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

HongMei, Wang. "Research on Public Opinion Security under Blockchain Architecture." International Journal of Science and Research (IJSR) 10, no. 12 (2021): 820–22. https://doi.org/10.21275/sr211214081230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Čadil, Vladislav, and Luděk Moravec. "Evaluating Security Research Support: The Case of Czech Security Research Programme 2010–2015." ERGO 12, no. 2 (2017): 25–32. http://dx.doi.org/10.1515/ergo-2017-0006.

Full text
Abstract:
Abstract Based on a case study of the ex-post evaluation of the programme VG-Security Research 2010–2015 this paper aims to present a possible way of the ex-post evaluation of security research programmes, and to highlight some aspects that must be taken into account in the evaluation process. It examines limits of application of the Basic Principles of Elaboration and Evaluation of Programmes and Groups of Grant Projects in Research, Development and Innovation. The limits follow from the emphasis on the summative nature of the evaluation, which combines a range of indicators that relates to a
APA, Harvard, Vancouver, ISO, and other styles
20

Misiągiewicz, Justyna. "Energy security as a research area of international security." Stosunki Międzynarodowe – International Relations 2 (June 9, 2023): 26. http://dx.doi.org/10.12688/stomiedintrelat.17622.2.

Full text
Abstract:
The research objective of the study is to analyse the essence and specificity of energy security in the light of research on international security. Thus, various theoretical approaches, useful in the analysis of energy security issues, were taken into account. The analysis allows us to conclude that energy security issues take into account long-term development trends as well as unpredictable events related to the functioning of energy market and energy technology. Thus, unexpected, sudden phenomena resulting from the dynamics of the international environment gain in importance. The dilemma r
APA, Harvard, Vancouver, ISO, and other styles
21

Misiągiewicz, Justyna. "Energy security as a research area of international security." Stosunki Międzynarodowe – International Relations 2 (December 16, 2022): 26. http://dx.doi.org/10.12688/stomiedintrelat.17622.1.

Full text
Abstract:
Energy security is the basic analytical category for this conducted study and its findings that are included in the article. This category defines the scope and the specific character of research and its relation to security studies. It is an important element of the epistemic layer of the conducted research. On the other hand, in terms of social reality and ontology, energy security is a foreign policy objective, an international value, and a dynamic process. It concerns various types of actors: from individuals to large social groups, institutions, states, nations, and international systems.
APA, Harvard, Vancouver, ISO, and other styles
22

Lee, Jungchan, Cheolhee Yoon, and Jinyoung Choi. "Research on Implementing Security Governance for SDV AI Security." Journal of Korean Institute of Information Technology 23, no. 4 (2025): 203–11. https://doi.org/10.14801/jkiit.2025.23.4.203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Hu, Yu Juan, and Qing Wei Meng. "Research on Information Security Model." Advanced Materials Research 488-489 (March 2012): 1684–88. http://dx.doi.org/10.4028/www.scientific.net/amr.488-489.1684.

Full text
Abstract:
Security of computer information system more and more aroused people’s attention, and information security assessment and computer system security model is closely related to information security model which is patricularly important. This article describes the security model of the characteristics and uses, and several security models are compared, these models were from a different perspective considering system security, through comparison Analysis, Establishment of information security model obtained several important aspects to consider.
APA, Harvard, Vancouver, ISO, and other styles
24

Kumar, Shivam, Raval Mahesh, Nrip Nripesh, and Sinha Achalesh. "A research study on Web Application Security." International Journal of Multidisciplinary Research Transactions 4, no. 6 (2022): 93–104. https://doi.org/10.5281/zenodo.6633934.

Full text
Abstract:
This research basically centers on the point of website/web application security. The prime agenda of this research is to verify that how much government websites are protected that is how they are handling the user’s data as a part of providing such facility over the data inputted by the user. Vulnerability of websites is a very important aspect on which we are not focusing yet. Might have a security escape clause in it. The world is exceedingly reliant on the Internet. Nowadays, web application security is one of the biggest challenges in this world. It is considered as the principal f
APA, Harvard, Vancouver, ISO, and other styles
25

Damon, J. Morrow. "Transportation Security Agency - Research Papers." European Business Review 2017, no. 10 (2017): 6. https://doi.org/10.5281/zenodo.1000865.

Full text
Abstract:
After the September 11, 2001 terrorist attacks, the United States Congress turned its focus towards tightening airport security by voting to standardize airport security nationwide. Before 9/11, airport security was the responsibility of airports and contracted security services utilizing unskilled passenger and baggage screener personnel. Screeners where overworked and received a minimum wage average salary. Many mistakes caused by inadequate employee security training created numerous security vulnerabilities throughout the aviation industry. After the 9/11 attack, a federal government contr
APA, Harvard, Vancouver, ISO, and other styles
26

Frank, M. Ramos. "Transportation Security Agency - Research Papers." Journal of Teacher Education 2017, no. 10 (2017): 6. https://doi.org/10.5281/zenodo.1000927.

Full text
Abstract:
After the September 11, 2001 terrorist attacks, the United States Congress turned its focus towards tightening airport security by voting to standardize airport security nationwide. Before 9/11, airport security was the responsibility of airports and contracted security services utilizing unskilled passenger and baggage screener personnel. Screeners where overworked and received a minimum wage average salary. Many mistakes caused by inadequate employee security training created numerous security vulnerabilities throughout the aviation industry. After the 9/11 attack, a federal government contr
APA, Harvard, Vancouver, ISO, and other styles
27

Wan, Xue Yong, Liang Zhang, Wei Xu, and Hong Hui Gong. "Computer Network Security Strategy Research." Applied Mechanics and Materials 599-601 (August 2014): 1457–60. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1457.

Full text
Abstract:
Internet technology in the life to people bring convenient while, also is facing increasingly serious security threat from the network, many invaders one thousand ways to want to "see" to some concerned data or information, computer network information security is more and more attention. This article, from the perspective of the system vulnerability and network own existence safe hidden trouble, put forward to realize protection methods and strategies of network security.
APA, Harvard, Vancouver, ISO, and other styles
28

Li, Ping, Dong Yang Guo, Ying Liu, Jun Li Li, and He Yan Li. "Research on Computer Radiation Security." Applied Mechanics and Materials 135-136 (October 2011): 1187–92. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1187.

Full text
Abstract:
In view of the electromagnetic information leakage of information security implication, the time-frequency characteristics of radiation signal from LCD display with a resolution of 1280×1024 through simulation is analyzed in this paper. The design and measurement of the shielding box is given. A USA military standard testing is made, which shows that the designed shielding box is less than the overall emission of radiation 35 dBμV/m and with a proper increase In protection radius, the amount of its radiation emission can be reduced to 20 dBμV/m or less, lower than the 20 dBμV/m of the ambient
APA, Harvard, Vancouver, ISO, and other styles
29

Wei, Xian Min. "Security Research of Online Transactions." Advanced Materials Research 204-210 (February 2011): 773–76. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.773.

Full text
Abstract:
With the rapid development of Internet, online shopping is becoming a new way for shopping. However, the security of online shopping has been the focus by a lot of people worried. This article discusses the existing problems from the online shopping area and the integrity of the security of online transactions, and describes the corresponding solutions. Finally, an example of information encryption technology introduced in the simple online shopping application.
APA, Harvard, Vancouver, ISO, and other styles
30

Song Zhaoqi, 宋召奇, 朱精果 Zhu Jingguo, 解天鹏 Xie Tianpeng, et al. "Research Progress on Security LiDAR." Laser & Optoelectronics Progress 58, no. 1 (2021): 0100002. http://dx.doi.org/10.3788/lop202158.0100002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Wiśniewski, Bernard. "National Security — Essence, System, Research." Internal Security Special Issue (June 1, 2020): 37–48. http://dx.doi.org/10.5604/01.3001.0014.1568.

Full text
Abstract:
Internal security is today an intensively explored area of national security. This is hardly surprising. It is this area that is mainly concerned with emerging threats. Hence, new scientifically justified solutions are being sought to counteract them and minimise the effects of their occurrence. Given the above, the research has been conducted, and its results are presented in this paper. It addresses the main problems relating to internal security through the prism of identification criteria, essence, and systemic approach. That has made it possible to present the assumptions of the project i
APA, Harvard, Vancouver, ISO, and other styles
32

Anyushina, Marina A., Elena V. Bestaeva, Viacheslav V. Suyazov, Svetlana V. Shiryaeva, and Nataliya S. Shutikova. "National Security: Theoretical-Legal Research." Cuestiones Políticas 39, no. 69 (2021): 317–25. http://dx.doi.org/10.46398/cuestpol.3969.18.

Full text
Abstract:
The study is relevant as the category of "national security" is multilevel. The work reveals the characteristics and components of this system. The concept of national security exists all over the world. It is one of the most important types of security and is studied by academics from different countries. Furthermore, the concept of national security means a set of scientific and theoretical ideas, opinions and views that dominate in each society and is a subjective reflection of objective ties and national security relations in the public consciousness. From a documentary methodology the art
APA, Harvard, Vancouver, ISO, and other styles
33

Czuprynski, Andrzej, Magdalena, and Jacek Zboina. "Interdisciplinary and Transdisciplinary Security Research." EUROPEAN RESEARCH STUDIES JOURNAL XXIV, Issue 3B (2021): 434–55. http://dx.doi.org/10.35808/ersj/2491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Li, Xin Hua. "Research of JMS Security Mechanism." Applied Mechanics and Materials 635-637 (September 2014): 1171–74. http://dx.doi.org/10.4028/www.scientific.net/amm.635-637.1171.

Full text
Abstract:
According to the characteristics of the message middleware and JMS specification, this paper introduces several methods to improve the performance of the security of the JMS message middleware. The basic idea is to use two-way digital signature authentication information, and in the process of message transmission, to use negotiated session key and asymmetric encryption technology to encrypt messages. Using this mechanism can effectively protect the safety of the message transmission and storage, and to achieve a smaller time overhead associated with acceptable performance.
APA, Harvard, Vancouver, ISO, and other styles
35

Liu, Guo Zhu, and Xiao Kun Zheng. "Research of RFID System Security." Applied Mechanics and Materials 321-324 (June 2013): 2653–56. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2653.

Full text
Abstract:
Radio Frequency Identification (RFID) technology has been gradually into our daily production and life as a new non-contact automatic identification technology.However , the limited resources of low-cost RFID largely restrict the implementation of RFID security mechanisms,which leads to personal privacy issues ,and the issues greatly hinder the rapid adoption of the technology.Here, RFID communication model and security requirements are discussed,and then it analyzes the security solutions for low-cost RFID systems.
APA, Harvard, Vancouver, ISO, and other styles
36

Chen, Wei, Yue Long Zhao, Sai Qin Long, and Xiao Ling Xie. "Research on Cloud Storage Security." Applied Mechanics and Materials 263-266 (December 2012): 3068–72. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3068.

Full text
Abstract:
It is much easier to store data with cloud storage. However, the development of cloud storage was restricted to many security factors. This paper introduces the basic concept of cloud storage, proposes a security framework in architecture of cloud storage, analyzes existing security problems in architecture of cloud storage, and reviews the current research progress. Cloud storage will be inestimable if we resolve security problems of cloud storage.
APA, Harvard, Vancouver, ISO, and other styles
37

Hand, Eric. "Security issues plague US research." Nature 449, no. 7165 (2007): 959. http://dx.doi.org/10.1038/449959a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Osmus, Lynne A. "FAA'S security research and development." Terrorism 14, no. 2 (1991): 120–23. http://dx.doi.org/10.1080/10576109108435866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Banerjee, C., and S. K. Pandey. "Research on software security awareness." ACM SIGSOFT Software Engineering Notes 35, no. 5 (2010): 1–5. http://dx.doi.org/10.1145/1838687.1838701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Busta, F., N. Clarke, L. R. Goldman, et al. "Cuts in Homeland Security Research." Science 313, no. 5793 (2006): 1571b. http://dx.doi.org/10.1126/science.313.5793.1571b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Dijkstra, Hylke. "Security research on COVID-19." Contemporary Security Policy 41, no. 3 (2020): 456–57. http://dx.doi.org/10.1080/13523260.2020.1772468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Gautam, Mr Shubham, Mr Pramod Yadav, Mr Rishabh Thakur, Ms Rohinee pathak, and Mrs Subodhini Gupta. "Research Paper on Cyber Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem38154.

Full text
Abstract:
Cybersecurity is like our computers and phones' superhero. They help keep our computers and phone safe from sneaky bad guys on the internet. It’s all about using genius locks and tricks to keep our digital stuff virus free, hacker proof and away from funny online stunts. Like we cheque if the doors are locked and who leaving keys under the doormat at home, cybersecurity is our online detectives to keep an eye on websites to see they are safe, and be a bit more careful when clicking on links in emails from strangers. Having a shield for your digital world, to enjoy the internet without worries.
APA, Harvard, Vancouver, ISO, and other styles
43

Ackleson, Jason. "Directions in border security research." Social Science Journal 40, no. 4 (2003): 573–81. http://dx.doi.org/10.1016/s0362-3319(03)00069-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

HOGUE, CHERYL. "HOMELAND SECURITY RESEARCH AT EPA." Chemical & Engineering News 84, no. 35 (2006): 26–28. http://dx.doi.org/10.1021/cen-v084n035.p026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Shambaugh, David L. "China's National Security Research Bureaucracy." China Quarterly 110 (June 1987): 276–304. http://dx.doi.org/10.1017/s0305741000019913.

Full text
Abstract:
How does one define the ”national security research bureaucracy” (NSRB) in the Chinese context and are there enough empirical data to sustain an article on this topic? The definition one chooses directly determines the data base one uses and, in turn, answers the question of the viability of the topic.
APA, Harvard, Vancouver, ISO, and other styles
46

XIE, Cheng-shan, Gu-yue XUJIA, and Li WANG. "Information security assurance lifecycle research." Journal of China Universities of Posts and Telecommunications 14, no. 4 (2007): 77–81. http://dx.doi.org/10.1016/s1005-8885(08)60042-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Matwyshyn, A. M., Ang Cui, A. D. Keromytis, and S. J. Stolfo. "Ethics in security vulnerability research." IEEE Security & Privacy Magazine 8, no. 2 (2010): 67–72. http://dx.doi.org/10.1109/msp.2010.67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

van der Kouwe, Erik, Gernot Heiser, Dennis Andriesse, Herbert Bos, and Cristiano Giuffrida. "Benchmarking Flaws Undermine Security Research." IEEE Security & Privacy 18, no. 3 (2020): 48–57. http://dx.doi.org/10.1109/msec.2020.2969862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Bush, Vannevar. "RESEARCH, ORGANIZATION, AND NATIONAL SECURITY." Journal of the American Society for Naval Engineers 58, no. 2 (2009): 179–87. http://dx.doi.org/10.1111/j.1559-3584.1946.tb01716.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Andrea Widener. "Research security tool kit released." C&EN Global Enterprise 100, no. 41 (2022): 17. http://dx.doi.org/10.1021/cen-10041-polcon3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!