Journal articles on the topic 'Research security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Research security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zh. Stoyanov, Stiliyan. "Space research and national security." Journal scientific and applied research 1, no. 1 (2012): 154–57. http://dx.doi.org/10.46687/jsar.v1i1.33.
Full textSzpyra, Ryszard. "Military Security within the Framework of Security Studies: Research Results." Connections: The Quarterly Journal 13, no. 3 (2014): 59–82. http://dx.doi.org/10.11610/connections.13.3.04.
Full textGannon, John C., Richard A. Meserve, and Maria T. Zuber. "Reconsidering Research Security." Issues in Science and Technology 41, no. 2 (2025): 90–93. https://doi.org/10.58875/onga4344.
Full textCohen, Eliot A. "Taiwan Security Research." Foreign Affairs 79, no. 4 (2000): 154. http://dx.doi.org/10.2307/20049846.
Full textMitka, Mike. "Research Laboratory Security." JAMA 302, no. 10 (2009): 1050. http://dx.doi.org/10.1001/jama.2009.1271.
Full textCR, Rachana. "Data Security in Cloud Computing: A Research Perspective." International Journal of Research and Review 9, no. 11 (2022): 325–30. http://dx.doi.org/10.52403/ijrr.20221144.
Full textTang, Jian Gang, Shi Jun Zhang, and Ji Jiang. "Research on Network Security Issues and Security Model." Applied Mechanics and Materials 519-520 (February 2014): 128–31. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.128.
Full textChangchit, Chuleeporn. "Security Systems Framework, Security-Related Research, Web Threats." Journal of Information Privacy and Security 7, no. 4 (2011): 1–2. http://dx.doi.org/10.1080/15536548.2011.10855920.
Full textZhang, Yan Kun. "Computer Network Security Threats and Security Technology Research." Advanced Materials Research 971-973 (June 2014): 1440–43. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1440.
Full textWang, Zhi Gang, Chang Zhen Hu, Ming Lei Hao, and Fang Lu. "Cyber Security Datasets Research." Advanced Materials Research 659 (January 2013): 191–95. http://dx.doi.org/10.4028/www.scientific.net/amr.659.191.
Full textSwift, Nan. "Security Guard Research Review." Annals of Improbable Research 11, no. 3 (2005): 28. http://dx.doi.org/10.3142/107951405781345695.
Full textHancock, Bill. "Security research alliance begins." Computers & Security 18, no. 2 (1999): 95. http://dx.doi.org/10.1016/s0167-4048(99)90021-4.
Full textRatnasiri, Nalini. "Research and Energy Security." Journal of the National Science Foundation of Sri Lanka 37, no. 1 (2009): 1. http://dx.doi.org/10.4038/jnsfsr.v37i1.451.
Full textSzewior, Krzysztof. "Scientific Research in Austrian Security Strategies and Research on Security and Defence." Przegląd Strategiczny, no. 15 (February 15, 2023): 415–31. http://dx.doi.org/10.14746/ps.2022.1.24.
Full textCôté-Boucher, Karine, Federica Infantino, and Mark B. Salter. "Border security as practice: An agenda for research." Security Dialogue 45, no. 3 (2014): 195–208. http://dx.doi.org/10.1177/0967010614533243.
Full textKanu, Ved Prakash Sah, Yusuf Ai Naiem, and Sudha Shanker Prasad. "A Research of Cybersecurity and Threats in Emerging Technologies." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 2935–38. http://dx.doi.org/10.22214/ijraset.2022.41858.
Full textKhatri, Sonam. "Comprehensive Research on Cyber - Attacks and Cyber Security." International Journal of Science and Research (IJSR) 11, no. 6 (2022): 1058–62. http://dx.doi.org/10.21275/sr22616122234.
Full textHongMei, Wang. "Research on Public Opinion Security under Blockchain Architecture." International Journal of Science and Research (IJSR) 10, no. 12 (2021): 820–22. https://doi.org/10.21275/sr211214081230.
Full textČadil, Vladislav, and Luděk Moravec. "Evaluating Security Research Support: The Case of Czech Security Research Programme 2010–2015." ERGO 12, no. 2 (2017): 25–32. http://dx.doi.org/10.1515/ergo-2017-0006.
Full textMisiągiewicz, Justyna. "Energy security as a research area of international security." Stosunki Międzynarodowe – International Relations 2 (June 9, 2023): 26. http://dx.doi.org/10.12688/stomiedintrelat.17622.2.
Full textMisiągiewicz, Justyna. "Energy security as a research area of international security." Stosunki Międzynarodowe – International Relations 2 (December 16, 2022): 26. http://dx.doi.org/10.12688/stomiedintrelat.17622.1.
Full textLee, Jungchan, Cheolhee Yoon, and Jinyoung Choi. "Research on Implementing Security Governance for SDV AI Security." Journal of Korean Institute of Information Technology 23, no. 4 (2025): 203–11. https://doi.org/10.14801/jkiit.2025.23.4.203.
Full textHu, Yu Juan, and Qing Wei Meng. "Research on Information Security Model." Advanced Materials Research 488-489 (March 2012): 1684–88. http://dx.doi.org/10.4028/www.scientific.net/amr.488-489.1684.
Full textKumar, Shivam, Raval Mahesh, Nrip Nripesh, and Sinha Achalesh. "A research study on Web Application Security." International Journal of Multidisciplinary Research Transactions 4, no. 6 (2022): 93–104. https://doi.org/10.5281/zenodo.6633934.
Full textDamon, J. Morrow. "Transportation Security Agency - Research Papers." European Business Review 2017, no. 10 (2017): 6. https://doi.org/10.5281/zenodo.1000865.
Full textFrank, M. Ramos. "Transportation Security Agency - Research Papers." Journal of Teacher Education 2017, no. 10 (2017): 6. https://doi.org/10.5281/zenodo.1000927.
Full textWan, Xue Yong, Liang Zhang, Wei Xu, and Hong Hui Gong. "Computer Network Security Strategy Research." Applied Mechanics and Materials 599-601 (August 2014): 1457–60. http://dx.doi.org/10.4028/www.scientific.net/amm.599-601.1457.
Full textLi, Ping, Dong Yang Guo, Ying Liu, Jun Li Li, and He Yan Li. "Research on Computer Radiation Security." Applied Mechanics and Materials 135-136 (October 2011): 1187–92. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1187.
Full textWei, Xian Min. "Security Research of Online Transactions." Advanced Materials Research 204-210 (February 2011): 773–76. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.773.
Full textSong Zhaoqi, 宋召奇, 朱精果 Zhu Jingguo, 解天鹏 Xie Tianpeng, et al. "Research Progress on Security LiDAR." Laser & Optoelectronics Progress 58, no. 1 (2021): 0100002. http://dx.doi.org/10.3788/lop202158.0100002.
Full textWiśniewski, Bernard. "National Security — Essence, System, Research." Internal Security Special Issue (June 1, 2020): 37–48. http://dx.doi.org/10.5604/01.3001.0014.1568.
Full textAnyushina, Marina A., Elena V. Bestaeva, Viacheslav V. Suyazov, Svetlana V. Shiryaeva, and Nataliya S. Shutikova. "National Security: Theoretical-Legal Research." Cuestiones Políticas 39, no. 69 (2021): 317–25. http://dx.doi.org/10.46398/cuestpol.3969.18.
Full textCzuprynski, Andrzej, Magdalena, and Jacek Zboina. "Interdisciplinary and Transdisciplinary Security Research." EUROPEAN RESEARCH STUDIES JOURNAL XXIV, Issue 3B (2021): 434–55. http://dx.doi.org/10.35808/ersj/2491.
Full textLi, Xin Hua. "Research of JMS Security Mechanism." Applied Mechanics and Materials 635-637 (September 2014): 1171–74. http://dx.doi.org/10.4028/www.scientific.net/amm.635-637.1171.
Full textLiu, Guo Zhu, and Xiao Kun Zheng. "Research of RFID System Security." Applied Mechanics and Materials 321-324 (June 2013): 2653–56. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2653.
Full textChen, Wei, Yue Long Zhao, Sai Qin Long, and Xiao Ling Xie. "Research on Cloud Storage Security." Applied Mechanics and Materials 263-266 (December 2012): 3068–72. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3068.
Full textHand, Eric. "Security issues plague US research." Nature 449, no. 7165 (2007): 959. http://dx.doi.org/10.1038/449959a.
Full textOsmus, Lynne A. "FAA'S security research and development." Terrorism 14, no. 2 (1991): 120–23. http://dx.doi.org/10.1080/10576109108435866.
Full textBanerjee, C., and S. K. Pandey. "Research on software security awareness." ACM SIGSOFT Software Engineering Notes 35, no. 5 (2010): 1–5. http://dx.doi.org/10.1145/1838687.1838701.
Full textBusta, F., N. Clarke, L. R. Goldman, et al. "Cuts in Homeland Security Research." Science 313, no. 5793 (2006): 1571b. http://dx.doi.org/10.1126/science.313.5793.1571b.
Full textDijkstra, Hylke. "Security research on COVID-19." Contemporary Security Policy 41, no. 3 (2020): 456–57. http://dx.doi.org/10.1080/13523260.2020.1772468.
Full textGautam, Mr Shubham, Mr Pramod Yadav, Mr Rishabh Thakur, Ms Rohinee pathak, and Mrs Subodhini Gupta. "Research Paper on Cyber Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem38154.
Full textAckleson, Jason. "Directions in border security research." Social Science Journal 40, no. 4 (2003): 573–81. http://dx.doi.org/10.1016/s0362-3319(03)00069-7.
Full textHOGUE, CHERYL. "HOMELAND SECURITY RESEARCH AT EPA." Chemical & Engineering News 84, no. 35 (2006): 26–28. http://dx.doi.org/10.1021/cen-v084n035.p026.
Full textShambaugh, David L. "China's National Security Research Bureaucracy." China Quarterly 110 (June 1987): 276–304. http://dx.doi.org/10.1017/s0305741000019913.
Full textXIE, Cheng-shan, Gu-yue XUJIA, and Li WANG. "Information security assurance lifecycle research." Journal of China Universities of Posts and Telecommunications 14, no. 4 (2007): 77–81. http://dx.doi.org/10.1016/s1005-8885(08)60042-4.
Full textMatwyshyn, A. M., Ang Cui, A. D. Keromytis, and S. J. Stolfo. "Ethics in security vulnerability research." IEEE Security & Privacy Magazine 8, no. 2 (2010): 67–72. http://dx.doi.org/10.1109/msp.2010.67.
Full textvan der Kouwe, Erik, Gernot Heiser, Dennis Andriesse, Herbert Bos, and Cristiano Giuffrida. "Benchmarking Flaws Undermine Security Research." IEEE Security & Privacy 18, no. 3 (2020): 48–57. http://dx.doi.org/10.1109/msec.2020.2969862.
Full textBush, Vannevar. "RESEARCH, ORGANIZATION, AND NATIONAL SECURITY." Journal of the American Society for Naval Engineers 58, no. 2 (2009): 179–87. http://dx.doi.org/10.1111/j.1559-3584.1946.tb01716.x.
Full textAndrea Widener. "Research security tool kit released." C&EN Global Enterprise 100, no. 41 (2022): 17. http://dx.doi.org/10.1021/cen-10041-polcon3.
Full text