Journal articles on the topic 'Security analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Antonov, Petar, and Nikoleta Georgieva. "Security Analysis of Diceware Passphrases." Information & Security: An International Journal 47, no. 2 (2020): 276–82. http://dx.doi.org/10.11610/isij.4719.
Full textPetkova, Lilyana, and Vasilisa Pavlova. "Security Analysis on Content Management Systems." Mathematics and Informatics LXV, no. 5 (October 28, 2022): 423–34. http://dx.doi.org/10.53656/math2022-5-2-sec.
Full textCOMȘA, Andreea-Cristina. "Security Standards Analysis." International Journal of Information Security and Cybercrime 1, no. 2 (December 21, 2012): 25–30. http://dx.doi.org/10.19107/ijisc.2012.02.03.
Full textMIHAI, Ioan-Cosmin. "Security Standards Analysis." International Journal of Information Security and Cybercrime 2, no. 2 (December 28, 2013): 27–34. http://dx.doi.org/10.19107/ijisc.2013.02.03.
Full textPandya, Vaibhav Ranchhoddas, and Mark Stamp. "iPhone Security Analysis." Journal of Information Security 01, no. 02 (2010): 74–87. http://dx.doi.org/10.4236/jis.2010.12009.
Full textChen, Wei-Yu, Shing-Han Li, Mann-Jung Hsiao, Chung-Chiang Hu, and Kuo-Ching Tu. "Network Security Analysis by Using Business Intelligence." International Journal of Machine Learning and Computing 5, no. 6 (December 2015): 431–38. http://dx.doi.org/10.18178/ijmlc.2015.5.6.547.
Full textYUM, D. H., J. H. SHIN, and P. J. LEE. "Security Analysis of Yeh-Tsai Security Mechanism." IEICE Transactions on Information and Systems E91-D, no. 5 (May 1, 2008): 1477–80. http://dx.doi.org/10.1093/ietisy/e91-d.5.1477.
Full textrof. Dr. S.D. Joshi, Prof Y. C. Kulkarni, P. "Incorporating Security into SDLC Phases Using Security Analysis." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 07 (July 30, 2015): 6423–31. http://dx.doi.org/10.15680/ijircce.2015.0307010.
Full textLi, Xiaochao, Cuicui Zhao, Kun Pan, Shuqiang Lin, Xiurong Chen, Benbin Chen, Deguang Le, Donghui Guo, and Xiaochao Li. "On the Security Analysis of PBKDF2 in OpenOffice." Journal of Software 10, no. 2 (February 2015): 116–26. http://dx.doi.org/10.17706/jsw.10.2.116-126.
Full textCIOACĂ, Cătălin, Alexandru BRATU, and Daniel ȘTEFĂNESCU. "THE ANALYSIS OF BENCHMARKING APPLICATION IN CYBER SECURITY." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 2 (July 31, 2017): 57–62. http://dx.doi.org/10.19062/2247-3173.2017.19.2.8.
Full textHamdani, Farhaan Noor. "Comparative Analysis of Wireless Security Protocols and Issues." International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (August 31, 2018): 1591–96. http://dx.doi.org/10.31142/ijtsrd17130.
Full textG. San Jose, Christine Charmaine. "Comparative and Security Performance Analysis of SHA-3." Journal of Advanced Research in Dynamical and Control Systems 11, no. 11-SPECIAL ISSUE (November 20, 2019): 960–66. http://dx.doi.org/10.5373/jardcs/v11sp11/20193121.
Full textGarasym, Y. R. "Survivable security systems analysis." Military Technical Collection, no. 4 (May 4, 2011): 87–95. http://dx.doi.org/10.33577/2312-4458.4.2011.87-95.
Full textSingh, Sahib. "Security Analysis of MongoDB." International Journal for Digital Society 10, no. 4 (December 30, 2019): 1556–61. http://dx.doi.org/10.20533/ijds.2040.2570.2019.0193.
Full textEdmonds, Martin, and Julian Palmore. "Defence and security analysis." Defense & Security Analysis 32, no. 1 (January 2, 2016): 1–3. http://dx.doi.org/10.1080/14751798.2015.1133163.
Full textStott, B., O. Alsac, and A. J. Monticelli. "Security analysis and optimization." Proceedings of the IEEE 75, no. 12 (1987): 1623–44. http://dx.doi.org/10.1109/proc.1987.13931.
Full textRyoo, Jungwoo, Rick Kazman, and Priya Anand. "Architectural Analysis for Security." IEEE Security & Privacy 13, no. 6 (November 2015): 52–59. http://dx.doi.org/10.1109/msp.2015.126.
Full textMekhaznia, Tahar, and Abdelmadjid Zidani. "Wi-Fi Security Analysis." Procedia Computer Science 73 (2015): 172–78. http://dx.doi.org/10.1016/j.procs.2015.12.009.
Full textRichards, Justin, and Giovanni Vigna. "The Analysis of Security." ITNOW 60, no. 4 (2018): 38–40. http://dx.doi.org/10.1093/itnow/bwy100.
Full textChess, B., and G. McGraw. "Static analysis for security." IEEE Security and Privacy Magazine 2, no. 6 (November 2004): 76–79. http://dx.doi.org/10.1109/msp.2004.111.
Full textBau, Jason, and John C. Mitchell. "Security Modeling and Analysis." IEEE Security & Privacy Magazine 9, no. 3 (May 2011): 18–25. http://dx.doi.org/10.1109/msp.2011.2.
Full textNarayana, K. E., and K. Jayashree. "Security Analysis of Storage, Virtualization, Infrastructure and Standardization in Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 8 (August 1, 2020): 3754–58. http://dx.doi.org/10.1166/jctn.2020.9315.
Full textNtshabele, Koketso, Bassey Isong, Naison Gasela, and Adnan M. Abu-Mahfouz. "A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis." Journal of Sensor and Actuator Networks 11, no. 3 (September 5, 2022): 52. http://dx.doi.org/10.3390/jsan11030052.
Full textPark, Youngseok, Hyunsang Choi, Sanghyun Cho, and Young-Gab Kim. "Security Analysis of Smart Speaker: Security Attacks and Mitigation." Computers, Materials & Continua 61, no. 3 (2019): 1075–90. http://dx.doi.org/10.32604/cmc.2019.08520.
Full textJiang, Qing Chao. "Analysis on Wireless LAN Security Issues and Security Implementation." Advanced Materials Research 1030-1032 (September 2014): 1657–59. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.1657.
Full textThapliyal, Sangeeta. "Water Security or Security of Water? A Conceptual Analysis." India Quarterly: A Journal of International Affairs 67, no. 1 (March 2011): 19–35. http://dx.doi.org/10.1177/097492841006700102.
Full textKim, Kyung-Shin. "Security Analysis and Improvement of Integrated Security Management System." Journal of the Institute of Webcasting, Internet and Telecommunication 15, no. 1 (February 28, 2015): 15–23. http://dx.doi.org/10.7236/jiibc.2015.15.1.15.
Full textHong, Jin B., and Dong Seong Kim. "Towards scalable security analysis using multi-layered security models." Journal of Network and Computer Applications 75 (November 2016): 156–68. http://dx.doi.org/10.1016/j.jnca.2016.08.024.
Full textHarsan, H., N. Hadjsaid, and P. Pruvot. "Cyclic security analysis for security constrained optimal power flow." IEEE Transactions on Power Systems 12, no. 2 (May 1997): 948–53. http://dx.doi.org/10.1109/59.589787.
Full textJoo, Il-Yeob. "Analysis on Security Business Areas of Electronics Security Companies." Korean Security Science Review 73 (December 31, 2022): 47–70. http://dx.doi.org/10.36623/kssr.2022.73.3.
Full textMashchenko, Maryna. "Analysis of the approaches to evaluate environmental security of enterprises." Economics of Development 17, no. 4 (December 10, 2018): 13–19. http://dx.doi.org/10.21511/ed.17(4).2018.02.
Full textRana, Muhammad Ehsan. "Common Security Protocols for Wireless Networks: A Comparative Analysis." International Journal of Psychosocial Rehabilitation 24, no. 5 (April 20, 2020): 3887–96. http://dx.doi.org/10.37200/ijpr/v24i5/pr202097.
Full textDr. J.P. Sabannavar, Dr J. P. Sabannavar, and DR P. L. HARALE Dr. P.L.HARALE. "Food Security and Public Distribution System – A Macro Analysis." Indian Journal of Applied Research 4, no. 8 (October 1, 2011): 81–83. http://dx.doi.org/10.15373/2249555x/august2014/21.
Full textYifan, Yuan. "Analysis of Security Vulnerabilities Using Misuse Pattern Testing Approach." Journal of Software 10, no. 5 (May 2015): 650–58. http://dx.doi.org/10.17706/jsw.10.5.650-658.
Full textTarasenko, Iryna Oleksiivna, Julia Andriivna Bondarchuk, and Oleksiy Serhiiovych Tarasenko. "ECONOMIC SECURITY OF HIGHER EDUCATION: OPPORTUNITIES AND THREATS ANALYSIS." SCIENTIFIC BULLETIN OF POLISSIA 1, no. 4(12) (2017): 40–43. http://dx.doi.org/10.25140/2410-9576-2017-1-4(12)-40-43.
Full textGUPTA, SHIVANI. "Nutritional Status and Food Security: An Analysis for India." Paripex - Indian Journal Of Research 3, no. 2 (January 15, 2012): 50–53. http://dx.doi.org/10.15373/22501991/feb2014/14.
Full textPati, Sharanappa. "Isms Framework in Design and Analysis of Information Security." Paripex - Indian Journal Of Research 3, no. 7 (January 1, 2012): 215–17. http://dx.doi.org/10.15373/22501991/july2014/86.
Full textMaity, Soumya, P. Bera, Soumya K. Ghosh, and Ehab Al‐Shaer. "Formal integrated network security analysis tool: formal query‐based network security configuration analysis." IET Networks 4, no. 2 (March 2015): 137–47. http://dx.doi.org/10.1049/iet-net.2013.0090.
Full textRatan, Ram, and Arvind Yadav. "Security Analysis of Bit plane Level Image Encryption Schemes." Defence Science Journal 71, no. 2 (March 10, 2021): 209–21. http://dx.doi.org/10.14429/dsj.71.15643.
Full textSathiyapriya.S. "Comparison Analysis of Two Fish and Blow Fish Algorithm." INTERNATIONAL JOURNAL OF SCIENCE TECHNOLOGY AND HUMANITIES 2, no. 2 (October 30, 2015): 82–85. http://dx.doi.org/10.26524/ijsth61.
Full textFeofilova, Tatyana Yur'evna, Evgenii Vladimirovich Radygin, David Zurabovich Amirbegi, and Ul'yana Dmitrievna Bezdelova. "National security management: retrospective analysis." Национальная безопасность / nota bene, no. 6 (June 2020): 19–27. http://dx.doi.org/10.7256/2454-0668.2020.6.34786.
Full textBin Tauqeer, Omer, Sadeeq Jan, Alaa Omar Khadidos, Adil Omar Khadidos, Fazal Qudus Khan, and Sana Khattak. "Analysis of Security Testing Techniques." Intelligent Automation & Soft Computing 29, no. 1 (2021): 291–306. http://dx.doi.org/10.32604/iasc.2021.017260.
Full textCho, Kwang-Rae. "Classification Analysis on Private Security." Korean Security Science Review 51 (June 30, 2017): 101–24. http://dx.doi.org/10.36623/kssa.2017.51.5.
Full textCho, Kwang-Rae. "Classification Analysis on Private Security." Korean Security Science Review 51 (June 30, 2017): 101–24. http://dx.doi.org/10.36623/kssa.2019.51.5.
Full textWidayatno, Rudy Laksmono, Arwin Datumaya W, and Zaenal Abidin. "Analysis Bioavtur for Energy Security." Jurnal Pertahanan 2, no. 3 (December 29, 2016): 243. http://dx.doi.org/10.33172/jp.v2i3.102.
Full textMironova, O. A. "TAX SECURITY: TRANSFORMATION-TYPOLOGICAL ANALYSIS." Развитие и безопасность, no. 4 (2019): 105–14. http://dx.doi.org/10.46960/74159_2019_4_105.
Full textDegtyarev, N. Yu, G. P. Zhigulin, R. A. Shakirova, and S. A. Bondarev. "ANALYSIS OF CLOUD SECURITY CHALLENGES." Scientific and Technical Volga region Bulletin 6, no. 3 (June 2016): 104–6. http://dx.doi.org/10.24153/2079-5920-2016-6-3-104-106.
Full textTong, Xiaofei, Jingguo Bi, Yufei Duan, Lixiang Li, and Licheng Wang. "Security Analysis of DBTRU Cryptosystem." Entropy 24, no. 10 (September 23, 2022): 1349. http://dx.doi.org/10.3390/e24101349.
Full textFogler, H. Russell. "Security Analysis, DDMs, and Probability." ICFA Continuing Education Series 1988, no. 2 (January 1988): 51–55. http://dx.doi.org/10.2469/cp.v1988.n2.9.
Full textManojlovic, Dragan. "Intelligence analysis in corporate security." Megatrend revija 11, no. 4 (2014): 301–20. http://dx.doi.org/10.5937/megrev1404301m.
Full text