Journal articles on the topic 'Security architecture'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security architecture.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Et al., Sarayut Chaisuriya. "A Ring-Based Cybersecurity Architecture for Critical Infrastructure." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2826–40. http://dx.doi.org/10.17762/turcomat.v12i6.5790.
Full textShapiro, Michael J. "Architecture as event space: Violence, securitisation, and resistance." European Journal of International Security 4, no. 3 (July 26, 2019): 366–85. http://dx.doi.org/10.1017/eis.2019.13.
Full textAlnaim, Abdulrahman Khalid, Ahmed Mahmoud Alwakeel, and Eduardo B. Fernandez. "Towards a Security Reference Architecture for NFV." Sensors 22, no. 10 (May 14, 2022): 3750. http://dx.doi.org/10.3390/s22103750.
Full textJiang, Weiyu, Bingyang Liu, Chuang Wang, and Xue Yang. "Security-Oriented Network Architecture." Security and Communication Networks 2021 (May 26, 2021): 1–16. http://dx.doi.org/10.1155/2021/6694650.
Full textMurray, William Hugh. "Enterprise Security Architecture." Information Systems Security 6, no. 4 (January 1998): 43–54. http://dx.doi.org/10.1080/10658989809342548.
Full textMurray, William Hugh. "Enterprise Security Architecture." Information Systems Security 6, no. 4 (December 1, 1998): 1–12. http://dx.doi.org/10.1201/1086/43299.6.4.19980101/30998.8.
Full textMurphy, Bruce, Steve Schlarman, and Rik Boren. "Enterprise Security Architecture." Information Systems Security 9, no. 2 (May 2000): 1–14. http://dx.doi.org/10.1201/1086/43309.9.2.20000506/31351.4.
Full textEloff, J. H. P., and M. M. Eloff. "Information security architecture." Computer Fraud & Security 2005, no. 11 (November 2005): 10–16. http://dx.doi.org/10.1016/s1361-3723(05)70275-x.
Full textMolva, Refik. "Internet security architecture." Computer Networks 31, no. 8 (April 1999): 787–804. http://dx.doi.org/10.1016/s1389-1286(98)00016-4.
Full textShobowale, K. O., Z. Mukhtar, B. Yahaya, Y. Ibrahim, and M. O. Momoh. "Latest Advances on Security Architecture for 5GTechnology and Services." International Journal of Software Engineering and Computer Systems 9, no. 1 (January 31, 2023): 27–38. http://dx.doi.org/10.15282/ijsecs.9.1.2023.3.0107.
Full textTrinath Basu, M., and Dr JKR Sastry. "A fully security included Cloud Computing Architecture." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 807. http://dx.doi.org/10.14419/ijet.v7i2.7.10984.
Full textHan, So-Ra, and Mason Noah. "Android Mobile Guardian System Security Architecture for Handset and Data Security." Bonfring International Journal of Industrial Engineering and Management Science 7, no. 1 (March 31, 2017): 25–28. http://dx.doi.org/10.9756/bijiems.8323.
Full textAlshammari, Bandar M. "Security Assessment Model for Database Relational Designs." Journal of Medical Imaging and Health Informatics 9, no. 6 (August 1, 2019): 1171–80. http://dx.doi.org/10.1166/jmihi.2019.2715.
Full textMusthafa, Mohamed. "AN ENHANCED LID ROUTING SECURITY SCHEME FOR MOBILE AD-HOC NETWORKS." JOURNAL OF ADVANCES IN CHEMISTRY 12, no. 11 (June 16, 2016): 4549–56. http://dx.doi.org/10.24297/jac.v12i11.821.
Full textAldea, Constantin Lucian, Razvan Bocu, and Anca Vasilescu. "Relevant Cybersecurity Aspects of IoT Microservices Architectures Deployed over Next-Generation Mobile Networks." Sensors 23, no. 1 (December 24, 2022): 189. http://dx.doi.org/10.3390/s23010189.
Full textK.Sai Manoj, Dr, Ms K.Mrudula, G. Maanasa, and K. Phani Srinivas. "Conceptual oriented study on the cloud computing architecture for the full-security." International Journal of Engineering & Technology 7, no. 4 (September 24, 2018): 2491. http://dx.doi.org/10.14419/ijet.v7i4.11654.
Full textS. S., Manikandasaran, and Raja S. "Security Architecture for multi-Tenant Cloud Migration." International Journal of Future Computer and Communication 7, no. 2 (June 2018): 42–45. http://dx.doi.org/10.18178/ijfcc.2018.7.2.518.
Full textMarelli, Francesco. "Rethinking security governance: a new security architecture." Freedom from Fear 2014, no. 9 (March 11, 2011): 86–89. http://dx.doi.org/10.18356/54e58eed-en.
Full textDerdour, Makhlouf, Adel Alti, Mohamed Gasmi, and Philippe Roose. "Security architecture metamodel for Model Driven security." Journal of Innovation in Digital Ecosystems 2, no. 1-2 (December 2015): 55–70. http://dx.doi.org/10.1016/j.jides.2015.12.001.
Full textHilaluddin, Kholilah, and Mohd Zhafri Mohd Zukhi. "Security Architecture for MANETs." International Innovative Research Journal of Engineering and Technology 5, no. 2 (December 30, 2019): 44–50. http://dx.doi.org/10.32595/iirjet.org/v5i2.2019.103.
Full textEmmers, Ralf. "Asia's Evolving Security Architecture." Asia Policy 27, no. 1 (2020): 128–30. http://dx.doi.org/10.1353/asp.2020.0009.
Full textGong, Li. "Java Security Architecture Revisited." Queue 9, no. 9 (September 2011): 30–36. http://dx.doi.org/10.1145/2030256.2034639.
Full textGong, Li. "Java security architecture revisited." Communications of the ACM 54, no. 11 (November 2011): 48–52. http://dx.doi.org/10.1145/2018396.2018411.
Full textHayday, John. "Windows NT security architecture." Information Security Technical Report 3, no. 3 (January 1998): 15–22. http://dx.doi.org/10.1016/s1363-4127(98)80027-7.
Full textHayday, John. "Windows NT security architecture." Information Security Technical Report 4 (January 1999): 17–18. http://dx.doi.org/10.1016/s1363-4127(99)80038-7.
Full textGluck, Fredric B. "The Open Security Architecture." Information Management & Computer Security 1, no. 3 (March 1993): 4–11. http://dx.doi.org/10.1108/eum0000000001704.
Full textMuftic, Sead. "Extended OSI security architecture." Computer Networks and ISDN Systems 17, no. 3 (September 1989): 223–27. http://dx.doi.org/10.1016/0169-7552(89)90085-8.
Full textBlumenthal, Uri, Michael Marcovici, Semyon Mizikovsky, Sarvar Patel, Ganapathy S. Sundaram, and Marcus Wong. "Wireless network security architecture." Bell Labs Technical Journal 7, no. 2 (December 2, 2002): 19–36. http://dx.doi.org/10.1002/bltj.10003.
Full textR, Jithin, and Priya Chandran. "Secure and Dynamic Memory Management Architecture for Virtualization Technologies in IoT Devices." Future Internet 10, no. 12 (November 30, 2018): 119. http://dx.doi.org/10.3390/fi10120119.
Full textYeşiltepe, Mirsat, and Ömer Özgür Bozkurt. "Security Type Comparison in Service Oriented Architecture Security." Procedia - Social and Behavioral Sciences 195 (July 2015): 1833–39. http://dx.doi.org/10.1016/j.sbspro.2015.06.402.
Full textPatel, Kajal, and Mihir Mehta. "An Outlook Architecture." International Journal of Software Innovation 11, no. 1 (January 6, 2023): 1–20. http://dx.doi.org/10.4018/ijsi.315744.
Full textHeinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, Stefan Katzenbeisser, Neeraj Suri, Henk Birkholz, Andreas Fuchs, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.
Full textSemenov, N. A., and A. A. Poltavtsev. "Cloud-Based Data Architecture Security." Automatic Control and Computer Sciences 53, no. 8 (December 2019): 1056–64. http://dx.doi.org/10.3103/s0146411619080285.
Full textTominaga, Hideyoshi. "Trends of security network architecture." IEEJ Transactions on Industry Applications 110, no. 9 (1990): 941–43. http://dx.doi.org/10.1541/ieejias.110.941.
Full textChan, Vincent W. S. "Multi-Layer Network Security Architecture." IEEE Communications Magazine 58, no. 12 (December 2020): 4. http://dx.doi.org/10.1109/mcom.2020.9311934.
Full textMirhakkak, Mohammad. "A distributed system security architecture." ACM SIGCOMM Computer Communication Review 23, no. 5 (October 1993): 6–16. http://dx.doi.org/10.1145/165611.165613.
Full textOlivier, Martin S. "Towards a configurable security architecture." Data & Knowledge Engineering 38, no. 2 (August 2001): 121–45. http://dx.doi.org/10.1016/s0169-023x(01)00019-2.
Full textShirey, Robert W. "Defense data network security architecture." ACM SIGCOMM Computer Communication Review 20, no. 2 (April 1990): 66–72. http://dx.doi.org/10.1145/378570.378710.
Full textTOW, WILLIAM T., and BRENDAN TAYLOR. "What is Asian security architecture?" Review of International Studies 36, no. 1 (January 2010): 95–116. http://dx.doi.org/10.1017/s0260210509990520.
Full textMuftic, Sead, and Morris Sloman. "Security architecture for distributed systems." Computer Communications 17, no. 7 (July 1994): 492–500. http://dx.doi.org/10.1016/0140-3664(94)90104-x.
Full textHunter, Philip. "Network security architecture without perimeters." Network Security 2002, no. 12 (December 2002): 1–2. http://dx.doi.org/10.1016/s1353-4858(02)12001-0.
Full textAl-Hawamde, Al-Muthanna, Adil Khan, and M. Sikander Hayat Khiyal. "IPSec Based Bluetooth Security Architecture." Information Technology Journal 6, no. 4 (May 1, 2007): 478–89. http://dx.doi.org/10.3923/itj.2007.478.489.
Full textLi, Kaisheng. "Future Security Architecture in Asia." China Quarterly of International Strategic Studies 01, no. 04 (December 2015): 553–72. http://dx.doi.org/10.1142/s2377740015500256.
Full textWiersma, Jan Marinus. "European Security Architecture at Risk?" Security and Human Rights 25, no. 3 (December 31, 2014): 345–54. http://dx.doi.org/10.1163/18750230-02503009.
Full textde Haas, Marcel. "Medvedev's alternative European security architecture." Security and Human Rights 21, no. 1 (2010): 45–48. http://dx.doi.org/10.1163/187502310791306070.
Full textBurkett, Jason S. "Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA®." Information Security Journal: A Global Perspective 21, no. 1 (January 2012): 47–54. http://dx.doi.org/10.1080/19393555.2011.629341.
Full textSingh, Amit Kumar, and Geeta Chhabra Gandhi. "Computer Architecture." International Journal of Smart Security Technologies 7, no. 1 (January 2020): 41–48. http://dx.doi.org/10.4018/ijsst.2020010103.
Full textPelc, Mariusz, and Dawid Galus. "Adaptation Architecture for Self-Healing Computer Systems." International Journal of Software Engineering and Knowledge Engineering 27, no. 05 (June 2017): 791–815. http://dx.doi.org/10.1142/s0218194017500292.
Full textPreschern, Christopher, Nermin Kajtazovic, Andrea Höller, and Christian Kreiner. "Quantitative Security Estimation Based on Safety Architecture Design Patterns." Lecture Notes on Software Engineering 2, no. 4 (2014): 307–13. http://dx.doi.org/10.7763/lnse.2014.v2.141.
Full textYousuf, Omerah, and Roohie Naaz Mir. "A survey on the Internet of Things security." Information & Computer Security 27, no. 2 (June 12, 2019): 292–323. http://dx.doi.org/10.1108/ics-07-2018-0084.
Full text