Journal articles on the topic 'Security Components'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security Components.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ugli, Yokubjonov Sardorbek Sobitzhon. "INFORMATION SECURITY AND ITS COMPONENTS." International Journal of Advance Scientific Research 05, no. 12 (2024): 302–11. https://doi.org/10.37547/ijasr-04-12-47.
Full textMetodieva, Tsvetelina, and Iliana Simeonova. "MIGRATION SECURITY AS A COMPONENT OF CORPORATE SECURITY." Journal Scientific and Applied Research 27, no. 1 (2024): 163–69. http://dx.doi.org/10.46687/jsar.v27i1.416.
Full textWood, Charles Cresson, and Howard M. Zeidler. "Security modules: Potent information security system components." Computers & Security 5, no. 2 (1986): 114–21. http://dx.doi.org/10.1016/0167-4048(86)90133-1.
Full textBaranovskyi, О. І., and M. O. Moroz. "INVESTMENT COMPONENTS OF FINANCIAL SECURITY." Financial and credit activity: problems of theory and practice 1, no. 22 (2017): 46–59. http://dx.doi.org/10.18371/fcaptp.v1i22.109926.
Full textFilippov, D. L. "Components of physical security risk." Issues of Risk Analysis 16, no. 4 (2019): 82–93. http://dx.doi.org/10.32686/1812-5220-2019-16-4-82-93.
Full textQun Zhong and N. Edwards. "Security control for COTS components." Computer 31, no. 6 (1998): 67–73. http://dx.doi.org/10.1109/2.683010.
Full textGanna, Smokvina, and Yankovska Olga. "Personnel security of the industrial enterprise: essence, components and measures of threats minimization." Economic journal Odessa polytechnic university 1, no. 7 (2019): 38–45. https://doi.org/10.5281/zenodo.3402729.
Full textПрядко, И. П., and С. А. Мудрак. "Food security and its main components." Экономика и предпринимательство, no. 10(123) (November 15, 2020): 1097–105. http://dx.doi.org/10.34925/eip.2020.123.10.218.
Full textHavas, Karyn, and Mo Salman. "Food security: its components and challenges." International Journal of Food Safety, Nutrition and Public Health 4, no. 1 (2011): 4. http://dx.doi.org/10.1504/ijfsnph.2011.042571.
Full textMeyer, Helen. "Security gap uncovered in ActiveX components." Computers & Security 15, no. 6 (1996): 516. http://dx.doi.org/10.1016/s0167-4048(97)83130-6.
Full textFeiten, Linus, Matthias Sauer, Tobias Schubert, Victor Tomashevich, Ilia Polian, and Bernd Becker. "Formal Vulnerability Analysis of Security Components." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34, no. 8 (2015): 1358–69. http://dx.doi.org/10.1109/tcad.2015.2448687.
Full textDoroudi, Fariborz, and Zeinab Jamshidi. "Measuring Information Security Components in Accessing and Using Digital Libraries." Journal of Information Processing and Management 37, no. 1 (2021): 117–33. https://doi.org/10.5281/zenodo.14035000.
Full textLiu, Zhijian, Zihan Shen, Hongfei Wang, and Qianjia Zou. "Ethereum Security Based on Blockchain Framework and its Algorithms and Components." Highlights in Science, Engineering and Technology 60 (July 25, 2023): 128–37. http://dx.doi.org/10.54097/hset.v60i.10348.
Full textLebedeva, Marina M. "Humanitarian and Social Components of International Security." RUDN Journal of Political Science 24, no. 2 (2022): 187–99. http://dx.doi.org/10.22363/2313-1438-2022-24-2-187-199.
Full textFasae, Felicia Bosede Kehinde. "Human and Technology Components in Data/Information Security." European Journal of Computer Science and Information Technology 12, no. 2 (2024): 93–107. http://dx.doi.org/10.37745/ejcsit.2013/vol12n293107.
Full textNeustroiev, Y. "COMPONENTS OF ECONOMIC SECURITY OF THE STATE." Investytsiyi: praktyka ta dosvid, no. 4 (March 2, 2021): 56. http://dx.doi.org/10.32702/2306-6814.2021.4.56.
Full textRybalchenko, O. M. "PSYCHOLOGICAL THREATS ARE COMPONENTS OF PERSONAL SECURITY." Habitus, no. 32 (2021): 104–9. http://dx.doi.org/10.32843/2663-5208.2021.32.17.
Full textConrad, Jennifer, Gautam Kaul, and M. Nimalendran. "Components of short-horizon individual security returns." Journal of Financial Economics 29, no. 2 (1991): 365–84. http://dx.doi.org/10.1016/0304-405x(91)90007-7.
Full textKhachatryan, Robert, and Frida Hakobyan. "Educational Security as a Component of National Security Protection." Public Administration, no. 5 (October 3, 2017): 99–106. https://doi.org/10.5281/zenodo.5546240.
Full textМикола Володмирович Кордон. "ENERGY SECURITY AS A COMPONENT OF NATIONAL SECURITY." Intermarum history policy culture, no. 5 (January 1, 2018): 332–40. http://dx.doi.org/10.35433/history.111824.
Full textEisenstein, Marie A., and April K. Clark. "Political Tolerance, Psychological Security, and Religion: Disaggregating the Mediating Influence of Psychological Security." Politics and Religion 7, no. 2 (2014): 287–317. http://dx.doi.org/10.1017/s1755048314000054.
Full textFahmida, Rahman, and Arozullah Mohammed. "REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PHYSICAL LEVEL." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 01–21. https://doi.org/10.5281/zenodo.4400051.
Full textAl-Mansour, Abdul Majeed. "Security in Islam - its Components, Importance, and Threats -." Islamic Sciences Journal 12, no. 8 (2023): 260–88. http://dx.doi.org/10.25130/jis.21.12.8.12.
Full textMohammed, Jassem Al-Sarraf. "Cyber Security and its role in achieving the future visions of the State of Kuwait." International Journal of Computer Science and Information Technology Research 11, no. 2 (2023): 60–70. https://doi.org/10.5281/zenodo.7923877.
Full textSvilicic, Boris, Igor Rudan, Vlado Frančić, and Mateo Doričić. "Shipboard ECDIS Cyber Security." Pomorstvo 33, no. 2 (2019): 176–80. http://dx.doi.org/10.31217/p.33.2.7.
Full textCherchyk, Artur Olehovych. "ESSENCE AND MECHANISM COMPONENTS OF FOREST ENTERPRISES ECOLOGICAL AND ECONOMIC SECURITY PROVISION." SCIENTIFIC BULLETIN OF POLISSIA 2, no. 3(11) (2017): 108–12. http://dx.doi.org/10.25140/2410-9576-2017-2-3(11)-108-112.
Full textIryna, Zaichko. "ASSESSMENT OF THE ROLE OF THE BUDGET COMPONENT IN FINANCIAL SECURITY." ISSN 2353-8406 Knowledge, Education, Law, Management 2019 № 3/4 (27/28) (December 15, 2019): 205–13. https://doi.org/10.5281/zenodo.3833701.
Full textHrybinenko, Olha. "Conceptual models of economic security as a polystructural system." Economics: time realities 2, no. 48 (2020): 22–29. https://doi.org/10.5281/zenodo.3976834.
Full textHordiienko, Serhii. "Components of security of Ukrainian statehood by sphere of its existence." Legal Ukraine, no. 9 (October 30, 2020): 6–17. http://dx.doi.org/10.37749/2308-9636-2020-9(213)-1.
Full textMYRTA, Rexhina. "National and Civil Security in Kosovo – Premises, Components, Challenges, and Risks." Jus & Justicia 18, no. 1 (2024): 39–64. http://dx.doi.org/10.58944/kgny9883.
Full textRastogi, Rahul, and Rossouw von Solms. "IT Security for SCADA." International Journal of Cyber Warfare and Terrorism 5, no. 3 (2015): 19–27. http://dx.doi.org/10.4018/ijcwt.2015070102.
Full textKHALIDI, AHMAD S. "Security in a final Middle East settlement: some components of Palestinian national security." International Affairs 71, no. 1 (1995): 1–18. http://dx.doi.org/10.2307/2624007.
Full textChoi, Sung Ja, Sang Soo Choi, and Gang Soo Lee. "A Study on Utilization of CC Security Function Components in IT Security Products." KIPS Transactions:PartC 12C, no. 2 (2005): 207–16. http://dx.doi.org/10.3745/kipstc.2005.12c.2.207.
Full textMa, Yuanyuan, Mu Chen, and Tao Zhang. "Virtualization Construction of Security Components of Edge IoT Agent Based on Security Requirements." Journal of Physics: Conference Series 1617 (August 2020): 012076. http://dx.doi.org/10.1088/1742-6596/1617/1/012076.
Full textDOVHAN, O. "Modern information structures as components of information security." INFORMATION AND LAW, no. 2(14) (August 19, 2015): 111–20. http://dx.doi.org/10.37750/2616-6798.2015.2(14).272705.
Full textVarenyk, Victoria M., Iryna M. Miro, and Zoia S. Pestovska. "THE ESSENCE AND COMPONENTS OF THREATS TO THE ECONOMIC SECURITY OF HIGHER EDUCATION INSTITUTIONS." Academy Review 1, no. 62 (2025): 149–63. https://doi.org/10.32342/3041-2137-2025-1-62-11.
Full textSalamat, Adel. "The Role of Judicial Components in Economic Security." Management 5, no. 1 (2022): 1. http://dx.doi.org/10.31058/j.mana.2022.51001.
Full textHrybinenko, O. "INTERNATIONAL ECONOMIC SECURITY: DETERMINANTS AND COMPONENTS OF DEVELOPMENT." Ekonomika ta derzhava, no. 12 (December 30, 2019): 121. http://dx.doi.org/10.32702/2306-6806.2019.12.121.
Full textPantoja, Javier Mascorro, Ricardo Luna Carlos, Ilda Díaz Ramos, et al. "CREATION OF DIGITAL SECURITY COMPONENTS FROM ELECTROENCEPHALOGIC SIGNALS." Journal of Engineering Research 2, no. 14 (2022): 2–6. http://dx.doi.org/10.22533/at.ed.3172142206071.
Full textQuester, George H. "Components of a Course on National Security Policy." Teaching Political Science 14, no. 3 (1987): 110–19. http://dx.doi.org/10.1080/00922013.1987.9942618.
Full textRonad, Amith. "INDUSTRIAL IOT NETWORKS: ARCHITECTURE, COMPONENTS, AND SECURITY CONSIDERATIONS." INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY 16, no. 1 (2025): 2163–82. https://doi.org/10.34218/ijcet_16_01_155.
Full textScherb, Igor. "KEY MARKERS OF COMPONENTS OF ECONOMIC SECURITY OF THE STATE." Regional’ni aspekti rozvitku produktivnih sil Ukraїni, no. 25 (2020): 56–65. http://dx.doi.org/10.35774/rarrpsu2020.25.056.
Full textTITENKO, Z.M. "The mechanism of managing the financial security of the enterprise." Market Relations Development in Ukraine №11(258)2022 119 (February 9, 2023): 85–90. https://doi.org/10.5281/zenodo.7624520.
Full textCibulnyk, N. Yu. "Informational and legal characteristics of the main components of the state security sector." Uzhhorod National University Herald. Series: Law 1, no. 80 (2024): 607–12. http://dx.doi.org/10.24144/2307-3322.2023.80.1.93.
Full textBAK, Nataliia. "FINANCIAL SECURITY OF TERRITORIAL COMMUNITIES IN UKRAINE: CONTENT, COMPONENTS, THREATS." WORLD OF FINANCE, no. 1(58) (2019): 98–110. http://dx.doi.org/10.35774/sf2019.01.098.
Full textSuraev, Egor Petrovich, Victoriia Vyacheslavovna Egorova, and Alexey Sergeevich Panov. "Platform for Automatic Fuzzing of OS Components." Proceedings of the Institute for System Programming of the RAS 36, no. 3 (2024): 167–88. http://dx.doi.org/10.15514/ispras-2024-36(3)-12.
Full textUsman, Sahnius, Shahnurin Khanam Sanchi, Muhammad Idris, and Sadiq Abubakar Zagga. "SECURING IOT HEALTHCARE APPLICATIONS AND BLOCKCHAIN: ADDRESSING SECURITY ATTACKS." International Journal of Software Engineering and Computer Systems 9, no. 2 (2023): 119–28. http://dx.doi.org/10.15282/ijsecs.9.2.2023.5.0116.
Full textBĂLĂCEANU, Ioan. "THE OPERATIONAL COMPONENTS OF THE DEFENSE, NATIONAL SECURITY, AND PUBLIC ORDER INTEGRATED SYSTEM." Review of the Air Force Academy 14, no. 1 (2016): 71–76. http://dx.doi.org/10.19062/1842-9238.2016.14.1.10.
Full textSUKHANOVA, Alla V. "MAIN COMPONENTS AND PRINCIPLES OF ECONOMIC SECURITY OF AGRARIAN ENTERPRISES." Ukrainian Journal of Applied Economics, no. 2 (2019): 97–103. http://dx.doi.org/10.36887/2415-8453-2019-2-11.
Full textKhalina, Veronika, and Ilona Bilanchuk. "COMPONENTS OF FINANCIAL AND ECONOMIC SECURITY OF SUBJECTS OF GOVERNMENT." Scientific Notes of Ostroh Academy National University, "Economics" Series 1, no. 31(59) (2023): 42–47. http://dx.doi.org/10.25264/2311-5149-2023-31(59)-42-47.
Full text