Academic literature on the topic 'Security current'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security current.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security current"
Hwang, Yong-Woon, Im-Yeong Lee, Hwankuk Kim, Hyejung Lee, and Donghyun Kim. "Current Status and Security Trend of OSINT." Wireless Communications and Mobile Computing 2022 (February 18, 2022): 1–14. http://dx.doi.org/10.1155/2022/1290129.
Full textTagarev, Todor. "Theory and Current Practice of Deterrence in International Security." Connections: The Quarterly Journal 18, no. 1-2 (2019): 5–10. http://dx.doi.org/10.11610/connections.18.1-2.00.
Full textPonomarenko, Tetiana, Olha Prokopenko, Halyna Kuzmenko, Tetiana Kaminska, and Marharyta Luchyk. "Banking security of Ukraine: current state and ways to improve." Banks and Bank Systems 13, no. 2 (2018): 77–88. http://dx.doi.org/10.21511/bbs.13(2).2018.07.
Full textMiyachi, Toshio. "Current Trends on Network Security." IEEJ Transactions on Electronics, Information and Systems 124, no. 8 (2004): 1521–26. http://dx.doi.org/10.1541/ieejeiss.124.1521.
Full textPark, J. S., and D. Dicoi. "WLAN security: Current and future." IEEE Internet Computing 7, no. 5 (2003): 60–65. http://dx.doi.org/10.1109/mic.2003.1232519.
Full textSyhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.
Full textSyhyda, L., and A. Bondarenko. "World food security: current state." Galic'kij ekonomičnij visnik 71, no. 4 (2021): 151–60. http://dx.doi.org/10.33108/galicianvisnyk_tntu2021.04.151.
Full textPASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.
Full textGABOR, Gabriel, Doina MURESAN, Laura UNGUREANU, and Alexandru CRISTIAN. "PROMOTING SECURITY INTERESTS OF ROMANIA IN THE CURRENT GEOSTRATEGIC CONTEXT." Review of the Air Force Academy 13, no. 3 (2015): 123–28. http://dx.doi.org/10.19062/1842-9238.2015.13.3.21.
Full textBrandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.
Full textDissertations / Theses on the topic "Security current"
Carlsson, Fredrik, and Klas-Göran Eriksson. "Comparison of security level and current consumption of security implementations for MQTT." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40760.
Full textKashfi, Hamid. "Evaluation of Current Practical Attacks Against RFID Technology." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37766.
Full textGao, Li Li. "Security in VoIP-Current Situation and Necessary Development." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7921.
Full textAshenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.
Full textZahidi, Salman. "Biometrics - Evaluation of Current Situation." Thesis, Linköpings universitet, Informationskodning, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73230.
Full textBuzdugan, Maria. "Current and emerging air cargo security and facilitation issues." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99128.
Full textQiang, Hao. "E-book Security: An Analysis of Current Protection Systems." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1876.
Full textHorvat, Marko. "Formal analysis of modern security protocols in current standards." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:64d55401-82e1-4fb9-ad0b-73caf2236595.
Full textHove, Cathrine, and Marte Tårnes. "Information Security Incident Management : An Empirical Study of Current Practice." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22651.
Full textYousef, Paul. "GSM-Security: A Survey and Evaluation of the Current Situation." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2273.
Full textBooks on the topic "Security current"
Dutta, Nitul, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, and Emil Pricop. Cyber Security: Issues and Current Trends. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6597-4.
Full textMcCormack, Richard T. Current challenges facing the OAS. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.
Find full textLiebman, Jeffrey B. Redistribution in the current U.S. Social Security system. National Bureau of Economic Research, 2001.
Find full textInstitute for Defence Studies and Analyses, ed. Current issues in climate change. Institute for Defence Studies & Analyses, 2014.
Find full textDavis, Terry Lee. Commercial Aviation Cyber Security: Current State and Essential Reading. SAE International, 2016. http://dx.doi.org/10.4271/pt-179.
Full textTurner, Sean H. Implementing email security and tokens: Current standards, tools, and practices. Wiley, 2008.
Find full textMcCormack, Richard T. Current challenges facing the OAS. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.
Find full textMcCormack, Richard T. Current challenges facing the OAS. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1985.
Find full textCurrent and emerging trends in cyber operations: Policy, strategy and practice. Palgrave Macmillan, 2015.
Find full textBook chapters on the topic "Security current"
Lakshmi, Vasantha. "Current State of Security." In Beginning Security with Microsoft Technologies. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4853-9_1.
Full textMacbean, Alasdair I. "Achieving Food Security." In Current Issues in Development Economics. Macmillan Education UK, 1991. http://dx.doi.org/10.1007/978-1-349-21587-4_4.
Full textBaseley-Walker, Ben. "Current international space security initiatives." In The Fair and Responsible Use of Space. Springer Vienna, 2010. http://dx.doi.org/10.1007/978-3-211-99653-9_10.
Full textRao, Umesh Hodeghatta, and Umesha Nayak. "Current Trends in Information Security." In The InfoSec Handbook. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6383-8_16.
Full textKuszewska, Agnieszka. "Current security and economic dynamics." In Law and Conflict Resolution in Kashmir. Routledge, 2022. http://dx.doi.org/10.4324/9781003196549-19.
Full textGillespie, Anna. "Current Nuclear Programmes in Third World Countries." In Plutonium and Security. Palgrave Macmillan UK, 1992. http://dx.doi.org/10.1007/978-1-349-11693-5_8.
Full textLambrinoudakis, Costas, Dimitris Gritzalis, Vassilis Tsoumas, Maria Karyda, and Spyros Ikonomopoulos. "Secure Electronic Voting: the Current Landscape." In Advances in Information Security. Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0239-5_7.
Full textFarahmandi, Farimah, Yuanwen Huang, and Prabhat Mishra. "Trojan Detection Using Dynamic Current Analysis." In System-on-Chip Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30596-3_10.
Full textJacobs, Stuart. "Security of Current Mobile IP Solutions." In Advances in Database Technologies. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-49121-7_28.
Full textKaranja, Daniel D. "Securing Africa’s Food Security: Current Constraints and Future Options." In New Security Threats and Crises in Africa. Palgrave Macmillan US, 2010. http://dx.doi.org/10.1057/9780230115538_6.
Full textConference papers on the topic "Security current"
Brookson, C. B. "Security in current systems." In IEE Colloquium on Security in Networks. IEE, 1995. http://dx.doi.org/10.1049/ic:19950131.
Full text"INFORMATION SECURITY PROBLEMS IN BANKING." In Current Issue of Law in the Banking Sphere. Samara State Economic University, 2019. http://dx.doi.org/10.46554/banking.forum-10.2019-21/26.
Full textRogers, Leslie A. "Current best estimates of planet populations." In SPIE Defense + Security, edited by Thomas George, Achyut K. Dutta, and M. Saif Islam. SPIE, 2016. http://dx.doi.org/10.1117/12.2223920.
Full textTamošiūnienė, Rima, and Corneliu Munteanu. "Current research approaches to economic security." In 1st International Conference on Business Management. Editorial Universitat Politècnica de València, 2015. http://dx.doi.org/10.4995/icbm.2015.1537.
Full textZhang, Jian, Huaijian Chen, Liangyi Gong, Jing Cao, and Zhaojun Gu. "The Current Research of IoT Security." In 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC). IEEE, 2019. http://dx.doi.org/10.1109/dsc.2019.00059.
Full textPattanayak, Animesh, and Matt Kirkland. "Current Cyber Security Challenges in ICS." In 2018 IEEE International Conference on Industrial Internet (ICII). IEEE, 2018. http://dx.doi.org/10.1109/icii.2018.00013.
Full textAbba, Abdullahi Lawal, Mohammed Awad, Zakaria Al-Qudah, and Abdul Halim Jallad. "Security analysis of current voting systems." In 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA). IEEE, 2017. http://dx.doi.org/10.1109/icecta.2017.8252006.
Full textEslahi, Meisam, Maryam Var Naseri, H. Hashim, N. M. Tahir, and Ezril Hisham Mat Saad. "BYOD: Current state and security challenges." In 2014 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE, 2014. http://dx.doi.org/10.1109/iscaie.2014.7010235.
Full text"SECURITY CONSIDERATIONS IN CURRENT VOIP PROTOCOLS." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2006. http://dx.doi.org/10.5220/0002098601830191.
Full text"ASSIGNMENT OF RIGHTS FROM NOTARIAL SECURITY AGREEMENTS." In Current Issue of Law in the Banking Sphere. Samara State Economic University, 2019. http://dx.doi.org/10.46554/banking.forum-10.2019-204/208.
Full textReports on the topic "Security current"
Wayne F. Boyer and Scott A. McBride. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/957512.
Full textLiebman, Jeffrey. Redistribution in the Current U.S. Social Security System. National Bureau of Economic Research, 2001. http://dx.doi.org/10.3386/w8625.
Full textRebo, Eero. Estonian National Security Strategy: Current and Future Challenges. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada590661.
Full textRolston. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research. Office of Scientific and Technical Information (OSTI), 2005. http://dx.doi.org/10.2172/911610.
Full textKaeo, M. Operational Security Current Practices in Internet Service Provider Environments. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4778.
Full textRassokha, Ekaterina. LEGAL PROBLEMS OF INTERNATIONAL SECURITY IN THE CURRENT ENVIRONMEN. Intellectual Archive, 2021. http://dx.doi.org/10.32370/iaj.2559.
Full textTodd, Frank P. Current National Space Security Trends and Implications for the Future. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada401672.
Full textFerwerda, Jeremy, Nazli Choucri, and Stuart Madnick. Institutional Foundations for Cyber Security: Current Responses and New Challenges. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada530584.
Full textFrancois, Isabelle. Whither the Medvedev Initiative on European Security? (Transatlantic Current, no. 3). Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada577605.
Full textMollahan, K., and L. Nattrass. Global Security Rule Sets An Analysis of the Current Global Security Environment and Rule Sets Governing Nuclear Weapons Release. Office of Scientific and Technical Information (OSTI), 2004. http://dx.doi.org/10.2172/15011427.
Full text