Journal articles on the topic 'Security Framework'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security Framework.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Szpyra, Ryszard. "Military Security within the Framework of Security Studies: Research Results." Connections: The Quarterly Journal 13, no. 3 (2014): 59–82. http://dx.doi.org/10.11610/connections.13.3.04.
Full textBalaji, K., and S. S. Manikandasaran. "Data Security and Deduplication Framework for Securing and Deduplicating Users’ Data in Public and Private Cloud Environment." Journal of Scientific Research 14, no. 1 (January 1, 2022): 153–65. http://dx.doi.org/10.3329/jsr.v14i1.54063.
Full textJain, Smriti, and Maya Ingle. "Generalized Software Security Framework." International Journal on Advanced Science, Engineering and Information Technology 1, no. 4 (2011): 413. http://dx.doi.org/10.18517/ijaseit.1.4.84.
Full textSterlicchi, John. "Security framework from Microsoft." Network Security 1996, no. 7 (July 1996): 7–8. http://dx.doi.org/10.1016/1353-4858(96)83735-4.
Full textK.N., Sunilkumar. "Security Framework for Physiological Signals Using Auto Encoder." Journal of Advanced Research in Dynamical and Control Systems 12, no. 01-Special Issue (February 13, 2020): 583–92. http://dx.doi.org/10.5373/jardcs/v12sp1/20201107.
Full textRizvi, Syed, Jungwoo Ryoo, John Kissell, William Aiken, and Yuhong Liu. "A security evaluation framework for cloud security auditing." Journal of Supercomputing 74, no. 11 (May 2, 2017): 5774–96. http://dx.doi.org/10.1007/s11227-017-2055-1.
Full textChangchit, Chuleeporn. "Security Systems Framework, Security-Related Research, Web Threats." Journal of Information Privacy and Security 7, no. 4 (October 2011): 1–2. http://dx.doi.org/10.1080/15536548.2011.10855920.
Full textLipiński, Bartosz, Wojciech Mazurczyk, Krzysztof Szczypiorski, and Piotr Śmietanka. "Towards Effective Security Framework for Vehicular Ad-Hoc Networks." Journal of Advances in Computer Networks 3, no. 2 (2015): 134–40. http://dx.doi.org/10.7763/jacn.2015.v3.155.
Full textPacheco, Jesus, Victor H. Benitez, and Zhiwen Pan. "Security Framework for IoT End Nodes with Neural Networks." International Journal of Machine Learning and Computing 9, no. 4 (August 2019): 381–86. http://dx.doi.org/10.18178/ijmlc.2019.9.4.814.
Full textCreado, Orhio Mark, Bala Srinivasan, Phu Dung Le, and Jeff Tan. "The Ideal Computing System Framework – A Novel Security Paradigm." SIJ Transactions on Computer Science Engineering & its Applications (CSEA) 02, no. 04 (August 7, 2014): 94–103. http://dx.doi.org/10.9756/sijcsea/v2i4/0203270402.
Full textPati, Sharanappa. "Isms Framework in Design and Analysis of Information Security." Paripex - Indian Journal Of Research 3, no. 7 (January 1, 2012): 215–17. http://dx.doi.org/10.15373/22501991/july2014/86.
Full textLee, Ji-Yong. "China’s Maritime Ambition, Security Dilemma and Lack of Multilateral Framework." Journal of Asian Security and International Affairs 8, no. 2 (July 28, 2021): 195–217. http://dx.doi.org/10.1177/23477970211017729.
Full textAtoum, Issa, Ahmed Otoom, and Amer Abu Ali. "A holistic cyber security implementation framework." Information Management & Computer Security 22, no. 3 (July 8, 2014): 251–64. http://dx.doi.org/10.1108/imcs-02-2013-0014.
Full textSun, Linhui, Xun Li, Jie Gao, and Fangming Cheng. "Does an Information System Security Notice Format Influence Users’ Compliance Willingness from the Perspective of the Framing Effect?" Information 14, no. 1 (January 9, 2023): 39. http://dx.doi.org/10.3390/info14010039.
Full textPathak, Vinay, Karan Singh, Sudhanshu Aggarwal, and Anshita Dhoot. "Ensuring security framework for WBANs." Journal of Discrete Mathematical Sciences and Cryptography 24, no. 3 (January 19, 2021): 697–710. http://dx.doi.org/10.1080/09720529.2020.1822542.
Full textMuhammad Sani, Habiba, and Muhammad Mika'ilu Yabo. "A Database System Security Framework." International Journal of Computer Science and Information Technology 7, no. 6 (December 31, 2015): 165–74. http://dx.doi.org/10.5121/ijcsit.2015.7614.
Full textAlqahtani, Jawaher. "Security Framework for Cloud Computing." IARJSET 6, no. 12 (December 30, 2019): 27–31. http://dx.doi.org/10.17148/iarjset.2019.61207.
Full textJing, Huiyun, Wei Wei, Chuan Zhou, and Xin He. "An Artificial Intelligence Security Framework." Journal of Physics: Conference Series 1948, no. 1 (June 1, 2021): 012004. http://dx.doi.org/10.1088/1742-6596/1948/1/012004.
Full textIORDACHE, Dorin. "INTERNET OF THINGS SECURITY FRAMEWORK." STRATEGIES XXI - Security and Defense Faculty 17, no. 1 (November 1, 2021): 287–93. http://dx.doi.org/10.53477/2668-2001-21-36.
Full textChemerkin, Yury. "Increasing Security Guidelines’ Framework Efficiency." International Journal for Information Security Research 3, no. 4 (December 1, 2013): 354–63. http://dx.doi.org/10.20533/ijisr.2042.4639.2013.0041.
Full textGulati, Aayush. "Proposing Security Requirement Prioritization Framework." International Journal of Computer Science, Engineering and Applications 2, no. 3 (June 30, 2012): 27–37. http://dx.doi.org/10.5121/ijcsea.2012.2303.
Full textVeiga, A. Da, and J. H. P. Eloff. "An Information Security Governance Framework." Information Systems Management 24, no. 4 (October 2, 2007): 361–72. http://dx.doi.org/10.1080/10580530701586136.
Full textChoi, Seongho, and Jin Kwak. "Enhanced SDIoT Security Framework Models." International Journal of Distributed Sensor Networks 12, no. 5 (January 2016): 4807804. http://dx.doi.org/10.1155/2016/4807804.
Full textYu, Yang, Yu Nan Wang, and Wei Yang. "Security Framework Based on SDN." Advanced Materials Research 989-994 (July 2014): 4690–93. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4690.
Full textPfleeger, Shari Lawrence. "A framework for security requirements." Computers & Security 10, no. 6 (October 1991): 515–23. http://dx.doi.org/10.1016/0167-4048(91)90076-p.
Full textKim, Geunhye, and Mina Shim. "System security manager education framework." International Journal of Services Technology and Management 23, no. 1/2 (2017): 64. http://dx.doi.org/10.1504/ijstm.2017.081877.
Full textKim, Geunhye, and Mina Shim. "System security manager education framework." International Journal of Services Technology and Management 23, no. 1/2 (2017): 64. http://dx.doi.org/10.1504/ijstm.2017.10002704.
Full textYousif, Samar Taha, and Zaid Abass Fadahl. "Proposed Security Framework for Mobile Data Management System." Journal of Engineering 27, no. 7 (July 1, 2021): 13–23. http://dx.doi.org/10.31026/j.eng.2021.07.02.
Full textRehman, Shafiq, and Volker Gruhn. "An Effective Security Requirements Engineering Framework for Cyber-Physical Systems." Technologies 6, no. 3 (July 12, 2018): 65. http://dx.doi.org/10.3390/technologies6030065.
Full textNur, Rofil M., Jufriadif Na'am, Gunadi Widi Nurcahyo, and Syafri Arlis. "Peningkatan Keamanan Website Menggunakan Metode XML dengan Framework Codeigniter." Indonesian Journal of Computer Science 8, no. 2 (October 31, 2019): 156–63. http://dx.doi.org/10.33022/ijcs.v8i2.188.
Full textAbdu Al-esaiy, Mohammad, and Nagi Ali Al-Shaibany. "ANALYSIS OF INFORMATION SECURITY MANAGEMENT SYSTEM FRAMEWORKS." International Journal of Computer Science and Mobile Computing 10, no. 11 (November 30, 2021): 29–46. http://dx.doi.org/10.47760/ijcsmc.2021.v10i11.005.
Full textSubramaniam, Chandrasekaran, and Vinod Duraivelu. "An Integrated Information Security Framework for a Product Development Center." Indian Journal of Applied Research 3, no. 12 (October 1, 2011): 204–6. http://dx.doi.org/10.15373/2249555x/dec2013/60.
Full textAlmomani, Iman, Mohanned Ahmed, and Leandros Maglaras. "Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia." PeerJ Computer Science 7 (September 9, 2021): e703. http://dx.doi.org/10.7717/peerj-cs.703.
Full textWang, Peng, and Li Ning Xing. "A Collaborative Framework for Information Security Management System Using Intelligent Multi-Agent." Key Engineering Materials 460-461 (January 2011): 428–32. http://dx.doi.org/10.4028/www.scientific.net/kem.460-461.428.
Full textHaufe, Knut, Ricardo Colomo-Palacios, Srdan Dzombeta, Knud Brandis, and Vladimir Stantchev. "A process framework for information security management." International Journal of Information Systems and Project Management 4, no. 4 (February 2, 2022): 27–47. http://dx.doi.org/10.12821/ijispm040402.
Full textPaleti, Tarun, Kiran Kumar, and Shaik Riyaz. "On-line examination system of security application." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 166. http://dx.doi.org/10.14419/ijet.v7i2.8.10351.
Full textSingh, Anuj Kumar, and B. D. K. Patro. "Signcryption-Based Security Framework for Low Computing Power Devices." Recent Advances in Computer Science and Communications 13, no. 5 (November 5, 2020): 845–57. http://dx.doi.org/10.2174/2213275912666190617161732.
Full text., Sanjeev Kumar Mandal. "ENHANCED SECURITY FRAMEWORK TO ENSURE DATA SECURITY IN CLOUD USING SECURITY BLANKET ALGORITHM." International Journal of Research in Engineering and Technology 02, no. 10 (October 25, 2013): 225–29. http://dx.doi.org/10.15623/ijret.2013.0210033.
Full textChandan, Madhavarapu, Sanakkayala Sri Venkat Sumanth, Garapati Samhita, and Kathi Priyanka Reddy. "Design & Development of a Home Security System Using IOT." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 374. http://dx.doi.org/10.14419/ijet.v7i2.32.15717.
Full textMokhtari, Fariborz. "Security in the Persian Gulf: Is a Security Framework Possible?" American Foreign Policy Interests 26, no. 1 (February 2004): 1–10. http://dx.doi.org/10.1080/10803920490425346.
Full textBhattacharyya, Anushree. "Understanding Security in Regionalism Framework: ASEAN Maritime Security in Perspective." Maritime Affairs:Journal of the National Maritime Foundation of India 6, no. 2 (December 2010): 72–89. http://dx.doi.org/10.1080/09733159.2010.559786.
Full textQuille, Gerrard. "The European Security Strategy: a framework for EU security interests?" International Peacekeeping 11, no. 3 (August 2004): 422–38. http://dx.doi.org/10.1080/1353331042000249028.
Full textPaulus, Erick, and Mochamad Azmi Fauzan. "A Framework to Ensure Data Integrity and Safety." Data Science: Journal of Computing and Applied Informatics 2, no. 1 (February 1, 2018): 1–11. http://dx.doi.org/10.32734/jocai.v2.i1-90.
Full textKaušpadienė, Laima, Simona Ramanauskaitė, and Antanas Čenys. "INFORMATION SECURITY MANAGEMENT FRAMEWORK SUITABILITY ESTIMATION FOR SMALL AND MEDIUM ENTERPRISE." Technological and Economic Development of Economy 25, no. 5 (June 20, 2019): 979–97. http://dx.doi.org/10.3846/tede.2019.10298.
Full textLima, António, Luis Rosa, Tiago Cruz, and Paulo Simões. "A Security Monitoring Framework for Mobile Devices." Electronics 9, no. 8 (July 25, 2020): 1197. http://dx.doi.org/10.3390/electronics9081197.
Full textShashwat, Anurag, Deepak Kumar, and Lovneesh Chanana. "A Framework with Enhanced Security for Service Oriented Architecture." International Journal of Sensors, Wireless Communications and Control 10, no. 3 (November 2, 2020): 325–33. http://dx.doi.org/10.2174/2210327909666190710122505.
Full textSingh, Arunabh. "Cyber Security Frameworks." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (January 31, 2022): 590–99. http://dx.doi.org/10.22214/ijraset.2022.39843.
Full textLiu, Ling Xia, Dong Xia Wang, Min Huan Huang, and Rui Zhang. "An Integrated Security Framework for SOA." Applied Mechanics and Materials 427-429 (September 2013): 2151–54. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2151.
Full textSomepalli, Sri Harsha, Sai Kishore Reddy Tangella, and Santosh Yalamanchili. "Information Security Management." HOLISTICA – Journal of Business and Public Administration 11, no. 2 (August 1, 2020): 1–16. http://dx.doi.org/10.2478/hjbpa-2020-0015.
Full textIbrahim, Maizura, Siti Nurbahyah Hamdan, Saa’idi Ismail, Mohd Fauzi Haris, Mohamad Safuan Sulaiman, Sufian Norazam Mohamed Aris, Mohd Hasnor Bin Hasan, Mohd Dzul Aiman Aslan, Nur Fatini Abdul Ghani, and Amy Hamijah Ab Hamid. "Big data analytics nuclear security framework." IOP Conference Series: Materials Science and Engineering 1106, no. 1 (March 1, 2021): 012026. http://dx.doi.org/10.1088/1757-899x/1106/1/012026.
Full text