Academic literature on the topic 'Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security measures"
Gunuganti, Anvesh, and Srikanth Mandru. "Securing Crypto Currency Exchanges: Implementing Cutting - Edge Security Measures for Enhanced Protection." International Journal of Science and Research (IJSR) 12, no. 1 (January 27, 2023): 1273–77. https://doi.org/10.21275/sr24531140255.
Full textMcCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (May 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Full textDr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures." Indian Journal of Applied Research 4, no. 4 (October 1, 2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.
Full textD'souza, Jason John, and Seeza Franklin. "Li-Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.
Full textGupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar, and Mohinder Singh. "Networking and Security Measures." DESIDOC Bulletin of Information Technology 24, no. 2 (March 1, 2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.
Full textRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (November 2002): 1. http://dx.doi.org/10.1145/763944.763945.
Full textRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (November 2002): 1. http://dx.doi.org/10.1145/763948.763945.
Full textStanton, Ray. "Weighing up security measures." Computer Fraud & Security 2006, no. 1 (January 2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.
Full textWood, Charles Cresson. "Floppy diskette security measures." Computers & Security 4, no. 3 (September 1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.
Full textLi, Yan. "Network Security Protection Measures." Advanced Materials Research 971-973 (June 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.
Full textDissertations / Theses on the topic "Security measures"
Paul, Philip Christopher. "Microelectronic security measures." Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611689.
Full textKing-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Full textSantos, Alvaro K. "Economic aspects of airport security measures." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366334.
Full textKavuluru, Ramakanth. "ANALYSIS OF SECURITY MEASURES FOR SEQUENCES." UKnowledge, 2009. http://uknowledge.uky.edu/gradschool_diss/735.
Full textMohsen, Rabih. "Quantitative measures for code obfuscation security." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/55180.
Full textCachin, Christian. "Entropy measures and unconditional security in cryptography /." [S.l.] : [s.n.], 1997. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=12187.
Full textRastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.
Full textAcharya, Gautam. "Legal aspects of aviation security measures taken at airports." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98600.
Full textCioranu, Adrian Gabriel. "Facilitation versus security." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=99131.
Full textNaude, Kevin Alexander. "Assessing program code through static structural similarity." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.
Full textBooks on the topic "Security measures"
Hakim, Simon. Commercial security: Burglary patterns and security measures. Washington, DC (1801 K St., NW, Suite 1203L, Washington 20006-1301): Security Industry Association, 1994.
Find full textParsons, Brinckerhoff Quade &. Douglas. Transportation security. Washington, D.C: Transportation Research Board, 2006.
Find full textCorporation, Science Applications International. Security Measures for Ferry Systems. Washington, D.C.: Transportation Research Board, 2006. http://dx.doi.org/10.17226/13927.
Full textUnited States. Federal Transit Administration., United States. Federal Highway Administration., National Research Council (U.S.). Transportation Research Board., National Cooperative Highway Research Program., Transit Cooperative Research Program, Transit Development Corporation, and American Association of State Highway and Transportation Officials., eds. Transportation security. Washington, D.C: Transportation Research Board, 2006.
Find full textBrooksbank, David. Security manual. 7th ed. Aldershot, Hampshire, England: Gower, 1999.
Find full textFrazier, Ernest R. Surface transportation security: Security 101 : a physical security primer for transportation agencies. Washington, D.C: Transportation Research Board, 2009.
Find full textBook chapters on the topic "Security measures"
Combs, Cynthia C. "Security Measures." In Terrorism in the Twenty-First Century, 386–419. 9th ed. New York: Routledge, 2022. http://dx.doi.org/10.4324/9781003211594-17.
Full textJohnson, Ross. "Security Measures." In Antiterrorism and Threat Response, 94–133. 2nd ed. New York: CRC Press, 2020. https://doi.org/10.4324/9781003374015-7.
Full textThompson, Eric C. "Selecting Security Measures." In Building a HIPAA-Compliant Cybersecurity Program, 27–51. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3060-2_3.
Full textDas, Satya P. "Security." In Economics of Terrorism and Counter-Terrorism Measures, 369–407. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96577-8_8.
Full textBrauner, Florian. "Acceptance of Security Measures." In Securing Public Transportation Systems, 33–113. Wiesbaden: Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-15306-9_4.
Full textMcLean, John. "Quantitative Measures of Security." In Dependable Computing and Fault-Tolerant Systems, 223–26. Vienna: Springer Vienna, 1995. http://dx.doi.org/10.1007/978-3-7091-9396-9_18.
Full textMartin, Paul. "In-trust measures." In Insider Risk and Personnel Security, 89–104. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-11.
Full textMartin, Paul. "Pre-trust measures." In Insider Risk and Personnel Security, 76–88. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003329022-10.
Full textSmoke, Richard. "Crisis Control Measures." In Nuclear Strategy and World Security, 28–39. London: Palgrave Macmillan UK, 1985. http://dx.doi.org/10.1007/978-1-349-17878-0_4.
Full textBeck, Adrian, and Andrew Willis. "Existing Security Measures: An Audit." In Crime and Security, 97–123. London: Palgrave Macmillan UK, 2006. http://dx.doi.org/10.1057/9780230377868_5.
Full textConference papers on the topic "Security measures"
R.Tamilkodi, Mrs.A.Harika, Mogalapalli Harika, P. Venkata Sai Abhilash, Chenagana Harish Sai, and Pranav Ps. "Enhanced Security Measures Against Phishing Threats." In 2024 5th International Conference on Data Intelligence and Cognitive Informatics (ICDICI), 62–67. IEEE, 2024. https://doi.org/10.1109/icdici62993.2024.10810772.
Full textQin, Qiu, Xu Sijia, Liu Shenglan, Xu Tianni, and Zhao Bei. "Network Virtualization Security: Threats, Measures, and Use Cases." In 2024 ITU Kaleidoscope: Innovation and Digital Transformation for a Sustainable World (ITU K), 1–7. IEEE, 2024. https://doi.org/10.23919/ituk62727.2024.10772977.
Full textKrishna, Dondapati Manoj, Medasani Veda Pranay, and Shaik Khaja Mohiddin. "Security Measures in Cloud-Driven Home Automation Systems." In 2024 8th International Conference on Inventive Systems and Control (ICISC), 145–50. IEEE, 2024. http://dx.doi.org/10.1109/icisc62624.2024.00032.
Full textJyothi, V. Esther, G. Rakesh, Vipparla Aruna, Shobana Gorintla, Yalanati Ayyappa, and U. Ganesh Naidu. "Enhanced Monitoring and Security Measures with Video Analysis." In 2025 International Conference on Multi-Agent Systems for Collaborative Intelligence (ICMSCI), 262–67. IEEE, 2025. https://doi.org/10.1109/icmsci62561.2025.10894596.
Full textZheng, Xiaoxia. "Computer network security and measures." In Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.
Full text"Microarchitectures undo software security measures." In 2015 IEEE Hot Chips 27 Symposium (HCS). IEEE, 2015. http://dx.doi.org/10.1109/hotchips.2015.7477472.
Full textBramson, Aaron L. "Methodology for building confidence measures." In Defense and Security, edited by Belur V. Dasarathy. SPIE, 2004. http://dx.doi.org/10.1117/12.542398.
Full textGupta, Sanyuj Singh, Abha Thakral, and Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures." In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018. http://dx.doi.org/10.1109/icacce.2018.8441710.
Full textGupta, Sanyuj Singh, Abha Thakral, and Tanupriya Choudhury. "Social Media Security Analysis of Threats and Security Measures." In 2018 12th International Conference on Communications (COMM). IEEE, 2018. http://dx.doi.org/10.1109/iccomm.2018.8430168.
Full textLiu, Shuiyin, Yi Hong, and Emanuele Viterbo. "On measures of information theoretic security." In 2014 IEEE Information Theory Workshop (ITW). IEEE, 2014. http://dx.doi.org/10.1109/itw.2014.6970843.
Full textReports on the topic "Security measures"
Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), February 1989. http://dx.doi.org/10.2172/6137987.
Full textSantos, Ramon G. Confidence-Building Measures in Philippine Security. Fort Belvoir, VA: Defense Technical Information Center, May 1998. http://dx.doi.org/10.21236/ada345450.
Full textNathanson, David. Security and Stability Operations Measures of Effectiveness. Fort Belvoir, VA: Defense Technical Information Center, February 2005. http://dx.doi.org/10.21236/ada464303.
Full textHiraki, Ayaka. Japan’s economic security measures are immense but ineffective. East Asia Forum, December 2024. https://doi.org/10.59425/eabc.1733522400.
Full textKelly, Luke. Evidence on Measures to Address Security in Camp Settings. Institute of Development Studies, March 2021. http://dx.doi.org/10.19088/k4d.2021.052.
Full textMinchev, Zlatogor, and Ivan Gaydarski. Cyber risks, threats & security measures associated with COVID-19. Procon, 2020. http://dx.doi.org/10.11610/views.0037.
Full textMumford, Michael D., Theodore L. Gessner, Jennifer O'Connor, Mary S. Connelly, and Timothy C. Clifton. Background Data Measures for Predicting Security Risks: A Construct Approach. Fort Belvoir, VA: Defense Technical Information Center, January 1992. http://dx.doi.org/10.21236/ada245754.
Full textMancy, Mancy. mHealth: Review of Security & Privacy Measures of mHealth Apps. Ames (Iowa): Iowa State University, January 2021. http://dx.doi.org/10.31274/cc-20240624-1001.
Full textMumford, Michael, Theodore L. Gessner, Jennifer A. O'Connor, Julie F. Johnson, and Robert J. Holt. Background Data Measures for Predicting Security Risks: Assessment of Differential Moderators. Fort Belvoir, VA: Defense Technical Information Center, January 1994. http://dx.doi.org/10.21236/ada280487.
Full textCapper, Tim, and Alan Walker. Energy security. Parliamentary Office of Science and Technology, August 2022. http://dx.doi.org/10.58248/pn676.
Full text