To see the other types of publications on this topic, follow the link: Security measures.

Journal articles on the topic 'Security measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Gunuganti, Anvesh, and Srikanth Mandru. "Securing Crypto Currency Exchanges: Implementing Cutting - Edge Security Measures for Enhanced Protection." International Journal of Science and Research (IJSR) 12, no. 1 (2023): 1273–77. https://doi.org/10.21275/sr24531140255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ramolia, Nidhi, Pranav Piyushbhai Tank, R. N. Ravikumar, Babar Zeb, Manish Kumar, and Sushil Kumar Singh. "Futuristic Metaverse: Security and Counter Measures." ICCK Transactions on Intelligent Systematics 2, no. 1 (2025): 49. https://doi.org/10.62762/tis.2024.194631.

Full text
Abstract:
This paper presents a comprehensive analysis of the security and privacy challenges in the Metaverse, introducing a novel framework for evaluating and addressing these emerging threats. Our research makes three key contributions: (1) a systematic classification of Metaverse-specific security vulnerabilities across interconnected virtual and physical environments, (2) a framework for assessing privacy risks in AR/VR-enabled social interactions, and (3) targeted solutions for securing blockchain-based digital assets and identity management in the Metaverse. Our analysis highlights how traditiona
APA, Harvard, Vancouver, ISO, and other styles
3

McCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures." Indian Journal of Applied Research 4, no. 4 (2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

D'souza, Jason John, and Seeza Franklin. "Li-Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar, and Mohinder Singh. "Networking and Security Measures." DESIDOC Bulletin of Information Technology 24, no. 2 (2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (2002): 1. http://dx.doi.org/10.1145/763944.763945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (2002): 1. http://dx.doi.org/10.1145/763948.763945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stanton, Ray. "Weighing up security measures." Computer Fraud & Security 2006, no. 1 (2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wood, Charles Cresson. "Floppy diskette security measures." Computers & Security 4, no. 3 (1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Li, Yan. "Network Security Protection Measures." Advanced Materials Research 971-973 (June 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.

Full text
Abstract:
Safety is the premise of network operation, network security is not only a single point of security, but the safety of the information network, need to be done from various solid protection. Analyzed the current form and face all kinds of LAN network security threats and network security precautions, technology, this paper expounds the LAN the importance of the current network security in our lives.
APA, Harvard, Vancouver, ISO, and other styles
12

ARAVINDA A KUMAR and Divya TL. "Security measures implemented in RESTful API Development." Open Access Research Journal of Engineering and Technology 7, no. 1 (2024): 105–12. http://dx.doi.org/10.53022/oarjet.2024.7.1.0042.

Full text
Abstract:
Protecting Application Programming Interfaces (APIs) is crucial for securing sensitive data and ensuring the stability of web applications. This paper examines the effectiveness of key security practices, focusing on token-based authentication and password hashing techniques. It highlights the use of JSON Web Tokens (JWT) for authentication, detailing how JWTs enhance data security by incorporating claims and expiration details to mitigate unauthorized access risks. The paper also covers the application of `bcrypt` for password hashing through the `passlib` library, demonstrating its role in s
APA, Harvard, Vancouver, ISO, and other styles
13

Valera, Jasmine P., and Sunguk Lee. "Security Measures in Overcoming Mobile IPv6 Security Issues." International Journal of Database Theory and Application 9, no. 7 (2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Khabirov, Artur Ilfarovich, and Gulnara Mullanurovna Khamitova. "Security Measures and Liability Measures in Loan Agreements." Journal of Politics and Law 12, no. 5 (2019): 1. http://dx.doi.org/10.5539/jpl.v12n5p1.

Full text
Abstract:
The Civil Code of the Russian Federation regulates the use of various measures to protect violated rights and interests: first, these include universal methods for protecting civil rights (article 12 of the Civil Code); second, these include provisions of Chapter 25 of the Civil Code regarding the liability for violating one's obligations; both of them jointly comprising the institution of protection of civil rights. This article studies the issue of consequences for violating a party's duties under a loan agreement. The article differentiates safeguarding measures and liabilit
APA, Harvard, Vancouver, ISO, and other styles
15

Nelson, Masese. "Security Measures for Protecting of Information Technology Assets." International Journal of Science and Research (IJSR) 11, no. 2 (2022): 401–5. http://dx.doi.org/10.21275/sr22129224133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Malazizi, Nahid. "Tourism and International Borders: Global Health Security Measures." International Journal of Science and Research (IJSR) 10, no. 10 (2021): 900–904. https://doi.org/10.21275/sr211012113522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Christin, Nicolas. "The effectiveness of security measures." Communications of the ACM 65, no. 9 (2022): 92. http://dx.doi.org/10.1145/3547132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Gupta, Anish, Vimal Bibhu, and Rashid Hussain. "Security Measures in Data Mining." International Journal of Information Engineering and Electronic Business 4, no. 3 (2012): 34–39. http://dx.doi.org/10.5815/ijieeb.2012.03.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Uffen, Jörg, and Michael H. Breitner. "Management of Technical Security Measures." International Journal of Social and Organizational Dynamics in IT 3, no. 1 (2013): 14–31. http://dx.doi.org/10.4018/ijsodit.2013010102.

Full text
Abstract:
Organizations are investing substantial resources in technical security measures that aim at preventively protecting their information assets. The way management – or information security executives – deals with potential security measures varies individually and depends on personality traits and cognitive factors. Based on the Theory of Planned Behavior, the authors examine the relationship between the personality traits of conscientiousness, neuroticism and openness with attitudes and intentions towards managing technical security measures. The highly relevant moderating role of compliance f
APA, Harvard, Vancouver, ISO, and other styles
20

Courtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Keenan, Debra Palmer, Christine Olson, James C. Hersey, and Sondra M. Parmer. "Measures of Food Insecurity/Security." Journal of Nutrition Education 33 (September 2001): S49—S58. http://dx.doi.org/10.1016/s1499-4046(06)60069-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

TREMBLAY, JEAN-FRANÇOIS. "SECURITY MEASURES IMPEDE U.S. VISITS." Chemical & Engineering News 81, no. 11 (2003): 40–41. http://dx.doi.org/10.1021/cen-v081n011.p040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Feher, Ben, Lior Sidi, Asaf Shabtai, Rami Puzis, and Leonardas Marozas. "WebRTC security measures and weaknesses." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.092138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Marozas, Leonardas, Asaf Shabtai, Rami Puzis, Ben Feher, and Lior Sidi. "WebRTC security measures and weaknesses." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.10013302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

J A, Smitha, Rakshith G Raj, Sumanth J Samuel, and Pramath P Yaji. "Security Measures of Textual Data." International Journal of Innovative Research in Information Security 9, no. 03 (2023): 55–60. http://dx.doi.org/10.26562/ijiris.2023.v0903.01.

Full text
Abstract:
As the volume and importance of textual data in data science continues to grow, combined with advancements in its techniques, it has created numerous opportunities for extracting valuable insights from textual information. However, privacy and the security of private data are issues that are brought up by the analysis of text data. This paper presents an in-depth analysis of security measures specifically designed for protecting textual data in data science applications. It explores various techniques and strategies to safeguard the confidentiality, integrity, and availability of textual data
APA, Harvard, Vancouver, ISO, and other styles
26

Adıgüzel, Selminaz, and Murat Düzgün. "Air Transportation Security Measures: Ics2." Journal of Aviation 9, no. 1 (2025): 168–80. https://doi.org/10.30518/jav.1591826.

Full text
Abstract:
In this research, ICS 2 security measures in airline transportation were examined. The aim of this research is to investigate security measures in airline transportation and the economic effects of the ICS 2 application which the EU has implemented in customs on air transportation. The EU Commission with its proposal for a new Customs Code (R-UCC) has proposed that the EU Customs Data Center is managed by the national EU Customs Authority that be given to the person declaring that the raw material, product or semi-processed product has been brought into the EU or removed from the EU. In this r
APA, Harvard, Vancouver, ISO, and other styles
27

Munnangi, Sivasatyanarayanareddy. "Best Practices for Implementing Robust Security Measures." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 2 (2019): 2032–56. https://doi.org/10.61841/turcomat.v10i2.15041.

Full text
Abstract:
In today’s digital landscape, organizations leveraging Pega Business Process Management (BPM) face significant security challenges as they strive to protect sensitive business processes from evolving cyber threats. This article explores best practices for implementing robust security measures within Pega BPM environments, focusing on secure configuration settings, identity and access management (IAM), encryption standards, and real-time monitoring. By integrating Pega BPM with broader cybersecurity frameworks, organizations can proactively detect and mitigate vulnerabilities, ensuring the inte
APA, Harvard, Vancouver, ISO, and other styles
28

M., Chorna, and Shumilo O. "CREATING A PACKAGE OF MEASURES AIMED AT MANAGING THE ECONOMIC SECURITY OF RETAIL TRADE ENTERPRISES." ECONOMIC STRATEGY AND PROSPECTS OF TRADE AND SERVICES SECTOR DEVELOPMENT 2 (30) (January 9, 2020): 78–88. https://doi.org/10.5281/zenodo.3602147.

Full text
Abstract:
<em>It is noted that improving the efficiency of economic security management of the enterprise contributes to the sustainable operation of the establishment in the market and its growth in the future and it should be based on the development and implementation of measures to ensure and guarantee economic security. It is also stated that the basis for the development and justification of measures which improve the enterprise economic security is to compare the enterprise with other enterprises in the competitive group in the market.</em> <em>A methodological approach to the formation of a pack
APA, Harvard, Vancouver, ISO, and other styles
29

Gadre, Monica. "Data Security in Cloud Security Attacks and Preventive Measures." International Journal for Research in Applied Science and Engineering Technology 6, no. 3 (2018): 529–36. http://dx.doi.org/10.22214/ijraset.2018.3085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.

Full text
Abstract:
Software defined networking (SDN), a new attempt in addressing the existing challenges in the legacy network architecture, is lime-lighted due to its simplified approach in managing the networks and its capability of programmability. In progressing with software defined networks implementation, security remains a high priority focus. The advantage of SDN itself opens a wide ground in posing new security threats and challenges. Focusing on the security of the SDN is a prime factor as it reflects on the growth of SDN technology implementation. This article focuses on the various existing securit
APA, Harvard, Vancouver, ISO, and other styles
31

Khan, Koffka. "Securing Immersive Realms: A Review of Security Measures in 360-Degree Virtual Reality Video Streaming." International Journal of Science and Research (IJSR) 12, no. 12 (2023): 727–33. http://dx.doi.org/10.21275/sr231208045505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Jason, John D'souza, and Franklin Seeza. "Li Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 2588–90. https://doi.org/10.31142/ijtsrd15706.

Full text
Abstract:
As we see in todays world, all institutes as well as organizations are planning to shrink the size hardware and are even trying to make it portable, olden days we had local area network wires to transmit data over devices then came in Wi Fi which didn&#39;t have wires but was able to transmit data over devices but its sources are usually wired an sometimes not portable to every place and then now industries are planning to implement li fi which uses a simple light to transmit data over devices users will just have to carry a small light source which will transmit the data over devices but what
APA, Harvard, Vancouver, ISO, and other styles
33

Popescu, Mirona Ana Maria, Andreea Barbu, Petronela Cristina Simion, and Georgiana Moiceanu. "Research on Data Security Measures in Romania." Proceedings of the International Conference on Business Excellence 18, no. 1 (2024): 3277–83. http://dx.doi.org/10.2478/picbe-2024-0267.

Full text
Abstract:
Abstract Information from the online environment is constantly increasing, as well as its value. In this context, for companies data security becomes a central pillar to protect sensitive information and to ensure its integrity, confidentiality and availability (CIA Triangle). The security measures adopted by the companies also increase the degree of trust of their partners and customers. But data security is not just about implementing the right technologies and policies; equally important is the awareness and proper training of personnel who interact with this data or the applications that c
APA, Harvard, Vancouver, ISO, and other styles
34

Torres, C. G., M. E. Turner, J. R. Harkess, and G. R. Istre. "Security measures for AIDS and HIV." American Journal of Public Health 81, no. 2 (1991): 210–11. http://dx.doi.org/10.2105/ajph.81.2.210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are looph
APA, Harvard, Vancouver, ISO, and other styles
36

Damoah, Dominic, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-Sam, and Brighter Agyeman. "Improving Security Measures on Grid Computing." International Journal of Computer Applications 83, no. 9 (2013): 6–11. http://dx.doi.org/10.5120/14474-2490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Rudakova, O. Yu, T. A. Rudakova, and I. N. Sannikova. "Spatial measures for ensuring economic security." National Interests: Priorities and Security 16, no. 1 (2020): 44–59. http://dx.doi.org/10.24891/ni.16.1.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Pevnev, Volodimir, and Serhii Kapchynskyi. "DATABASE SECURITY: THREATS AND PREVENTIVE MEASURES." Advanced Information Systems 2, no. 1 (2018): 69–72. http://dx.doi.org/10.20998/2522-9052.2018.1.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Benjamin, John, G. Sirmans, and Emily Zietz. "Security Measures and the Apartment Market." Journal of Real Estate Research 14, no. 3 (1997): 347–58. http://dx.doi.org/10.1080/10835547.1997.12090900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

FUJITA, Shintaro, and Kenji SAWADA. "Security Measures Technology for Control Systems." Journal of The Institute of Electrical Engineers of Japan 142, no. 4 (2022): 212–14. http://dx.doi.org/10.1541/ieejjournal.142.212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Walsh, Matthew, and William Streilein. "Security Measures for Safeguarding the Bioeconomy." Health Security 18, no. 4 (2020): 313–17. http://dx.doi.org/10.1089/hs.2020.0029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Schuldt, Alison. "Security measures at the nuclear pore." Nature Cell Biology 6, no. 2 (2004): 91. http://dx.doi.org/10.1038/ncb0204-91.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Schroden, Jonathan J. "Measures for Security in a Counterinsurgency." Journal of Strategic Studies 32, no. 5 (2009): 715–44. http://dx.doi.org/10.1080/01402390903189394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Alessi, Dario R., and Yogesh Kulathu. "Security measures of a master regulator." Nature 497, no. 7448 (2013): 193–94. http://dx.doi.org/10.1038/nature12101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

KITAURA, Shigeru, and Sumiaki OHOTUYAMA. "Verification about security measures for derailment." Proceedings of the Transportation and Logistics Conference 2017.26 (2017): 1018. http://dx.doi.org/10.1299/jsmetld.2017.26.1018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Andrews, Christine. "Improving data security measures in business." Computer Fraud & Security 2009, no. 8 (2009): 8–10. http://dx.doi.org/10.1016/s1361-3723(09)70099-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Horak, O. J. "Means and Measures for Data Security." IFAC Proceedings Volumes 22, no. 19 (1989): 1–6. http://dx.doi.org/10.1016/s1474-6670(17)52787-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Collinson, Helen. "Win 95 security measures mollify users." Computers & Security 15, no. 2 (1996): 125–26. http://dx.doi.org/10.1016/0167-4048(96)89336-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Cieśla, Rafał. "Security measures in combating document falsifiers." Nowa Kodyfikacja Prawa Karnego 44 (December 29, 2017): 41–53. http://dx.doi.org/10.19195/2084-5065.44.4.

Full text
Abstract:
Evolution of political and economic transformation has to a considerable degree contributed to the increase of crimes committed with fake documents. Development of civilisation and technological progress necessitate protection of public documents. To ensure security and trust to the institutions issuing documents their producers and issu­ers use various security measures to protect them against falsification. Combination of advanced technologies with biometric identifiers is a necessary solution. Implementation of advanced security measures should, at least for a certain period of time, hinder
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!