Journal articles on the topic 'Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gunuganti, Anvesh, and Srikanth Mandru. "Securing Crypto Currency Exchanges: Implementing Cutting - Edge Security Measures for Enhanced Protection." International Journal of Science and Research (IJSR) 12, no. 1 (2023): 1273–77. https://doi.org/10.21275/sr24531140255.
Full textRamolia, Nidhi, Pranav Piyushbhai Tank, R. N. Ravikumar, Babar Zeb, Manish Kumar, and Sushil Kumar Singh. "Futuristic Metaverse: Security and Counter Measures." ICCK Transactions on Intelligent Systematics 2, no. 1 (2025): 49. https://doi.org/10.62762/tis.2024.194631.
Full textMcCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Full textDr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures." Indian Journal of Applied Research 4, no. 4 (2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.
Full textD'souza, Jason John, and Seeza Franklin. "Li-Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.
Full textGupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar, and Mohinder Singh. "Networking and Security Measures." DESIDOC Bulletin of Information Technology 24, no. 2 (2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.
Full textRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (2002): 1. http://dx.doi.org/10.1145/763944.763945.
Full textRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (2002): 1. http://dx.doi.org/10.1145/763948.763945.
Full textStanton, Ray. "Weighing up security measures." Computer Fraud & Security 2006, no. 1 (2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.
Full textWood, Charles Cresson. "Floppy diskette security measures." Computers & Security 4, no. 3 (1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.
Full textLi, Yan. "Network Security Protection Measures." Advanced Materials Research 971-973 (June 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.
Full textARAVINDA A KUMAR and Divya TL. "Security measures implemented in RESTful API Development." Open Access Research Journal of Engineering and Technology 7, no. 1 (2024): 105–12. http://dx.doi.org/10.53022/oarjet.2024.7.1.0042.
Full textValera, Jasmine P., and Sunguk Lee. "Security Measures in Overcoming Mobile IPv6 Security Issues." International Journal of Database Theory and Application 9, no. 7 (2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.
Full textKhabirov, Artur Ilfarovich, and Gulnara Mullanurovna Khamitova. "Security Measures and Liability Measures in Loan Agreements." Journal of Politics and Law 12, no. 5 (2019): 1. http://dx.doi.org/10.5539/jpl.v12n5p1.
Full textNelson, Masese. "Security Measures for Protecting of Information Technology Assets." International Journal of Science and Research (IJSR) 11, no. 2 (2022): 401–5. http://dx.doi.org/10.21275/sr22129224133.
Full textMalazizi, Nahid. "Tourism and International Borders: Global Health Security Measures." International Journal of Science and Research (IJSR) 10, no. 10 (2021): 900–904. https://doi.org/10.21275/sr211012113522.
Full textChristin, Nicolas. "The effectiveness of security measures." Communications of the ACM 65, no. 9 (2022): 92. http://dx.doi.org/10.1145/3547132.
Full textGupta, Anish, Vimal Bibhu, and Rashid Hussain. "Security Measures in Data Mining." International Journal of Information Engineering and Electronic Business 4, no. 3 (2012): 34–39. http://dx.doi.org/10.5815/ijieeb.2012.03.05.
Full textUffen, Jörg, and Michael H. Breitner. "Management of Technical Security Measures." International Journal of Social and Organizational Dynamics in IT 3, no. 1 (2013): 14–31. http://dx.doi.org/10.4018/ijsodit.2013010102.
Full textCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Full textKeenan, Debra Palmer, Christine Olson, James C. Hersey, and Sondra M. Parmer. "Measures of Food Insecurity/Security." Journal of Nutrition Education 33 (September 2001): S49—S58. http://dx.doi.org/10.1016/s1499-4046(06)60069-9.
Full textTREMBLAY, JEAN-FRANÇOIS. "SECURITY MEASURES IMPEDE U.S. VISITS." Chemical & Engineering News 81, no. 11 (2003): 40–41. http://dx.doi.org/10.1021/cen-v081n011.p040.
Full textFeher, Ben, Lior Sidi, Asaf Shabtai, Rami Puzis, and Leonardas Marozas. "WebRTC security measures and weaknesses." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.092138.
Full textMarozas, Leonardas, Asaf Shabtai, Rami Puzis, Ben Feher, and Lior Sidi. "WebRTC security measures and weaknesses." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.10013302.
Full textJ A, Smitha, Rakshith G Raj, Sumanth J Samuel, and Pramath P Yaji. "Security Measures of Textual Data." International Journal of Innovative Research in Information Security 9, no. 03 (2023): 55–60. http://dx.doi.org/10.26562/ijiris.2023.v0903.01.
Full textAdıgüzel, Selminaz, and Murat Düzgün. "Air Transportation Security Measures: Ics2." Journal of Aviation 9, no. 1 (2025): 168–80. https://doi.org/10.30518/jav.1591826.
Full textMunnangi, Sivasatyanarayanareddy. "Best Practices for Implementing Robust Security Measures." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 2 (2019): 2032–56. https://doi.org/10.61841/turcomat.v10i2.15041.
Full textM., Chorna, and Shumilo O. "CREATING A PACKAGE OF MEASURES AIMED AT MANAGING THE ECONOMIC SECURITY OF RETAIL TRADE ENTERPRISES." ECONOMIC STRATEGY AND PROSPECTS OF TRADE AND SERVICES SECTOR DEVELOPMENT 2 (30) (January 9, 2020): 78–88. https://doi.org/10.5281/zenodo.3602147.
Full textGadre, Monica. "Data Security in Cloud Security Attacks and Preventive Measures." International Journal for Research in Applied Science and Engineering Technology 6, no. 3 (2018): 529–36. http://dx.doi.org/10.22214/ijraset.2018.3085.
Full textKaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.
Full textKhan, Koffka. "Securing Immersive Realms: A Review of Security Measures in 360-Degree Virtual Reality Video Streaming." International Journal of Science and Research (IJSR) 12, no. 12 (2023): 727–33. http://dx.doi.org/10.21275/sr231208045505.
Full textJason, John D'souza, and Franklin Seeza. "Li Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 2588–90. https://doi.org/10.31142/ijtsrd15706.
Full textPopescu, Mirona Ana Maria, Andreea Barbu, Petronela Cristina Simion, and Georgiana Moiceanu. "Research on Data Security Measures in Romania." Proceedings of the International Conference on Business Excellence 18, no. 1 (2024): 3277–83. http://dx.doi.org/10.2478/picbe-2024-0267.
Full textTorres, C. G., M. E. Turner, J. R. Harkess, and G. R. Istre. "Security measures for AIDS and HIV." American Journal of Public Health 81, no. 2 (1991): 210–11. http://dx.doi.org/10.2105/ajph.81.2.210.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textDamoah, Dominic, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-Sam, and Brighter Agyeman. "Improving Security Measures on Grid Computing." International Journal of Computer Applications 83, no. 9 (2013): 6–11. http://dx.doi.org/10.5120/14474-2490.
Full textRudakova, O. Yu, T. A. Rudakova, and I. N. Sannikova. "Spatial measures for ensuring economic security." National Interests: Priorities and Security 16, no. 1 (2020): 44–59. http://dx.doi.org/10.24891/ni.16.1.44.
Full textPevnev, Volodimir, and Serhii Kapchynskyi. "DATABASE SECURITY: THREATS AND PREVENTIVE MEASURES." Advanced Information Systems 2, no. 1 (2018): 69–72. http://dx.doi.org/10.20998/2522-9052.2018.1.13.
Full textBenjamin, John, G. Sirmans, and Emily Zietz. "Security Measures and the Apartment Market." Journal of Real Estate Research 14, no. 3 (1997): 347–58. http://dx.doi.org/10.1080/10835547.1997.12090900.
Full textFUJITA, Shintaro, and Kenji SAWADA. "Security Measures Technology for Control Systems." Journal of The Institute of Electrical Engineers of Japan 142, no. 4 (2022): 212–14. http://dx.doi.org/10.1541/ieejjournal.142.212.
Full textLittlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Full textWalsh, Matthew, and William Streilein. "Security Measures for Safeguarding the Bioeconomy." Health Security 18, no. 4 (2020): 313–17. http://dx.doi.org/10.1089/hs.2020.0029.
Full textSchuldt, Alison. "Security measures at the nuclear pore." Nature Cell Biology 6, no. 2 (2004): 91. http://dx.doi.org/10.1038/ncb0204-91.
Full textSchroden, Jonathan J. "Measures for Security in a Counterinsurgency." Journal of Strategic Studies 32, no. 5 (2009): 715–44. http://dx.doi.org/10.1080/01402390903189394.
Full textAlessi, Dario R., and Yogesh Kulathu. "Security measures of a master regulator." Nature 497, no. 7448 (2013): 193–94. http://dx.doi.org/10.1038/nature12101.
Full textKITAURA, Shigeru, and Sumiaki OHOTUYAMA. "Verification about security measures for derailment." Proceedings of the Transportation and Logistics Conference 2017.26 (2017): 1018. http://dx.doi.org/10.1299/jsmetld.2017.26.1018.
Full textAndrews, Christine. "Improving data security measures in business." Computer Fraud & Security 2009, no. 8 (2009): 8–10. http://dx.doi.org/10.1016/s1361-3723(09)70099-5.
Full textHorak, O. J. "Means and Measures for Data Security." IFAC Proceedings Volumes 22, no. 19 (1989): 1–6. http://dx.doi.org/10.1016/s1474-6670(17)52787-1.
Full textCollinson, Helen. "Win 95 security measures mollify users." Computers & Security 15, no. 2 (1996): 125–26. http://dx.doi.org/10.1016/0167-4048(96)89336-9.
Full textCieśla, Rafał. "Security measures in combating document falsifiers." Nowa Kodyfikacja Prawa Karnego 44 (December 29, 2017): 41–53. http://dx.doi.org/10.19195/2084-5065.44.4.
Full text