Journal articles on the topic 'Security Monitors'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security Monitors.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chevalier, Yannick, and Michaël Rusinowitch. "Implementing Security Protocol Monitors." Electronic Proceedings in Theoretical Computer Science 342 (September 6, 2021): 22–34. http://dx.doi.org/10.4204/eptcs.342.3.
Full textBadger, L. "Information security: from reference monitors to wrappers." IEEE Aerospace and Electronic Systems Magazine 13, no. 3 (March 1998): 32–33. http://dx.doi.org/10.1109/62.659861.
Full textNarasimhan, Seetharam, Wen Yueh, Xinmu Wang, Saibal Mukhopadhyay, and Swarup Bhunia. "Improving IC Security Against Trojan Attacks Through Integration of Security Monitors." IEEE Design & Test of Computers 29, no. 5 (October 2012): 37–46. http://dx.doi.org/10.1109/mdt.2012.2210183.
Full textMagazinius, Jonas, Alejandro Russo, and Andrei Sabelfeld. "On-the-fly inlining of dynamic security monitors." Computers & Security 31, no. 7 (October 2012): 827–43. http://dx.doi.org/10.1016/j.cose.2011.10.002.
Full textWoods, David, Stephanie McNee, James W. Davis, Alexander Morison, Patrick Maughan, and Klaus Christoffersen. "Event Template Hierarchies as Means for Human-Automation Collaboration in Security Surveillance." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 49, no. 3 (September 2005): 302–6. http://dx.doi.org/10.1177/154193120504900319.
Full textDeyglun, C. "Testing and performances of Spectroscopic Radiation Portal Monitor for homeland security." EPJ Web of Conferences 225 (2020): 07008. http://dx.doi.org/10.1051/epjconf/202022507008.
Full textAlbeshri, Aiiad, and Vijey Thayananthan. "Analytical Techniques for Decision Making on Information Security for Big Data Breaches." International Journal of Information Technology & Decision Making 17, no. 02 (March 2018): 527–45. http://dx.doi.org/10.1142/s0219622017500432.
Full textFreysdóttir, Gerður Rán, Kristín Björnsdóttir, and Margrét Hrönn Svavarsdóttir. "Nurses’ use of monitors in patient surveillance: an ethnographic study on a coronary care unit." European Journal of Cardiovascular Nursing 18, no. 4 (November 30, 2018): 272–79. http://dx.doi.org/10.1177/1474515118816930.
Full textKarger, Paul A., and David R. Safford. "I/O for Virtual Machine Monitors: Security and Performance Issues." IEEE Security & Privacy Magazine 6, no. 5 (September 2008): 16–23. http://dx.doi.org/10.1109/msp.2008.119.
Full textKhoury, Raphaël, and Nadia Tawbi. "Which security policies are enforceable by runtime monitors? A survey." Computer Science Review 6, no. 1 (January 2012): 27–45. http://dx.doi.org/10.1016/j.cosrev.2012.01.001.
Full textDr. R. Balasubramanian, P. Ramachandran ,. "TC-CNN: A Tree Classified model using AI for identifying malware intrusions in open Networks." Psychology and Education Journal 58, no. 2 (February 20, 2021): 6561–73. http://dx.doi.org/10.17762/pae.v58i2.3189.
Full textMorys, Lukáš, and Josef Smolík. "Bezpečnostní politika fotbalového mistrovství Evropy 2012." Studia sportiva 8, no. 1 (July 14, 2014): 13–24. http://dx.doi.org/10.5817/sts2014-1-2.
Full textLin, Mao, Yong Wang, and Gang Shi. "Social Security Video Surveillance Systems." Advanced Materials Research 433-440 (January 2012): 5906–10. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.5906.
Full textBritton, Katherine E., and Jennifer D. Britton-Colonnese. "Privacy and Security Issues Surrounding the Protection of Data Generated by Continuous Glucose Monitors." Journal of Diabetes Science and Technology 11, no. 2 (February 13, 2017): 216–19. http://dx.doi.org/10.1177/1932296816681585.
Full textLucas, L., L. Pibida, M. Unterweger, and L. Karam. "Gamma-ray emitting test sources for Portal Monitors used for homeland security." Radiation Protection Dosimetry 113, no. 1 (December 7, 2004): 108–11. http://dx.doi.org/10.1093/rpd/nch422.
Full textKhan, Zeeshan Ali, and Ubaid Abbasi. "Reputation Management Using Honeypots for Intrusion Detection in the Internet of Things." Electronics 9, no. 3 (February 29, 2020): 415. http://dx.doi.org/10.3390/electronics9030415.
Full textGraniszewski, Waldemar, and Adam Arciszewski. "Performance analysis of selected hypervisors (Virtual Machine Monitors - VMMs)." International Journal of Electronics and Telecommunications 62, no. 3 (September 1, 2016): 231–36. http://dx.doi.org/10.1515/eletel-2016-0031.
Full textSiswanto, Siswanto, M. Anif, Dwi Nur Hayati, and Yuhefizar Yuhefizar. "Pengamanan Pintu Ruangan Menggunakan Arduino Mega 2560, MQ-2, DHT-11 Berbasis Android." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 3, no. 1 (April 6, 2019): 66–72. http://dx.doi.org/10.29207/resti.v3i1.797.
Full textKIM, SANGKYUN. "ASSESSMENT ON SECURITY RISKS OF CUSTOMER RELATIONSHIP MANAGEMENT SYSTEMS." International Journal of Software Engineering and Knowledge Engineering 20, no. 01 (February 2010): 103–9. http://dx.doi.org/10.1142/s0218194010004591.
Full textSchmidt, Frank. "Recommendations for improving the security of humanitarian workers." International Review of the Red Cross 37, no. 317 (April 1997): 152–55. http://dx.doi.org/10.1017/s0020860400085089.
Full textAlla, Amvalko. "Development of a strategy for the protection of information resources of the airport." Technium: Romanian Journal of Applied Sciences and Technology 2, no. 7 (December 30, 2020): 398–404. http://dx.doi.org/10.47577/technium.v2i7.2301.
Full textLin, Changyuan, Hamzeh Khazaei, Andrew Walenstein, and Andrew Malton. "Autonomic Security Management for IoT Smart Spaces." ACM Transactions on Internet of Things 2, no. 4 (November 30, 2021): 1–20. http://dx.doi.org/10.1145/3466696.
Full textDatta, Shoumen Palit Austin. "Cybersecurity - Personal Security Agents for People, Process, Atoms & Bits." Journal of Innovation Management 5, no. 1 (May 18, 2017): 4–13. http://dx.doi.org/10.24840/2183-0606_005.001_0002.
Full textGrisa, Tomas, Daniel Sas, and Lubomir Gryc. "On a multidimensional data processing method for radiation portal monitors." Nuclear Technology and Radiation Protection 35, no. 3 (2020): 235–43. http://dx.doi.org/10.2298/ntrp2003235g.
Full textYadav, Anuj Kumar, Ritika, and Madan Garg. "Cryptographic Solution for Security Problem in Cloud Computing Storage During Global Pandemics." International Journal of Safety and Security Engineering 11, no. 2 (April 30, 2021): 193–99. http://dx.doi.org/10.18280/ijsse.110208.
Full textMuka, Romina, Sule Yildrim-Yayilgan, and Kozeta Sevrani. "Security Analysis of Wireless BAN in e-Health." Spring 2017 5, no. 2 (May 1, 2017): 1–7. http://dx.doi.org/10.33107/ijbte.2017.5.2.02.
Full textL, Raghavendar Raju, and C. R. K. Reddy. "Node activity based trust and reputation estimation approach for secure and QoS routing in MANET." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (December 1, 2019): 5340. http://dx.doi.org/10.11591/ijece.v9i6.pp5340-5350.
Full textZhao, Liang, and Yi Cheng. "Intelligent Wireless Alarm System Based on 51 Single Chip." Advanced Materials Research 753-755 (August 2013): 2645–48. http://dx.doi.org/10.4028/www.scientific.net/amr.753-755.2645.
Full textShin, Sooyeon, and Taekyoung Kwon. "A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes." Sensors 19, no. 9 (April 29, 2019): 2012. http://dx.doi.org/10.3390/s19092012.
Full textJiang, Xin, Mingzhe Liu, Kun Yang, Yanhua Liu, and Ruili Wang. "A Security Sandbox Approach of Android Based on Hook Mechanism." Security and Communication Networks 2018 (July 19, 2018): 1–8. http://dx.doi.org/10.1155/2018/9856537.
Full textYalandra, Hengky, and Putra Jaya. "RANCANG BANGUN PENGAMAN PINTU PERSONAL ROOM MENGGUNAKAN SENSOR SIDIK JARI BERBASIS ARDUINO." Voteteknika (Vocational Teknik Elektronika dan Informatika) 7, no. 2 (June 1, 2019): 118. http://dx.doi.org/10.24036/voteteknika.v7i2.104347.
Full textHemaanand, M., V. Sanjay Kumar, and R. Karthika. "Smart Surveillance System Using Computer Vision and Internet of Things." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 68–73. http://dx.doi.org/10.1166/jctn.2020.8631.
Full textLonzetta, Angela, Peter Cope, Joseph Campbell, Bassam Mohd, and Thaier Hayajneh. "Security Vulnerabilities in Bluetooth Technology as Used in IoT." Journal of Sensor and Actuator Networks 7, no. 3 (July 19, 2018): 28. http://dx.doi.org/10.3390/jsan7030028.
Full textJayashree, Devasagayam, V. Uma Rani, and K. Soma Sundaram. "Trust Based Misbehavior Detection in Wireless Sensor Networks." Applied Mechanics and Materials 622 (August 2014): 191–98. http://dx.doi.org/10.4028/www.scientific.net/amm.622.191.
Full textMishra, Sangeet, Asis Kumar Tripathy, and Pallavi Joshi. "Making a Cloud Data Secure and Effective for Better Performance of Services." Indonesian Journal of Electrical Engineering and Computer Science 2, no. 3 (June 1, 2016): 695. http://dx.doi.org/10.11591/ijeecs.v2.i3.pp695-702.
Full textZhu, Jianfeng, Ao Luo, Guanhua Li, Bowei Zhang, Yong Wang, Gang Shan, Yi Li, et al. "Jintide: Utilizing Low-Cost Reconfigurable External Monitors to Substantially Enhance Hardware Security of Large-Scale CPU Clusters." IEEE Journal of Solid-State Circuits 56, no. 8 (August 2021): 2585–601. http://dx.doi.org/10.1109/jssc.2021.3058551.
Full textLiu, Xiu Kuan, Yao Chen, and Hai Ning Yu. "Research on Web-Based Elevator Failure Remote Monitoring System." Applied Mechanics and Materials 494-495 (February 2014): 797–800. http://dx.doi.org/10.4028/www.scientific.net/amm.494-495.797.
Full textKhasawneh, Mahmoud, and Anjali Agarwal. "A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/3261058.
Full textKumar Panda, Dr Subodh, M. Harshita, Nishmitha A R, and Priyanka P. "Design and Development of Web Based Embedded Robot for Safety and Security Applications." Journal of University of Shanghai for Science and Technology 23, no. 07 (July 10, 2021): 543–49. http://dx.doi.org/10.51201/jusst/21/07180.
Full textXu, Hong. "Extended Web Services Model Design for Non-Functional Requirements." Applied Mechanics and Materials 63-64 (June 2011): 855–58. http://dx.doi.org/10.4028/www.scientific.net/amm.63-64.855.
Full textRanganathan, Raghuram, Robert Qiu, Zhen Hu, Shujie Hou, Marbin Pazos-Revilla, Gang Zheng, Zhe Chen, and Nan Guo. "Cognitive Radio for Smart Grid: Theory, Algorithms, and Security." International Journal of Digital Multimedia Broadcasting 2011 (2011): 1–14. http://dx.doi.org/10.1155/2011/502087.
Full textBridi, Adriana Carla, Thiago Quinellato Louro, and Roberto Carlos Lyra da Silva. "Clinical Alarms in intensive care: implications of alarm fatigue for the safety of patients." Revista Latino-Americana de Enfermagem 22, no. 6 (December 2014): 1034–40. http://dx.doi.org/10.1590/0104-1169.3488.2513.
Full textTaiwo, Olutosin, and Absalom E. Ezugwu. "Internet of Things-Based Intelligent Smart Home Control System." Security and Communication Networks 2021 (September 23, 2021): 1–17. http://dx.doi.org/10.1155/2021/9928254.
Full textDi, Xiao Qiang, Hua Min Yang, and Jin Qing Li. "Intrusion Response Mobile Firewall Design in Ad Hoc Networks and Based on SMP Performance Analysis." Applied Mechanics and Materials 496-500 (January 2014): 1909–14. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.1909.
Full textRabab, Sana, Jack Tomlin, Nick Huband, and Birgit Völlm. "Care quality commission inspections of high-security hospitals." Journal of Forensic Practice 22, no. 2 (March 6, 2020): 83–96. http://dx.doi.org/10.1108/jfp-09-2019-0044.
Full textGhawade, Miss Manoshri A. "Study of Intrusion Detection System." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 14, 2021): 788–92. http://dx.doi.org/10.22214/ijraset.2021.34935.
Full textSripath Roy, K., S. Sowmya, M. Manasa, D. Alekhya, and P. Abhinav. "Decentralized weather monitoring system for smart cities." International Journal of Engineering & Technology 7, no. 2.20 (April 18, 2018): 67. http://dx.doi.org/10.14419/ijet.v7i2.20.11755.
Full textSuwansrikham, Parinya, She Kun, Shaukat Hayat, and Jehoiada Jackson. "Dew Computing and Asymmetric Security Framework for Big Data File Sharing." Information 11, no. 6 (June 5, 2020): 303. http://dx.doi.org/10.3390/info11060303.
Full textDijkstra, Hylke. "Agenda-setting in the Common Security and Defence Policy: An institutionalist perspective." Cooperation and Conflict 47, no. 4 (November 27, 2012): 454–72. http://dx.doi.org/10.1177/0010836712462772.
Full textSun, Jian, Qiang Wang, and Yang Yang. "A Coordinated Volt/Var Control Strategy for Wind Farm Group." Applied Mechanics and Materials 701-702 (December 2014): 641–44. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.641.
Full text