To see the other types of publications on this topic, follow the link: Security paper.

Journal articles on the topic 'Security paper'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security paper.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Marsh, P. "Paper defence [security]." Information Professional 2, no. 1 (2005): 34–37. http://dx.doi.org/10.1049/inp:20050105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kaur, Ravneet, and Rekha Bhatia. "Review Paper on Cloud Security." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 5 (2017): 743–46. http://dx.doi.org/10.23956/ijarcsse/v7i5/0119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

DAVIS, E. H., A. W. DILNOT, and J. A. KAY. "The Social Security Green Paper." Fiscal Studies 6, no. 3 (1985): 1–8. http://dx.doi.org/10.1111/j.1475-5890.1985.tb00403.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ansumansamal et al.,, Ansumansamal et al ,. "A Review Paper on Food Security." International Journal of Mechanical and Production Engineering Research and Development 10, no. 3 (2020): 9575–82. http://dx.doi.org/10.24247/ijmperdjun2020913.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bertino, Elisa. "Security of cellular networks position paper." CCF Transactions on Networking 3, no. 2 (2020): 93–96. http://dx.doi.org/10.1007/s42045-020-00037-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hinduja, Ankita, and Pradip Sharma. "A Survey Paper on Password Security Techniques." International Journal of Computer Sciences and Engineering 7, no. 10 (2019): 130–36. http://dx.doi.org/10.26438/ijcse/v7i10.130136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Benqdara, Salima, and Abdelfattah Mahmoud. "Wireless Security in Libya: A Survey Paper." International Journal of Computer Applications 181, no. 35 (2019): 26–31. http://dx.doi.org/10.5120/ijca2019918309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stoukatch, O., A. Shelupanov, and E. Goloivn. "Student paper contest on Information Security SIBINFO." IEEE Communications Magazine 42, no. 2 (2004): 27–30. http://dx.doi.org/10.1109/mcom.2003.1267088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mayes, Keith E., and Konstantinos Markantonakis. "Mobile communication security controllers an evaluation paper." Information Security Technical Report 13, no. 3 (2008): 173–92. http://dx.doi.org/10.1016/j.istr.2008.09.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kaminska, Aleksandra. "Don’t copy that: Security printing and the making of high-tech paper." Convergence: The International Journal of Research into New Media Technologies 25, no. 4 (2019): 590–606. http://dx.doi.org/10.1177/1354856519845748.

Full text
Abstract:
Printing is not a new media technology, but it is continuously being renewed. In this sense, it is an example of novelty going largely unnoticed, woven into the quotidian and ordinary in unassuming ways. One reason for this is the incomplete way we tell the story of printed paper, which privileges narratives of readings, access, and dissemination. To complicate the way media scholars think printing, this article turns to the case of security printing, which produces objects like banknotes and passports that circulate with trust and authority. Here, printing emerges through the specific need to
APA, Harvard, Vancouver, ISO, and other styles
11

Kulhare, Rachna, and Dr Divakar Singh. "Survey paper on intrusion detection techniques." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 6, no. 2 (2013): 329–35. http://dx.doi.org/10.24297/ijct.v6i2.3498.

Full text
Abstract:
Network security has been one of the most important problems in Computer Network Management and Intrusion is the most publicized threats to security. In recent years, intrusion detection has emerged as an important field for network security. IDSs obtain better results when each class ofattacks is treated as a separate problem and handled by specialized algorithms. Now in days various model and method are available for intrusion detection. In this paper, we present a study of intrusion detection. Detection method to improve the detection rate & helping the users to develop secure informat
APA, Harvard, Vancouver, ISO, and other styles
12

Omorog, Challiz, and Ruji Medina. "Internet Security Awareness of Filipinos: A Survey Paper." International Journal of Computing Sciences Research 1, no. 4 (2018): 14–26. http://dx.doi.org/10.25147/ijcsr.2017.001.1.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Goucher, Wendy. "Paper cuts: security in non-digital written media." Computer Fraud & Security 2008, no. 8 (2008): 11–12. http://dx.doi.org/10.1016/s1361-3723(08)70126-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ogawa, Kazuto. "[Invited Paper] Security Technologies for Enriched Broadcasting Services." ITE Transactions on Media Technology and Applications 6, no. 1 (2018): 53–63. http://dx.doi.org/10.3169/mta.6.53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Marshall, Paul Jeffery. "Online Banking: Information Security vs. Hackers Research Paper." International Journal of Scientific and Engineering Research 1, no. 1 (2010): 1–5. http://dx.doi.org/10.14299/ijser.2010.01.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Sirisha, Mamilla, and Neelam Syamala. "RFID Based Security for Exam Paper Leakage System." International Journal of Engineering & Technology 7, no. 4.36 (2018): 841. http://dx.doi.org/10.14419/ijet.v7i4.36.24542.

Full text
Abstract:
The examination may be the heart of the education framework. The principal reason for the examination will be to select the proficient applicants for several positions. Every year we get the news regarding postponed/canceled exam because of paper leakages. So we need come up with manageable and compact result and decided to design and execute an “examination paper leakage security framework “that will be a much-protected framework depend on “ARM processor”. Together with “the GSM modem, keypad, electromagnetic lock, and RFID module “would be utilized in this framework. First, the university wi
APA, Harvard, Vancouver, ISO, and other styles
17

Riaz, Naveed, Ayesha Riaz, and Sajid Ali Khan. "Biometric template security: an overview." Sensor Review 38, no. 1 (2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.

Full text
Abstract:
Purpose The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the general acceptance of biometrics. The purpose of this paper is to provide an overview of different techniques and processes for securing the biometric templates. Furthermore, the paper explores current research trends in this area. Design/methodology/approach In this paper, the authors provide an overview and survey of different features transformation techniques and biometric cryptosystems. Findings Feature
APA, Harvard, Vancouver, ISO, and other styles
18

Pavlović, Dejan, and Vilmoš Tot. "Economic security as a function of corporate security: A stakeholders' perspective." Civitas 10, no. 1 (2020): 159–79. http://dx.doi.org/10.5937/civitas2001159p.

Full text
Abstract:
Stakeholders have a dramatic impact on the corporate security organisation within a corporate system. Equity holders, managers, employees, trade unions, and other internal stakeholders exert the greatest influence on the corporate security system. As corporate security operations expand and become intertwined with different business processes, corporate security's impact on the company revenue grows higher. This paper will discuss the results of the study conducted among the staff of the NIS j.s.c. Procurement Sector. The goal of this paper is to examine how the employees, being significant in
APA, Harvard, Vancouver, ISO, and other styles
19

Lee, Sang-Hwa, Min-Sik Kim, Jong-Kyu Kim, and Ic-Pyo Hong. "Design of Security Paper with Selective Frequency Reflection Characteristics." Sensors 18, no. 7 (2018): 2263. http://dx.doi.org/10.3390/s18072263.

Full text
Abstract:
In this research, a security paper based on frequency selective structure technologies was designed and fabricated using selective wave reflection characteristics to prevent the offline leakage of confidential documents. Document leakage detection systems using security papers detect security papers using transceiving antenna gates. For the application of such systems, the structure must be designed with excellent reflection performance and stability at the angle of incidence. For this purpose, a loop and patch-type frequency selective structure based on a four-legged element structure was des
APA, Harvard, Vancouver, ISO, and other styles
20

Šmaguc, Beatrica. "The EU Battlegroups (EUBGs) – a successful story or a paper tiger?" Croatian International Relations Review 19, no. 68 (2013): 106–27. http://dx.doi.org/10.2478/cirr-2013-0005.

Full text
Abstract:
Abstract After decades of reliance upon NATO in security matters, the EU ought to develop security assets of its own in order to protect its interests and citizens. The Common Foreign and Security Policy as an expression of EU readiness and willingness to play a more significant role in security matters on the international stage led to the creation of the European Security and Defence Policy, thus putting at the EU’s disposal civilian and military capabilities for dealing with the crisis spots around the world. The EUBG concept originated with the first member states’ pledges in November 2004
APA, Harvard, Vancouver, ISO, and other styles
21

Mohan, Anand. "SURVEY PAPER ON IOT ATTACKS AND ITS PREVENTION MECHANISMS." Information Management and Computer Science 3, no. 2 (2020): 38–41. http://dx.doi.org/10.26480/imcs.02.2020.38.41.

Full text
Abstract:
IoT has turned into an amazing system of worldwide and worldwide changes, including numerous internet advisors, interchanges, and information trade. This paper presents state-of-the-art background, introduction, characteristics, challenges, threats, attacks, related work, and security architecture and research limitation of IoT technology. This paper discusses key security issues and attacks over different layers of IOT along with its existing prevention techniques. This paper deals with the security of services used in IoT. In detail, IoT devices are mentioned in this paper, which are the pre
APA, Harvard, Vancouver, ISO, and other styles
22

Beck, Kate. "Smart Security?" Transportation Research Record: Journal of the Transportation Research Board 2604, no. 1 (2017): 37–43. http://dx.doi.org/10.3141/2604-05.

Full text
Abstract:
Smart city initiatives, which involve the connection and automation of city systems and services through the use of information and communication technology, offer significant opportunities to improve efficiency and address many environmental, economic, and social issues faced by U.S. cities. However, as systems become increasingly connected and automated, these systems and the people whom they serve become more vulnerable to an array of security threats, including cybersecurity attacks and attacks on the physical infrastructure and human lives. This paper focuses on how U.S. cities plan to mi
APA, Harvard, Vancouver, ISO, and other styles
23

Kalakuntla, Rohit, Anvesh Babu Vanamala, and Ranjith Reddy Kolipyaka. "Cyber Security." HOLISTICA – Journal of Business and Public Administration 10, no. 2 (2019): 115–28. http://dx.doi.org/10.2478/hjbpa-2019-0020.

Full text
Abstract:
Abstract Cyber Security accepts a vigorous role in the area of information technology. Safeguarding the information has become an enormous problem in the current day. The cybersecurity the main thing that originates in mind is ‘cyber crimes’ which are aggregate colossally daily. Different governments and organizations are taking numerous measures to keep these cyber wrongdoings. Other than different measures cybersecurity is as yet a significant worry to many. This paper mostly emphases on cyber security and cyber terrorism. The significant trends of cybersecurity and the consequence of cybers
APA, Harvard, Vancouver, ISO, and other styles
24

Shah, Dhara P. "China’s Maritime Security Strategy: An Assessment Of The White Paper On Asia-Pacific Security Cooperation." Maritime Affairs: Journal of the National Maritime Foundation of India 13, no. 1 (2017): 1–13. http://dx.doi.org/10.1080/09733159.2017.1317122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Oghuvbu, Ejiroghene Augustine. "Security And The Challenges Of Securing Nigerian State." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 3924–30. http://dx.doi.org/10.17762/turcomat.v12i3.1681.

Full text
Abstract:
Nigeria, like most developing States is still grappling with the task of nation – building, responsive democratic order and a just and secured polity. The task over the years has remained arduous and seemingly illusive. Presently, the menance of Boko Haram, the marauding herdsmen militancy, the new face of militancy in the Niger Delta, the spate of kidnappings, armed robberies, and ethno-regional intolerance, the vociferous separatist agitations in the South-East and South-South and the deteriorating living conditions have continued to create survival, stability and security challenges and thr
APA, Harvard, Vancouver, ISO, and other styles
26

More, Harshada B., and Anjali R. Bodkhe. "Survey Paper on Door Level Security using Face Recognition." IJARCCE 6, no. 3 (2017): 68–72. http://dx.doi.org/10.17148/ijarcce.2017.6316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Pereira, Anthony Wynne. "Paper cemeteries: informal barriers to Brazilian public security reform." Revista Brasileira de Ciências Policiais 10, no. 1 (2019): 55. http://dx.doi.org/10.31412/rbcp.v10i1.559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Paswan, Sanju. "Review Paper on Data Security in Wireless Sensor Network." International Journal for Research in Applied Science and Engineering Technology 6, no. 4 (2018): 1048–53. http://dx.doi.org/10.22214/ijraset.2018.4176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

CHANDER, PARKASH. "POLICY BRIEF PAPER: REFORMING THE NATIONAL FOOD SECURITY PROGRAM." Singapore Economic Review 61, no. 04 (2016): 1671001. http://dx.doi.org/10.1142/s0217590816710016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Joffe, Josef. "The security implications of a United Germany: Paper I." Adelphi Papers 30, no. 257 (1990): 84–91. http://dx.doi.org/10.1080/05679329008449025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Blackwill, Robert. "The security implications of a United Germany: Paper II." Adelphi Papers 30, no. 257 (1990): 92–95. http://dx.doi.org/10.1080/05679329008449026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Drake, Paul. "‘Socialising’ the Domain of Information Security A Positioning Paper." OR Insight 18, no. 3 (2005): 15–23. http://dx.doi.org/10.1057/ori.2005.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Gilli, Andrea, Alessandro R. Ungaro, and Alessandro Marrone. "The Italian White Paper for International Security and Defence." RUSI Journal 160, no. 6 (2015): 34–41. http://dx.doi.org/10.1080/03071847.2015.1122978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ma, Di, and Gene Tsudik. "Security and privacy in emerging wireless networks [Invited Paper]." IEEE Wireless Communications 17, no. 5 (2010): 12–21. http://dx.doi.org/10.1109/mwc.2010.5601953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Aalam, Zunaid, Vinod Kumar, and Surendra Gour. "A review paper on hypervisor and virtual machine security." Journal of Physics: Conference Series 1950, no. 1 (2021): 012027. http://dx.doi.org/10.1088/1742-6596/1950/1/012027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Sun, Bo, and Hua Chen. "Communication Security in MAS with XML Security Specifications." Applied Mechanics and Materials 65 (June 2011): 251–54. http://dx.doi.org/10.4028/www.scientific.net/amm.65.251.

Full text
Abstract:
With widely applications of Multi-Agent System (MAS) on internet and intranet, how to ensure security regarding multi-agent communication is a big issue. Traditional cryptographic technologies support a coarse granularity security. This paper adopts XML security technology to provide a security mechanism for MAS communication. With the combination of XML security specifications and MAS, the paper presents a fine-grained security model for MAS communication. The model proposed can satisfy the security requirements of MAS communication based on XML data format.
APA, Harvard, Vancouver, ISO, and other styles
37

Verma, Dr Seema, Pooja Srivastava, Divya Ramavat, and Nupur Srivastava. "A Review Paper on Comparative Study of FPGA Implementation of Adhoc Security Algorithms." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 7, no. 1 (2013): 955–61. http://dx.doi.org/10.24297/ijmit.v7i1.718.

Full text
Abstract:
Nowadays data security is an important issue for decentralized networks like Adhoc Network. In this paper, we have proposed the study of five FPGA implementated data security algorithms specially designed for adhoc network. We have proposed the role of FPGAs within a security system and provided the solutions to security challenges. The result shows that FPGA implementation outperforms software and processors implementation by 20 and 140 times respectively.
APA, Harvard, Vancouver, ISO, and other styles
38

KISH, L. B. "RESPONSE TO FENG HAO'S PAPER "KISH'S KEY EXCHANGE SCHEME IS INSECURE"." Fluctuation and Noise Letters 06, no. 04 (2006): C37—C41. http://dx.doi.org/10.1142/s021947750600363x.

Full text
Abstract:
In a forthcoming paper in IEE Proceedings Information Security, Feng Hao claims that temperature inaccuracies make the key exchange scheme based on Kirchhoff Loop with Johnson-like Noise insecure. First we point out that this claim is irrelevant for the security of the idealized/mathematical communicator because it violates basic assumptions. Furthermore, in general practical applications, as it has been pointed out in the very first paper, the use of thermal noise is disadvantageous therefore the issue of temperature and its accuracy is unimportant even for the security of common practical re
APA, Harvard, Vancouver, ISO, and other styles
39

Jiang, Qing Chao. "Analysis on Wireless LAN Security Issues and Security Implementation." Advanced Materials Research 1030-1032 (September 2014): 1657–59. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.1657.

Full text
Abstract:
With the global population of informatization and digitization, network technology is playing a very important role in people's lives. The role of wireless LAN applications is especially significant. People's daily lives and work are no longer confined to paper or wired connection, but gradually extend to the use of radio. Although it brought a lot of convenience to people's lives, wireless LAN security problems also frequently occurred. This paper mainly aims to analyze the security risk and at the same time offer some preventive measures.
APA, Harvard, Vancouver, ISO, and other styles
40

Płonka, Bogusław. "Ensuring Organisational Security from the Perspective of Security Sciences." Security Dimensions 28, no. 28 (2018): 122–40. http://dx.doi.org/10.5604/01.3001.0013.1617.

Full text
Abstract:
This paper is dedicated to the topic of security in the context of activities carried out by organisations. The analysis of the security-related context of the enterprises, decisions and threats that often co-occur with organisational activities is an interesting challenge for a researcher. The aspiration to ensure their own survival and undisturbed development is the basic driving force behind all organisations. In the following paper, the author explains the meaning of basic terms connected with the aforementioned issues, such as uncertainty, risk and security. The models and dimensions of c
APA, Harvard, Vancouver, ISO, and other styles
41

Lee, Sang-Hwa, Min-Sik Kim, Jong-Kyu Kim, Jong-In Lim, and Ic-Pyo Hong. "Security Paper Design with Frequency-Selective Structure for X-Band Electromagnetic Detection System." International Journal of Antennas and Propagation 2018 (August 1, 2018): 1–8. http://dx.doi.org/10.1155/2018/9836937.

Full text
Abstract:
This study designed and fabricated a frequency-selective structure-based security paper for the electromagnetic detection system of a security gate, which aims to prevent leakage of confidential documents. When a functional paper embedded with a frequency-selective pattern that selectively reflects a specific frequency is being leaked out of a security zone, the electromagnetic detection system receives and detects the intensity of the electromagnetic wave reflected from the security paper passing through an antenna gate, which transmits/receives RF signals. A stable detection performance of t
APA, Harvard, Vancouver, ISO, and other styles
42

Yang, Xia. "A Novel Information Security Model for Securing Information Systems." Applied Mechanics and Materials 685 (October 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.

Full text
Abstract:
Securing information system in current information era is very important task. This paper presents a novel security model in order to secure sensitive information systems. This model combines protection, detection, recovery and control mechanisms to secure information system in their development lifecycle, which is more effective than the traditional ones.
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Qing Cheng, Ke Zhu, Jie Ma, and Jin Zhang. "Study on E-Paper Controller Integrated with DRM." Advanced Materials Research 505 (April 2012): 267–73. http://dx.doi.org/10.4028/www.scientific.net/amr.505.267.

Full text
Abstract:
Security vulnerabilities and the slow speed of traditional Digital Rights Management (DRM) in E-Paper device are the major restrictions of E-Paper industry. This paper introduces a new type of E-Paper controller which is integrated with DRM. DRM is realized in hardware. Data stored in main memory and controller memory or transferred from CPU to controller are encrypted. So that so they are more secure. Display process and decryption process are combined into one pipeline and can run simultaneously. Thus higher speed and less security vulnerabilities are given to controller.
APA, Harvard, Vancouver, ISO, and other styles
44

KATAHARA, Eiichi. "Analysing the Perceptions, Key Issues and Challenges of Japan’s New Defence White Paper 2020." East Asian Policy 12, no. 04 (2020): 5–18. http://dx.doi.org/10.1142/s1793930520000276.

Full text
Abstract:
Japan’s new defence white paper offers an overview of the security environment surrounding Japan and the numerous issues concerning Tokyo’s defence and security policy. It highlights North Korea’s increasing missile-related technologies, China’s growing military power and assertive activities, and the impact of the COVID-19 (coronavirus disease 2019) infection on security issues. Japan will likely remain a cautious security policy player while emerging as a robust military power with growing deterrence and defence capabilities.
APA, Harvard, Vancouver, ISO, and other styles
45

Al Chukwuma, Okoli. "Security, Securitization and the Iperative for a New Security Studies." JOURNAL OF ADVANCES IN HUMANITIES 4, no. 5 (2016): 575–79. http://dx.doi.org/10.24297/jah.v4i2.5063.

Full text
Abstract:
This paper reviews the concepts of security and securitization in an attempt to underscore the bourgeoning complexion of the security problematique in the contemporary world. By means of a discursive exegesis of extant literature, the paper posits that the transformation of the security discourse and practice from the orthodox traditional tradition to the critical modern tradition has compelled a new understanding of security; necessitating, thereby, a new Security Studies.
APA, Harvard, Vancouver, ISO, and other styles
46

Bai, Yan, Lirong Dai, and Juan Li. "Issues and Challenges in Securing eHealth Systems." International Journal of E-Health and Medical Communications 5, no. 1 (2014): 1–19. http://dx.doi.org/10.4018/ijehmc.2014010101.

Full text
Abstract:
With the widespread eHealth usage, security of eHealth services is becoming increasingly important. In this paper, we analyze the security problems in eHealth systems, discuss various approaches of securing health data collection and sharing proposed in the recent literature on eHealth security, and provide comparative evaluations that include advantages and limitations of each approach. Possible future research directions on each approach for enhancing security for eHealth applications are also suggested.
APA, Harvard, Vancouver, ISO, and other styles
47

Kansal, Rajnish. "Review Paper on Security of Cloud Computing using Genetic Algorithm." International Journal for Research in Applied Science and Engineering Technology 7, no. 7 (2019): 357–59. http://dx.doi.org/10.22214/ijraset.2019.7054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Jung, Sun-Young, Sang-Hyuk Gil, Young-Wook Kim, and Yung-Bum Seo. "Use of New Fibers for the Development of Security Paper." Journal of Korea Technical Association of The Pulp and Paper Industry 44, no. 1 (2012): 16–23. http://dx.doi.org/10.7584/ktappi.2012.44.1.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Haijun Zhou, Jun Ji, Yiping Lu, and Yaodong Cui. "Security Analysis of DCS Network in Pump and Paper Factory." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 11 (2013): 83–92. http://dx.doi.org/10.4156/aiss.vol5.issue11.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Trento, Stringa Luig. "Installation for quality control of printed sheets, especially security paper." Computer Integrated Manufacturing Systems 10, no. 2 (1997): 175–76. http://dx.doi.org/10.1016/s0951-5240(97)84339-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!