Journal articles on the topic 'Security paper'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security paper.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Marsh, P. "Paper defence [security]." Information Professional 2, no. 1 (2005): 34–37. http://dx.doi.org/10.1049/inp:20050105.
Full textKaur, Ravneet, and Rekha Bhatia. "Review Paper on Cloud Security." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 5 (2017): 743–46. http://dx.doi.org/10.23956/ijarcsse/v7i5/0119.
Full textDAVIS, E. H., A. W. DILNOT, and J. A. KAY. "The Social Security Green Paper." Fiscal Studies 6, no. 3 (1985): 1–8. http://dx.doi.org/10.1111/j.1475-5890.1985.tb00403.x.
Full textAnsumansamal et al.,, Ansumansamal et al ,. "A Review Paper on Food Security." International Journal of Mechanical and Production Engineering Research and Development 10, no. 3 (2020): 9575–82. http://dx.doi.org/10.24247/ijmperdjun2020913.
Full textBertino, Elisa. "Security of cellular networks position paper." CCF Transactions on Networking 3, no. 2 (2020): 93–96. http://dx.doi.org/10.1007/s42045-020-00037-8.
Full textHinduja, Ankita, and Pradip Sharma. "A Survey Paper on Password Security Techniques." International Journal of Computer Sciences and Engineering 7, no. 10 (2019): 130–36. http://dx.doi.org/10.26438/ijcse/v7i10.130136.
Full textBenqdara, Salima, and Abdelfattah Mahmoud. "Wireless Security in Libya: A Survey Paper." International Journal of Computer Applications 181, no. 35 (2019): 26–31. http://dx.doi.org/10.5120/ijca2019918309.
Full textStoukatch, O., A. Shelupanov, and E. Goloivn. "Student paper contest on Information Security SIBINFO." IEEE Communications Magazine 42, no. 2 (2004): 27–30. http://dx.doi.org/10.1109/mcom.2003.1267088.
Full textMayes, Keith E., and Konstantinos Markantonakis. "Mobile communication security controllers an evaluation paper." Information Security Technical Report 13, no. 3 (2008): 173–92. http://dx.doi.org/10.1016/j.istr.2008.09.004.
Full textKaminska, Aleksandra. "Don’t copy that: Security printing and the making of high-tech paper." Convergence: The International Journal of Research into New Media Technologies 25, no. 4 (2019): 590–606. http://dx.doi.org/10.1177/1354856519845748.
Full textKulhare, Rachna, and Dr Divakar Singh. "Survey paper on intrusion detection techniques." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 6, no. 2 (2013): 329–35. http://dx.doi.org/10.24297/ijct.v6i2.3498.
Full textOmorog, Challiz, and Ruji Medina. "Internet Security Awareness of Filipinos: A Survey Paper." International Journal of Computing Sciences Research 1, no. 4 (2018): 14–26. http://dx.doi.org/10.25147/ijcsr.2017.001.1.18.
Full textGoucher, Wendy. "Paper cuts: security in non-digital written media." Computer Fraud & Security 2008, no. 8 (2008): 11–12. http://dx.doi.org/10.1016/s1361-3723(08)70126-x.
Full textOgawa, Kazuto. "[Invited Paper] Security Technologies for Enriched Broadcasting Services." ITE Transactions on Media Technology and Applications 6, no. 1 (2018): 53–63. http://dx.doi.org/10.3169/mta.6.53.
Full textMarshall, Paul Jeffery. "Online Banking: Information Security vs. Hackers Research Paper." International Journal of Scientific and Engineering Research 1, no. 1 (2010): 1–5. http://dx.doi.org/10.14299/ijser.2010.01.001.
Full textSirisha, Mamilla, and Neelam Syamala. "RFID Based Security for Exam Paper Leakage System." International Journal of Engineering & Technology 7, no. 4.36 (2018): 841. http://dx.doi.org/10.14419/ijet.v7i4.36.24542.
Full textRiaz, Naveed, Ayesha Riaz, and Sajid Ali Khan. "Biometric template security: an overview." Sensor Review 38, no. 1 (2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.
Full textPavlović, Dejan, and Vilmoš Tot. "Economic security as a function of corporate security: A stakeholders' perspective." Civitas 10, no. 1 (2020): 159–79. http://dx.doi.org/10.5937/civitas2001159p.
Full textLee, Sang-Hwa, Min-Sik Kim, Jong-Kyu Kim, and Ic-Pyo Hong. "Design of Security Paper with Selective Frequency Reflection Characteristics." Sensors 18, no. 7 (2018): 2263. http://dx.doi.org/10.3390/s18072263.
Full textŠmaguc, Beatrica. "The EU Battlegroups (EUBGs) – a successful story or a paper tiger?" Croatian International Relations Review 19, no. 68 (2013): 106–27. http://dx.doi.org/10.2478/cirr-2013-0005.
Full textMohan, Anand. "SURVEY PAPER ON IOT ATTACKS AND ITS PREVENTION MECHANISMS." Information Management and Computer Science 3, no. 2 (2020): 38–41. http://dx.doi.org/10.26480/imcs.02.2020.38.41.
Full textBeck, Kate. "Smart Security?" Transportation Research Record: Journal of the Transportation Research Board 2604, no. 1 (2017): 37–43. http://dx.doi.org/10.3141/2604-05.
Full textKalakuntla, Rohit, Anvesh Babu Vanamala, and Ranjith Reddy Kolipyaka. "Cyber Security." HOLISTICA – Journal of Business and Public Administration 10, no. 2 (2019): 115–28. http://dx.doi.org/10.2478/hjbpa-2019-0020.
Full textShah, Dhara P. "China’s Maritime Security Strategy: An Assessment Of The White Paper On Asia-Pacific Security Cooperation." Maritime Affairs: Journal of the National Maritime Foundation of India 13, no. 1 (2017): 1–13. http://dx.doi.org/10.1080/09733159.2017.1317122.
Full textOghuvbu, Ejiroghene Augustine. "Security And The Challenges Of Securing Nigerian State." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 3924–30. http://dx.doi.org/10.17762/turcomat.v12i3.1681.
Full textMore, Harshada B., and Anjali R. Bodkhe. "Survey Paper on Door Level Security using Face Recognition." IJARCCE 6, no. 3 (2017): 68–72. http://dx.doi.org/10.17148/ijarcce.2017.6316.
Full textPereira, Anthony Wynne. "Paper cemeteries: informal barriers to Brazilian public security reform." Revista Brasileira de Ciências Policiais 10, no. 1 (2019): 55. http://dx.doi.org/10.31412/rbcp.v10i1.559.
Full textPaswan, Sanju. "Review Paper on Data Security in Wireless Sensor Network." International Journal for Research in Applied Science and Engineering Technology 6, no. 4 (2018): 1048–53. http://dx.doi.org/10.22214/ijraset.2018.4176.
Full textCHANDER, PARKASH. "POLICY BRIEF PAPER: REFORMING THE NATIONAL FOOD SECURITY PROGRAM." Singapore Economic Review 61, no. 04 (2016): 1671001. http://dx.doi.org/10.1142/s0217590816710016.
Full textJoffe, Josef. "The security implications of a United Germany: Paper I." Adelphi Papers 30, no. 257 (1990): 84–91. http://dx.doi.org/10.1080/05679329008449025.
Full textBlackwill, Robert. "The security implications of a United Germany: Paper II." Adelphi Papers 30, no. 257 (1990): 92–95. http://dx.doi.org/10.1080/05679329008449026.
Full textDrake, Paul. "‘Socialising’ the Domain of Information Security A Positioning Paper." OR Insight 18, no. 3 (2005): 15–23. http://dx.doi.org/10.1057/ori.2005.11.
Full textGilli, Andrea, Alessandro R. Ungaro, and Alessandro Marrone. "The Italian White Paper for International Security and Defence." RUSI Journal 160, no. 6 (2015): 34–41. http://dx.doi.org/10.1080/03071847.2015.1122978.
Full textMa, Di, and Gene Tsudik. "Security and privacy in emerging wireless networks [Invited Paper]." IEEE Wireless Communications 17, no. 5 (2010): 12–21. http://dx.doi.org/10.1109/mwc.2010.5601953.
Full textAalam, Zunaid, Vinod Kumar, and Surendra Gour. "A review paper on hypervisor and virtual machine security." Journal of Physics: Conference Series 1950, no. 1 (2021): 012027. http://dx.doi.org/10.1088/1742-6596/1950/1/012027.
Full textSun, Bo, and Hua Chen. "Communication Security in MAS with XML Security Specifications." Applied Mechanics and Materials 65 (June 2011): 251–54. http://dx.doi.org/10.4028/www.scientific.net/amm.65.251.
Full textVerma, Dr Seema, Pooja Srivastava, Divya Ramavat, and Nupur Srivastava. "A Review Paper on Comparative Study of FPGA Implementation of Adhoc Security Algorithms." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 7, no. 1 (2013): 955–61. http://dx.doi.org/10.24297/ijmit.v7i1.718.
Full textKISH, L. B. "RESPONSE TO FENG HAO'S PAPER "KISH'S KEY EXCHANGE SCHEME IS INSECURE"." Fluctuation and Noise Letters 06, no. 04 (2006): C37—C41. http://dx.doi.org/10.1142/s021947750600363x.
Full textJiang, Qing Chao. "Analysis on Wireless LAN Security Issues and Security Implementation." Advanced Materials Research 1030-1032 (September 2014): 1657–59. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.1657.
Full textPłonka, Bogusław. "Ensuring Organisational Security from the Perspective of Security Sciences." Security Dimensions 28, no. 28 (2018): 122–40. http://dx.doi.org/10.5604/01.3001.0013.1617.
Full textLee, Sang-Hwa, Min-Sik Kim, Jong-Kyu Kim, Jong-In Lim, and Ic-Pyo Hong. "Security Paper Design with Frequency-Selective Structure for X-Band Electromagnetic Detection System." International Journal of Antennas and Propagation 2018 (August 1, 2018): 1–8. http://dx.doi.org/10.1155/2018/9836937.
Full textYang, Xia. "A Novel Information Security Model for Securing Information Systems." Applied Mechanics and Materials 685 (October 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.
Full textLi, Qing Cheng, Ke Zhu, Jie Ma, and Jin Zhang. "Study on E-Paper Controller Integrated with DRM." Advanced Materials Research 505 (April 2012): 267–73. http://dx.doi.org/10.4028/www.scientific.net/amr.505.267.
Full textKATAHARA, Eiichi. "Analysing the Perceptions, Key Issues and Challenges of Japan’s New Defence White Paper 2020." East Asian Policy 12, no. 04 (2020): 5–18. http://dx.doi.org/10.1142/s1793930520000276.
Full textAl Chukwuma, Okoli. "Security, Securitization and the Iperative for a New Security Studies." JOURNAL OF ADVANCES IN HUMANITIES 4, no. 5 (2016): 575–79. http://dx.doi.org/10.24297/jah.v4i2.5063.
Full textBai, Yan, Lirong Dai, and Juan Li. "Issues and Challenges in Securing eHealth Systems." International Journal of E-Health and Medical Communications 5, no. 1 (2014): 1–19. http://dx.doi.org/10.4018/ijehmc.2014010101.
Full textKansal, Rajnish. "Review Paper on Security of Cloud Computing using Genetic Algorithm." International Journal for Research in Applied Science and Engineering Technology 7, no. 7 (2019): 357–59. http://dx.doi.org/10.22214/ijraset.2019.7054.
Full textJung, Sun-Young, Sang-Hyuk Gil, Young-Wook Kim, and Yung-Bum Seo. "Use of New Fibers for the Development of Security Paper." Journal of Korea Technical Association of The Pulp and Paper Industry 44, no. 1 (2012): 16–23. http://dx.doi.org/10.7584/ktappi.2012.44.1.016.
Full textHaijun Zhou, Jun Ji, Yiping Lu, and Yaodong Cui. "Security Analysis of DCS Network in Pump and Paper Factory." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 11 (2013): 83–92. http://dx.doi.org/10.4156/aiss.vol5.issue11.11.
Full textTrento, Stringa Luig. "Installation for quality control of printed sheets, especially security paper." Computer Integrated Manufacturing Systems 10, no. 2 (1997): 175–76. http://dx.doi.org/10.1016/s0951-5240(97)84339-x.
Full text