Journal articles on the topic 'Security Section'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security Section.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Khin, Thandar Tun, Sandar Aung Aye, and Lwin Thant May. "GSM Based Fire Security System." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1686–90. https://doi.org/10.5281/zenodo.3591292.
Full textMR., SHIVAM KUMAR DR. SHAMBHU KUMAR SINGH. "STRENGTHENING CLOUD SECURITY AND DATA INTEGRITY WITH INNOVATIVE ENCRYPTION METHODS." International Journal For Technological Research In Engineering 11, no. 11 (2024): 1–11. https://doi.org/10.5281/zenodo.12670480.
Full textSjoberg, Laura. "Failure and critique in critical security studies." Security Dialogue 50, no. 1 (2018): 77–94. http://dx.doi.org/10.1177/0967010618783393.
Full textMunoz-Ausecha, Cesar, Juan Ruiz-Rosero, and Gustavo Ramirez-Gonzalez. "RFID Applications and Security Review." Computation 9, no. 6 (2021): 69. http://dx.doi.org/10.3390/computation9060069.
Full textLiu, Jin Jiang, Mei He, Hong Ke Xu, Qi Wang, and Yong Mei Yang. "The Identified Method of Accident-Prone Section Based on Principal Component-Gray Clustering Analysis." Applied Mechanics and Materials 135-136 (October 2011): 1060–66. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1060.
Full textRangel de Mesquita, Maria José. "Judicial review of Common Foreign and Security Policy by the ECtHR and the (re)negotiation on the accession of the EU to the ECHR." Maastricht Journal of European and Comparative Law 28, no. 3 (2021): 356–70. http://dx.doi.org/10.1177/1023263x20988241.
Full textZhang, Feifan, Yuncai Wang, Yuehui Sun, et al. "Key Space Enhancement in Chaotic Secure Communication Utilizing Monolithically Integrated Multi-Section Semiconductor Lasers." Photonics 10, no. 2 (2023): 213. http://dx.doi.org/10.3390/photonics10020213.
Full textBrooks, Julia, and Rob Grace. "Confronting Humanitarian Insecurity." Journal of Humanitarian Affairs 2, no. 1 (2020): 11–20. http://dx.doi.org/10.7227/jha.030.
Full textVimalRosy, J., and S. Britto Ramesh Kumar. "Security Threats in Cloud Computing." Asian Journal of Computer Science and Technology 8, S1 (2019): 80–83. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1946.
Full textSheikh, Mahmood A., Syed Muhammad Bin Ahmed, and Afrasiab Ahmed Rana. "ECONOMIC SECURITY IN PAKISTAN: INDICATORS, ISSUES, IMPACTS AND WAY FORWARD." Pakistan Journal of Social Research 04, no. 01 (2022): 990–99. http://dx.doi.org/10.52567/pjsr.v4i1.1268.
Full textPatkar, Uday, Priyanshu Singh, Harshit Panse, Shubham Bhavsar, and Chandramani Pandey. "Cloud Computing and Security Fundamentals." International Journal of Computer Science and Mobile Computing 11, no. 4 (2022): 18–24. http://dx.doi.org/10.47760/ijcsmc.2022.v11i04.004.
Full textShumov, Vladislav, Evgenij Sergeevich Girnik, and Pavel Dmitrievich Senichenkov. "Scientific support of border activity." Вопросы безопасности, no. 5 (May 2020): 1–16. http://dx.doi.org/10.25136/2409-7543.2020.5.34927.
Full textShumov, Vladislav, Evgenij Sergeevich Girnik, and Pavel Dmitrievich Senichenkov. "Scientific support of border activity." Вопросы безопасности, no. 1 (January 2021): 1–16. http://dx.doi.org/10.25136/2409-7543.2021.1.34927.
Full textVenkataraman, Manickam. "Piracy off the coast of Somalia: implications for China’s maritime security." Bandung: Journal of the Global South 3, no. 1 (2016): 1–13. http://dx.doi.org/10.1186/s40728-016-0034-1.
Full textPandey, Neeraj Kumar. "Proposed Model in IoT Security Layer for Ethical Security Management." Journal of Futuristic Sciences and Applications 5, no. 2 (2022): 54–64. http://dx.doi.org/10.51976/jfsa.522208.
Full textRennels, Max R., and Ramesh B. Chaudhari. "Eye Contact and Grade Distribution." Perceptual and Motor Skills 67, no. 2 (1988): 627–32. http://dx.doi.org/10.2466/pms.1988.67.2.627.
Full textSoe, Sandar, and Aung Nyein Oo Saw. "Development of a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 357–61. https://doi.org/10.5281/zenodo.3589775.
Full textFranco Cardona, Carlos Jaime, Mónica Castañeda Riascos, Alejandro Valencia Arias, and Jonathan Bermúdez Hernández. "The energy trilemma in the policy design of the electricity market." DYNA 82, no. 194 (2015): 160–69. http://dx.doi.org/10.15446/dyna.v82n194.48595.
Full textJames, A. J. B., J. Smith, R. Hoogkamer, J. Laing, and W. M. Donovan. "Minimum and medium security." Psychiatric Bulletin 20, no. 4 (1996): 201–4. http://dx.doi.org/10.1192/pb.20.4.201.
Full textHaberman, S. "Long-term sickness and invalidity benefits: Forecasting and other actuarial problems." Journal of the Institute of Actuaries 114, no. 3 (1987): 467–550. http://dx.doi.org/10.1017/s0020268100019181.
Full textSchneider, Patricia, Fanglu Sun, and Steve Wood. "Perspectives on World and Regional Orders: Australian, Chinese and German Views." Sicherheit & Frieden 37, no. 3 (2019): 149–58. http://dx.doi.org/10.5771/0175-274x-2019-3-149.
Full textVEVERA, Victor Adrian, and Ulpia Elena BOTEZATU. "Revolutionizing space security: The Laser Patroller Satellite – A technological marvel of modern warfare." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 12, no. 2 (2023): 28–42. http://dx.doi.org/10.53477/2284-9378-23-18.
Full textALmogateef, Joharah, and Mohammed Alwajeeh. "Security Border Systems and their Impact on International Security Relations Alrashideen and Alamawi Eras, (11-132 AH /632-750 AD)." International Journal of Educational Sciences and Arts 4, no. 2 (2025): 430–62. https://doi.org/10.59992/ijesa.2025.v4n2p17.
Full textAisha, Sani Maikudi. "THE UNITED NATIONS SECURITY COUNCIL AND THE NEED FOR STREGHTENING A RULES-BASED INTERNATIONAL SYSTEM." Abuja Journal of Private and Comparative Law 2, no. 1 (2012): 264–87. https://doi.org/10.5281/zenodo.4682133.
Full textDelp, Edward J. "Special Section on Security, Steganography, and Watermarking." Journal of Electronic Imaging 15, no. 4 (2006): 041101. http://dx.doi.org/10.1117/1.2387946.
Full textHorner, Joseph L. "Guest Editorial: Special Section on Optical Security." Optical Engineering 35, no. 9 (1996): 2451. http://dx.doi.org/10.1117/1.600830.
Full textJavidi, Bahram. "Guest Editorial: Special Section on Optical Security." Optical Engineering 38, no. 1 (1999): 8. http://dx.doi.org/10.1117/1.602039.
Full textÖnen, Melek, and Thorsten Strufe. "Special section on Security and Social Networking." Computer Communications 35, no. 1 (2012): 47. http://dx.doi.org/10.1016/j.comcom.2011.10.009.
Full textKim, Tai-hoon, and Wai-chi Fang. "Special section: Grid/distributed computing systems security." Future Generation Computer Systems 25, no. 3 (2009): 351. http://dx.doi.org/10.1016/j.future.2008.10.001.
Full textKawamura, S. "Special Section on Cryptography and Information Security." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, no. 1 (2006): 1. http://dx.doi.org/10.1093/ietfec/e89-a.1.1.
Full textMORII, M. "Special Section on Cryptography and Information Security." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, no. 1 (2007): 1. http://dx.doi.org/10.1093/ietfec/e90-a.1.1.
Full textMatsui, M. "Special Section on Cryptography and Information Security." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E91-A, no. 1 (2008): 1–2. http://dx.doi.org/10.1093/ietfec/e91-a.1.1.
Full textLevine, Richard. "Trade vs. national security: Section 232 cases." Comparative Strategy 7, no. 2 (1988): 133–41. http://dx.doi.org/10.1080/01495938808402738.
Full textMs., Sahana Suresh G1* Ms. Sachana C2 Ms. Ramya K3 Dr. T. Vetrivel4 Dr.R.Satheeshkumar5. "APPLICATION OF DATA SECURITY IN ORGANIZATIONS WITH REFERENCE TO BANGALORE." ISRG Journal of Arts Humanities & Social Sciences (ISRGJAHSS) III, no. I (2025): 532–42. https://doi.org/10.5281/zenodo.14898083.
Full textDuque, Gustavo Adolfo Guarin. "Interpreting WTO Rules in Times of Contestation (Part 2): A Proposed Interpretation of Article XXI(b)iiiii of the GATT 1994 in the Light of the Vienna Convention of the Law of the Treaties." Global Trade and Customs Journal 14, Issue 1 (2019): 31–44. http://dx.doi.org/10.54648/gtcj2019004.
Full textObeid, H., F. Hillani,, R. Fakih, and K. Mozannar. "Artificial Intelligence: Serving American Security and Chinese Ambitions." Financial Markets, Institutions and Risks 4, no. 3 (2020): 42–52. http://dx.doi.org/10.21272/fmir.4(3).42-52.2020.
Full textGuo, Yuanyuan, Yao Du, Hua Gao, et al. "Chaos Synchronization of Integrated Five-Section Semiconductor Lasers." Entropy 26, no. 5 (2024): 405. http://dx.doi.org/10.3390/e26050405.
Full textZainal, Redho. "PELAKSANAAN TUGAS SEKSI KEAMANAN DAN KETERTIBAN RUMAH DETENSI IMIGRASI (RUDENIM) PEKANBARU." JIANA ( Jurnal Ilmu Administrasi Negara ) 20, no. 1 (2022): 70. http://dx.doi.org/10.46730/jiana.v20i1.8025.
Full textMillar, Jane. "Simplification, modernisation and social security." Benefits: A Journal of Poverty and Social Justice 13, no. 1 (2005): 10–15. http://dx.doi.org/10.51952/fxdz9147.
Full textTurkut, Emre. "Accommodating Security Imperatives v. Protecting Fundamental Rights." Security and Human Rights 28, no. 1-4 (2018): 62–91. http://dx.doi.org/10.1163/18750230-02801002.
Full textDasgupta, Rohee. "Section III :." Jindal Journal of International Affairs 1, no. 1 (2011): 162–63. http://dx.doi.org/10.54945/jjia.v1i1.13.
Full textQiu, Ling, and Cai Ming Liu. "An Intelligent Detection Method for Network Security." Applied Mechanics and Materials 530-531 (February 2014): 646–49. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.646.
Full textKendall, Emily C. "The Alien Terrorist Removal Court and Other National Security Measures You May Have Never Heard Of: The Need for Comprehensive National Security Reform." Texas Wesleyan Law Review 18, no. 2 (2011): 253–74. http://dx.doi.org/10.37419/twlr.v18.i2.4.
Full textRameshreddy Katkuri. "Security in cloud-native microservices: The critical foundation." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 1255–71. https://doi.org/10.30574/wjaets.2025.15.1.0321.
Full textGroves, Kenneth. "2017 Homeland Security Section Service Award - Allen Brodsky." Health Physics 113, no. 6 (2017): 438. http://dx.doi.org/10.1097/hp.0000000000000733.
Full textYunsi, Fei,, Eisenbarth, Thomas, and Serpanos, Dimitrios. "Guest Editorial: Special Section on Embedded System Security." IEEE Embedded Systems Letters 7, no. 1 (2015): 1–2. http://dx.doi.org/10.1109/les.2015.2404940.
Full textPérez, María S., and Bin Xiao. "Special section: Security on grids and distributed systems." Future Generation Computer Systems 23, no. 6 (2007): 774–75. http://dx.doi.org/10.1016/j.future.2007.02.001.
Full textNakao, K. "Special Section on Information and Communication System Security." IEICE Transactions on Information and Systems E91-D, no. 5 (2008): 1225. http://dx.doi.org/10.1093/ietisy/e91-d.5.1225.
Full textLiu, Jun, Ling Ling Pan, Yi Jun Yu, et al. "A Method of Static Security Analysis Based on Section Topology Relation." Advanced Materials Research 614-615 (December 2012): 900–906. http://dx.doi.org/10.4028/www.scientific.net/amr.614-615.900.
Full textTavuyanago, Simbarashe. "An Analysis of the "National Security Interest" Provision in terms of Section 18A of the Competition Act 89 of 1998." Potchefstroom Electronic Law Journal 24 (April 9, 2021): 1–34. http://dx.doi.org/10.17159/1727-3781/2021/v24i0a6031.
Full text