Academic literature on the topic 'Security Thread'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Thread.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security Thread"
Sun, Fu. "Analysis of the Screw Thread Connection Strength Based on Nonlinear Finite Element Method." Applied Mechanics and Materials 401-403 (September 2013): 55–58. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.55.
Full textWang, Meidi, Haoyun Liu, Pan Huang, and Zhe Wu. "Penetrating Imaging of Concealed Features in Banknotes with Near-Field Scanning Microwave Microscopy." Electronics 13, no. 23 (2024): 4729. http://dx.doi.org/10.3390/electronics13234729.
Full textSpahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 1, no. 2 (2015): 62. http://dx.doi.org/10.26417/ejis.v1i2.p62-67.
Full textSpahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 2, no. 1 (2015): 62. http://dx.doi.org/10.26417/ejis.v2i1.p62-67.
Full textLiu, Jian, Dong Sheng Fan, Yue Wu, Guo Jiang Fu, and Mei Ju Liu. "Study of Remote Elevator Monitoring Fault Detection System." Advanced Materials Research 499 (April 2012): 459–63. http://dx.doi.org/10.4028/www.scientific.net/amr.499.459.
Full textZou, Changwei, Xudong Wang, Yaoqing Gao, and Jingling Xue. "Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization." ACM Transactions on Software Engineering and Methodology 31, no. 2 (2022): 1–37. http://dx.doi.org/10.1145/3494516.
Full textEt. al., Pavithra G,. "A Novel Watermarking and Re-Encryption Approach to Avoid Illegal Content Sharing In Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 2603–9. http://dx.doi.org/10.17762/turcomat.v12i2.2229.
Full textBui, Phuc, Minh Le, Binh Hoang, Nguyen Ngoc, and Huong Pham. "Data Partitioning and Asynchronous Processing to Improve the Embedded Software Performance on Multicore Processors." Informatics and Automation 21, no. 2 (2022): 243–74. http://dx.doi.org/10.15622/ia.21.2.2.
Full textPriambodo, Agung. "PERSIMPANGAN DILEMA PENANGANAN PENGUNGSI ASING DI INDONESIA PASCA PENERBITAN PERPRES NO. 125 TAHUN 2016." Cakrawala - Jurnal Humaniora 21, no. 2 (2021): 122–29. http://dx.doi.org/10.31294/jc.v21i2.10995.
Full textWoody, Carol. "Mission Thread Security Analysis: A Tool for Systems Engineers to Characterize Operational Security behavior." INSIGHT 16, no. 2 (2013): 37–40. http://dx.doi.org/10.1002/inst.201316237.
Full textDissertations / Theses on the topic "Security Thread"
Christensson, Daniel, and Emelie Eriksson. "The Smart Home From a Security Perspective." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40185.
Full textRusso, Luigi. "The Phantom Thread Between Malleable and Non-Malleable Cryptography." Electronic Thesis or Diss., Sorbonne université, 2025. http://www.theses.fr/2025SORUS070.
Full textOlandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Full textBlažek, Ondřej. "Generátor nelegitimního síťového provozu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317007.
Full textZahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.
Full textMabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.
Full textTakacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.
Full textLambe, Erik. "Information Security Culture and Threat Perception : Comprehension and awareness of latent threats in organisational settings concerned with information security." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352263.
Full textPiškula, David. "Internet of Things." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399196.
Full textGrytsenko, Denys. "Migration and Security in Europe." Thesis, Högskolan i Halmstad, Sektionen för hälsa och samhälle (HOS), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-16319.
Full textBooks on the topic "Security Thread"
Jalal, Massouda. Hanging by a thread: Afghan women's rights and security threats. IFFRAS, 2014.
Find full textJalal, Massouda. Hanging by a thread: Afghan womens rights and security threats. Gyan, 2016.
Find full textRemerowski, Ted, and Marrin Canell. Security threat. Films for the Humanities and Sciences, 2004.
Find full textPolice, Illinois State. Bomb threats: Recommended procedures for : security, handling the threat, evacuation, the search. Illinois State Police, 1996.
Find full textUnited States. Dept. of State. Office of Public Communication. Editorial Division, ed. Narcotics: Threat to global security. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1990.
Find full textS, Nagar K., Sharma Gautam, and International Seminar on "The Security of the Indian Sub-Continent: Challenges from the Super Power Politics" (1986 : University of Gorakhpur), eds. India's security: Super power threat. Reliance Pub. House, 1990.
Find full textS, Nagar K., Sharma Gautam, and International Seminar on "The Security of the Indian Sub-Continent: Challenges from the Super Power Politics" (1986 : University of Gorakhpur), eds. India's security: Super power threat. Reliance, 1987.
Find full textUnited States. Dept. of the Air Force and United States. Air Force Satellite Control Network System Program Office, eds. The hacker threat: ADP security. Dept. of the Air Force, 1989.
Find full text1953-, Aldis Anne, and Herd Graeme P, eds. Soft security threats and European security. Routledge, 2005.
Find full textIII, Clark Champ, ed. Infosecurity 2008 threat analysis. Syngress Publishing, 2008.
Find full textBook chapters on the topic "Security Thread"
Knobloch, Martin. "Thread Risk Modelling." In Web Application Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_12.
Full textGuo, Yan, Yu Wang, Guodong Ding, Donglin Cao, Gang Zhang, and Yi Lv. "Juicer: Scalable Extraction for Thread Meta-information of Web Forum." In Intelligence and Security Informatics. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01393-5_15.
Full textKyriakides, Ioannis, Stelios Neophytou, Anastasis Kounoudes, Konstantinos Michail, Yiannis Argyrou, and Thomas Wieland. "Processing and Communications Rate Requirements in Sensor Networks for Physical Thread Assessment." In Critical Information Infrastructures Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31664-2_4.
Full textWang, Lei, Menghan Hu, Duo Li, Zhaohui Che, and Xiaoliang Zhang. "Security Thread Detection in Passport Using Improved Template Matching." In Communications in Computer and Information Science. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8108-8_8.
Full textKümmel, Gerhard. "Debating German Special Forces: A Scandal in the Military, a Documentary, and a Thread." In Advanced Sciences and Technologies for Security Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47511-6_8.
Full textPorcar, Manuel. "Biological Standards and Biosecurity: The Unexplored Link." In NATO Science for Peace and Security Series C: Environmental Security. Springer Netherlands, 2021. http://dx.doi.org/10.1007/978-94-024-2086-9_4.
Full textMöller, Dietmar P. F. "Threats and Threat Intelligence." In Advances in Information Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_2.
Full textChaudhary, Hafiz Ahmad Awais, Ivan Guevara, Jobish John, et al. "Model-Driven Engineering in Digital Thread Platforms: A Practical Use Case and Future Challenges." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19762-8_14.
Full textJohnson, Ross. "Security Measures." In Antiterrorism and Threat Response, 2nd ed. CRC Press, 2020. https://doi.org/10.4324/9781003374015-7.
Full textJohnson, Ross. "Security Management Programs." In Antiterrorism and Threat Response, 2nd ed. CRC Press, 2020. https://doi.org/10.4324/9781003374015-19.
Full textConference papers on the topic "Security Thread"
Murugesan, Kumar, Muralidhara VN, and Tirth Master. "Comprehensive Security Analysis and DoS Attack Mitigation in Thread Networks." In 2025 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2025. https://doi.org/10.1109/wcnc61545.2025.10978458.
Full textSingh, Kamal, Rohit Saxena, and Brijesh Kumar. "AI Security: Cyber Threats and Threat-Informed Defense." In 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, 2024. https://doi.org/10.1109/csnet64211.2024.10851770.
Full textSampath, Amrutha, Kristofor Dickson, George W. Lange, Carey Wu, and Keith A. Serrels. "Evaluation of the Analyzability of Complex Secure Intellectual Property Using Fault Isolation Techniques versus the Hardware Security Threat They Pose." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0385.
Full textSaxena, Akshat, J. Vijayashree, J. Jayashree, Vaibhavi Jha, and Sidharth Kakrani. "Securing the Threads: In-Depth Analysis of IoT Architecture and Threat Mitigation." In 2024 13th International Conference on System Modeling & Advancement in Research Trends (SMART). IEEE, 2024. https://doi.org/10.1109/smart63812.2024.10882542.
Full textNishchal, Naveen K. "Information Security using the Properties of Optical Vortex Lattice." In Digital Holography and Three-Dimensional Imaging. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/dh.2024.m4b.6.
Full textRao, Sonu Kumar, and Naveen K. Nishchal. "Optical Asymmetric Color Image Encryption using Vector Light Field Encoding." In Digital Holography and Three-Dimensional Imaging. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/dh.2024.w4a.36.
Full textWang, Andy Ju An. "A security thread in a thread-based curriculum." In the 9th ACM SIGITE conference. ACM Press, 2008. http://dx.doi.org/10.1145/1414558.1414609.
Full textUnwala, Ishaq, Zafar Taqvi, and Jiang Lu. "IoT Security: ZWave and Thread." In 2018 IEEE Green Technologies Conference (GreenTech). IEEE, 2018. http://dx.doi.org/10.1109/greentech.2018.00040.
Full textAkestoridis, Dimitrios-Georgios, Vyas Sekar, and Patrick Tague. "On the Security of Thread Networks." In WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2022. http://dx.doi.org/10.1145/3507657.3528544.
Full textBrotzman, Robert, Danfeng Zhang, Mahmut Kandemir, and Gang Tan. "Ghost Thread." In CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy. ACM, 2021. http://dx.doi.org/10.1145/3422337.3447846.
Full textReports on the topic "Security Thread"
Ozano, Kim, Andrew Roby, and Jacob Tompkins. Learning Journey on Water Security: UK Water Offer. Institute of Development Studies (IDS), 2022. http://dx.doi.org/10.19088/k4d.2022.026.
Full textSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Characterization. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126557.
Full textSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Definition. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126558.
Full textSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Characterization Worksheets. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126571.
Full textMontelibano, Joji, and Andrew Moore. Insider Threat Security Reference Architecture. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada609926.
Full textPasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textAlneyadi, Matar J. Gulf Security and the Iranian Threat. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada347197.
Full textKent, S., and A. Chi. Threat Model for BGP Path Security. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7132.
Full textGattis, Vanessa M. Obesity: A Threat to National Security? Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada547350.
Full textRaju, Nivedita, and Laura Grego. The Space–Nuclear Nexus in European Security. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/gepv2578.
Full text