Academic literature on the topic 'Security Thread'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Thread.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security Thread"

1

Sun, Fu. "Analysis of the Screw Thread Connection Strength Based on Nonlinear Finite Element Method." Applied Mechanics and Materials 401-403 (September 2013): 55–58. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.55.

Full text
Abstract:
Some parts of the projectile is in screw connection, the stress and deformation caused by screw threads are important indexes of the security, and therefore stress distribution of the connection of thread must be accurately calculated. According to the structural characteristics of threaded connection, nonlinear finite element contact analysis was used, strength of the thread connection part was simulated and analyzed by applying effective loads, and this algorithm was validated.
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Meidi, Haoyun Liu, Pan Huang, and Zhe Wu. "Penetrating Imaging of Concealed Features in Banknotes with Near-Field Scanning Microwave Microscopy." Electronics 13, no. 23 (2024): 4729. http://dx.doi.org/10.3390/electronics13234729.

Full text
Abstract:
Traditional anti-counterfeiting techniques and methods are inadequate to meet the modern, sophisticated anti-counterfeiting requirement in banknotes. We applied our homemade near-field scanning microwave microscopy (NSMM) for penetrating imaging of concealed anti-counterfeiting features in banknotes. This NSMM imaged and characterized several vital concealed anti-counterfeiting features in the banknotes, including the dynamic color-shifting security threads, color-changing denomination numbers, magnetically embedded security threads, and white watermarks. At the same time, with the obstruction
APA, Harvard, Vancouver, ISO, and other styles
3

Spahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 1, no. 2 (2015): 62. http://dx.doi.org/10.26417/ejis.v1i2.p62-67.

Full text
Abstract:
The national and international security of states, nowadays, is threatened by many elements or factors, like environmental issues, the spread of mass destruction weapons, wars or ethnic conflicts in developing countries, organized crime, illegal trafficking and the corruption as a side effect of globalization. All these issues are considered as challenges that all the countries must cope with through the drafting of applicable and effective national and global security policies. The aim of this paper is the evaluation of security environment, setting forth various views over new threats or ris
APA, Harvard, Vancouver, ISO, and other styles
4

Spahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 2, no. 1 (2015): 62. http://dx.doi.org/10.26417/ejis.v2i1.p62-67.

Full text
Abstract:
The national and international security of states, nowadays, is threatened by many elements or factors, like environmental issues, the spread of mass destruction weapons, wars or ethnic conflicts in developing countries, organized crime, illegal trafficking and the corruption as a side effect of globalization. All these issues are considered as challenges that all the countries must cope with through the drafting of applicable and effective national and global security policies. The aim of this paper is the evaluation of security environment, setting forth various views over new threats or ris
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Jian, Dong Sheng Fan, Yue Wu, Guo Jiang Fu, and Mei Ju Liu. "Study of Remote Elevator Monitoring Fault Detection System." Advanced Materials Research 499 (April 2012): 459–63. http://dx.doi.org/10.4028/www.scientific.net/amr.499.459.

Full text
Abstract:
Remote Elevator Monitoring (REM) is an important means to ensure elevator secure, reliable working. In this paper, an elevator remote monitoring control scheme is proposed based on multi-threaded technology. Due to all threads in the multi-threaded technology may visit the same overall situation object and the shared resource, center system communicates with embedded terminal is achieved by the method. The remote elevator monitoring system has been designed based on the multi-threaded technology; the main thread interface function is realized by monitor center software, other management operat
APA, Harvard, Vancouver, ISO, and other styles
6

Zou, Changwei, Xudong Wang, Yaoqing Gao, and Jingling Xue. "Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization." ACM Transactions on Software Engineering and Methodology 31, no. 2 (2022): 1–37. http://dx.doi.org/10.1145/3494516.

Full text
Abstract:
Shadow stacks play an important role in protecting return addresses to mitigate ROP attacks. Parallel shadow stacks, which shadow the call stack of each thread at the same constant offset for all threads, are known not to support multi-threading well. On the other hand, compact shadow stacks must maintain a separate shadow stack pointer in thread-local storage (TLS) , which can be implemented in terms of a register or the per-thread Thread-Control-Block (TCB) , suffering from poor compatibility in the former or high performance overhead in the latter. In addition, shadow stacks are vulnerable
APA, Harvard, Vancouver, ISO, and other styles
7

Et. al., Pavithra G,. "A Novel Watermarking and Re-Encryption Approach to Avoid Illegal Content Sharing In Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 2603–9. http://dx.doi.org/10.17762/turcomat.v12i2.2229.

Full text
Abstract:
Cloud computing is a set of information stored in a cloud, it can be accessed by the user whenever there is a need to access. Cloud computing is a combination of large interconnected computers. Importance of clod computing are storage and processing power to run application. Information can be access from anywhere .Data management is also one importance of the cloud computing. It improves performance. And also a lower infrastructure cost. Lower bandwidth does not support. Another important disadvantage is security thread. Cloud computing requires a constant internet connection. By using waterm
APA, Harvard, Vancouver, ISO, and other styles
8

Bui, Phuc, Minh Le, Binh Hoang, Nguyen Ngoc, and Huong Pham. "Data Partitioning and Asynchronous Processing to Improve the Embedded Software Performance on Multicore Processors." Informatics and Automation 21, no. 2 (2022): 243–74. http://dx.doi.org/10.15622/ia.21.2.2.

Full text
Abstract:
Nowadays, ensuring information security is extremely inevitable and urgent. We are also witnessing the strong development of embedded systems, IoT. As a result, research to ensure information security for embedded software is being focused. However, studies on optimizing embedded software on multi-core processors to ensure information security and increase the performance of embedded software have not received much attention. The paper proposes and develops the embedded software performance improvement method on multi-core processors based on data partitioning and asynchronous processing. Data
APA, Harvard, Vancouver, ISO, and other styles
9

Priambodo, Agung. "PERSIMPANGAN DILEMA PENANGANAN PENGUNGSI ASING DI INDONESIA PASCA PENERBITAN PERPRES NO. 125 TAHUN 2016." Cakrawala - Jurnal Humaniora 21, no. 2 (2021): 122–29. http://dx.doi.org/10.31294/jc.v21i2.10995.

Full text
Abstract:
This article aims to unravel the issues of the threat of waves of refugees and asylum seekers in Indonesia. The concept of non-traditional security is adopted in this study as a framework for analyzing social problems of refugees and asylum seekers that have an impact on national security and interests. This research uses descriptive-qualitative analysis method to draw a common thread of threats that may arise along with the implementation of Presidential Decree no. 125 of 2016 concerning Handling of Refugees from Overseas. Referring to the results of data analysis, this study draws four reaso
APA, Harvard, Vancouver, ISO, and other styles
10

Woody, Carol. "Mission Thread Security Analysis: A Tool for Systems Engineers to Characterize Operational Security behavior." INSIGHT 16, no. 2 (2013): 37–40. http://dx.doi.org/10.1002/inst.201316237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security Thread"

1

Christensson, Daniel, and Emelie Eriksson. "The Smart Home From a Security Perspective." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40185.

Full text
Abstract:
Based on the fact that many electronic devices are digitalized in our world in order to facilitate our lives, there is a large potential for development in the home. Smart Home solutions are giving us the opportunity to control and manage for example alarms, electricity and surveillance but the technology's rapid improvement paves the way for issues related to security. The objectives for this work will bring up common communication technologies, security and vulnerabilities in the context of a Smart Home and what could be done for future work. In order to investigate the objectives, a literat
APA, Harvard, Vancouver, ISO, and other styles
2

Russo, Luigi. "The Phantom Thread Between Malleable and Non-Malleable Cryptography." Electronic Thesis or Diss., Sorbonne université, 2025. http://www.theses.fr/2025SORUS070.

Full text
Abstract:
À la pointe des techniques cryptographiques qui permettent des applications numériques sécurisées se trouvent les schémas de chiffrement à clé publique (PKE) et les preuves à divulgation nulle de connaissance (ZK). Un PKE permet à deux parties sans secret partagé de communiquer en toute sécurité, tandis que les preuves ZK valident des déclarations sans révéler quoi que ce soit au-delà de leur validité. La malléabilité, en termes cryptographiques, fait référence à la possibilité de modifier et de transformer efficacement, de manière prévisible, un message chiffré ou une preuve ; c'est une carac
APA, Harvard, Vancouver, ISO, and other styles
3

Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.

Full text
Abstract:
To be able to protect an organisation's resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation's resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful for developing an information security policy for the municipality in Ronneby, using the SS 62 77 99-1
APA, Harvard, Vancouver, ISO, and other styles
4

Blažek, Ondřej. "Generátor nelegitimního síťového provozu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317007.

Full text
Abstract:
The diploma thesis deals with the problems of DoS/DDoS attacks and development of a tool, in C lanugage, for generating them. In the first chapter the principles of DoS attacks targeting the internet and transport layers of ISO/OSI model are described and also according to their characteristics divided. Selected attacks on the application layer are also described here in detail togehter with protocols which they are based on. In the following chapter there has been created a comparison of freely available tools, which could be used as a attack generators. The practical part is dedicated to a d
APA, Harvard, Vancouver, ISO, and other styles
5

Zahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.

Full text
Abstract:
The advent of virtualization technologies has evolved the IT infrastructure and organizations are migrating to virtual platforms. Virtualization is also the foundation for cloud platform services. Virtualization is known to provide more security into the infrastructure apart from agility and flexibility. However security aspects of virtualization are often overlooked. Various attacks to the virtualization hypervisor and its administration component are desirable for adversaries. The threats to virtualization must be rigorously scrutinized to realize common breaches and knowing what is more att
APA, Harvard, Vancouver, ISO, and other styles
6

Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.

Full text
Abstract:
The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it developed during the period from 1994 to 2012. Accordingly, the assessment allows for the identification of shortcomings in the current national security policy on external security threats, based on the alignment of external threat perceptions with the Government Programme of Action. Essentially what had to be determined is whether perceived official threats correspond with the actual situation. Accordingly, the main research question of the study i
APA, Harvard, Vancouver, ISO, and other styles
7

Takacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.

Full text
Abstract:
Current thesis is a documentative approach to sum up experiences of a practical projectof implementing Cyber Threat Intelligence into an existing information securitymanagement system and delivering best practices using action design researchmethodology. The project itself was delivered to a multinational energy provider in 2017.The aim of the CTI-implementation was to improve the information security posture ofthe customer. The author, as participant of the delivery team presents an extensive reviewof the current literature on CTI and puts the need for threat intelligence into context. Theaut
APA, Harvard, Vancouver, ISO, and other styles
8

Lambe, Erik. "Information Security Culture and Threat Perception : Comprehension and awareness of latent threats in organisational settings concerned with information security." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352263.

Full text
Abstract:
A new challenge for organisations in the 21st century is how they should ensure information security in a time and environment where the widespread use of Information Communication Technologies (ICTs), such as smartphones, means that information has been made vulnerable in numerous new ways. Recent research on information security has focused on information security culture and how to successfully communicate security standards within an organisation. This study aims to examine how latent threats to information security are conceptualised and examined within an organisation in which informatio
APA, Harvard, Vancouver, ISO, and other styles
9

Piškula, David. "Internet of Things." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399196.

Full text
Abstract:
This thesis focuses on the Internet of Things and some of the most important problems it faces today. Among these are the overdependence on the Cloud and lack of autonomy, poor security and privacy, complicated initialization and power consumption. The work aims to implement a complex IoT solution that solves the discussed problems. The project is part of a collaboration with NXP Semicondutors and will be used to showcase the company's technologies.
APA, Harvard, Vancouver, ISO, and other styles
10

Grytsenko, Denys. "Migration and Security in Europe." Thesis, Högskolan i Halmstad, Sektionen för hälsa och samhälle (HOS), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-16319.

Full text
Abstract:
Migration has been seen as an issue that needs to be addressed by governments as well as international organizations such as the European Union, IOM and so on. Over the last twenty years or so many political and scholars designed to combat the problem of migration at both national and international level. This thesis aims to explain whether migration is becoming viewed as a security threat for the EU or it’s just a challenge. I will focus primarily on the issue of migration to the European Union. The theory of securitization has been used to examine the process whether the issue of migration h
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security Thread"

1

Jalal, Massouda. Hanging by a thread: Afghan women's rights and security threats. IFFRAS, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jalal, Massouda. Hanging by a thread: Afghan womens rights and security threats. Gyan, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Remerowski, Ted, and Marrin Canell. Security threat. Films for the Humanities and Sciences, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Police, Illinois State. Bomb threats: Recommended procedures for : security, handling the threat, evacuation, the search. Illinois State Police, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Dept. of State. Office of Public Communication. Editorial Division, ed. Narcotics: Threat to global security. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

S, Nagar K., Sharma Gautam, and International Seminar on "The Security of the Indian Sub-Continent: Challenges from the Super Power Politics" (1986 : University of Gorakhpur), eds. India's security: Super power threat. Reliance Pub. House, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

S, Nagar K., Sharma Gautam, and International Seminar on "The Security of the Indian Sub-Continent: Challenges from the Super Power Politics" (1986 : University of Gorakhpur), eds. India's security: Super power threat. Reliance, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Dept. of the Air Force and United States. Air Force Satellite Control Network System Program Office, eds. The hacker threat: ADP security. Dept. of the Air Force, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1953-, Aldis Anne, and Herd Graeme P, eds. Soft security threats and European security. Routledge, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

III, Clark Champ, ed. Infosecurity 2008 threat analysis. Syngress Publishing, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security Thread"

1

Knobloch, Martin. "Thread Risk Modelling." In Web Application Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Guo, Yan, Yu Wang, Guodong Ding, Donglin Cao, Gang Zhang, and Yi Lv. "Juicer: Scalable Extraction for Thread Meta-information of Web Forum." In Intelligence and Security Informatics. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01393-5_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kyriakides, Ioannis, Stelios Neophytou, Anastasis Kounoudes, Konstantinos Michail, Yiannis Argyrou, and Thomas Wieland. "Processing and Communications Rate Requirements in Sensor Networks for Physical Thread Assessment." In Critical Information Infrastructures Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31664-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Lei, Menghan Hu, Duo Li, Zhaohui Che, and Xiaoliang Zhang. "Security Thread Detection in Passport Using Improved Template Matching." In Communications in Computer and Information Science. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8108-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kümmel, Gerhard. "Debating German Special Forces: A Scandal in the Military, a Documentary, and a Thread." In Advanced Sciences and Technologies for Security Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47511-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Porcar, Manuel. "Biological Standards and Biosecurity: The Unexplored Link." In NATO Science for Peace and Security Series C: Environmental Security. Springer Netherlands, 2021. http://dx.doi.org/10.1007/978-94-024-2086-9_4.

Full text
Abstract:
AbstractThe issue of standardisation in Synthetic Biology has important implications at both the technical and governance levels. At the former, standardisation in biology (a still-ongoing process) is expected to exponentially increase the potential of synthetic biology by democratising, easing and expanding our ability to engineer life. Indeed, it has to be stressed that Synthetic Biology is -or at least aims at being- a fully engineering discipline. And engineering, from industrial to electronics, largely relies on standards. A standard is a part, piece, device or procedure with well-establi
APA, Harvard, Vancouver, ISO, and other styles
7

Möller, Dietmar P. F. "Threats and Threat Intelligence." In Advances in Information Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chaudhary, Hafiz Ahmad Awais, Ivan Guevara, Jobish John, et al. "Model-Driven Engineering in Digital Thread Platforms: A Practical Use Case and Future Challenges." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19762-8_14.

Full text
Abstract:
AbstractThe increasing complexity delivered by the heterogeneity of the cyber-physical systems is being addressed and decoded by edge technologies, IoT development, robotics, digital twin engineering, and AI. Nevertheless, tackling the orchestration of these complex ecosystems has become a challenging problem. Specially the inherent entanglement of the different emerging technologies makes it hard to maintain and scale such ecosystems. In this context, the usage of model-driven engineering as a more abstract form of glue-code, replacing the boilerplate fashion, has improved the software develo
APA, Harvard, Vancouver, ISO, and other styles
9

Johnson, Ross. "Security Measures." In Antiterrorism and Threat Response, 2nd ed. CRC Press, 2020. https://doi.org/10.4324/9781003374015-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Johnson, Ross. "Security Management Programs." In Antiterrorism and Threat Response, 2nd ed. CRC Press, 2020. https://doi.org/10.4324/9781003374015-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security Thread"

1

Murugesan, Kumar, Muralidhara VN, and Tirth Master. "Comprehensive Security Analysis and DoS Attack Mitigation in Thread Networks." In 2025 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2025. https://doi.org/10.1109/wcnc61545.2025.10978458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Kamal, Rohit Saxena, and Brijesh Kumar. "AI Security: Cyber Threats and Threat-Informed Defense." In 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, 2024. https://doi.org/10.1109/csnet64211.2024.10851770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sampath, Amrutha, Kristofor Dickson, George W. Lange, Carey Wu, and Keith A. Serrels. "Evaluation of the Analyzability of Complex Secure Intellectual Property Using Fault Isolation Techniques versus the Hardware Security Threat They Pose." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0385.

Full text
Abstract:
Abstract Secure edge devices and the need for hardware security are of paramount importance due to the growing demand for cybersecurity. Hardware security has been strengthened using complex architecture to provide uncompromisable security and prevent malicious cybersecurity attacks. To prevent unauthorized access using even the most advanced failure analysis (FA) techniques, the Hardware Security Module (HSM) implements cryptographic algorithms and data obfuscation using many raw combinational logic and state machines. When a newly taped-out device fails to operate or fails to come out of its
APA, Harvard, Vancouver, ISO, and other styles
4

Saxena, Akshat, J. Vijayashree, J. Jayashree, Vaibhavi Jha, and Sidharth Kakrani. "Securing the Threads: In-Depth Analysis of IoT Architecture and Threat Mitigation." In 2024 13th International Conference on System Modeling & Advancement in Research Trends (SMART). IEEE, 2024. https://doi.org/10.1109/smart63812.2024.10882542.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nishchal, Naveen K. "Information Security using the Properties of Optical Vortex Lattice." In Digital Holography and Three-Dimensional Imaging. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/dh.2024.m4b.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rao, Sonu Kumar, and Naveen K. Nishchal. "Optical Asymmetric Color Image Encryption using Vector Light Field Encoding." In Digital Holography and Three-Dimensional Imaging. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/dh.2024.w4a.36.

Full text
Abstract:
Vector beam is a type of beam that has inhomogeneous polarization distribution across the transverse plane. In this study, an arbitrary vector light beam is used for asymmetric color image encryption achieving high level of security.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Andy Ju An. "A security thread in a thread-based curriculum." In the 9th ACM SIGITE conference. ACM Press, 2008. http://dx.doi.org/10.1145/1414558.1414609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Unwala, Ishaq, Zafar Taqvi, and Jiang Lu. "IoT Security: ZWave and Thread." In 2018 IEEE Green Technologies Conference (GreenTech). IEEE, 2018. http://dx.doi.org/10.1109/greentech.2018.00040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Akestoridis, Dimitrios-Georgios, Vyas Sekar, and Patrick Tague. "On the Security of Thread Networks." In WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2022. http://dx.doi.org/10.1145/3507657.3528544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brotzman, Robert, Danfeng Zhang, Mahmut Kandemir, and Gang Tan. "Ghost Thread." In CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy. ACM, 2021. http://dx.doi.org/10.1145/3422337.3447846.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security Thread"

1

Ozano, Kim, Andrew Roby, and Jacob Tompkins. Learning Journey on Water Security: UK Water Offer. Institute of Development Studies (IDS), 2022. http://dx.doi.org/10.19088/k4d.2022.026.

Full text
Abstract:
The overarching goals for the UK in relation to global water security are to; tackle and reverse growing water insecurity and its consequences caused by depletion and degradation of natural water sources; and address poor water management and increasing demand. To do this, the UK has a well-developed water ‘offer’ that together can help reach the goal of global water security. This note details some of that water offer: UK water leadership: The UK developed the concept of modern sanitation and water supply, with an early example being the Victorian Bazalgette London sewer; Ownership and regula
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Characterization. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Definition. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Characterization Worksheets. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Montelibano, Joji, and Andrew Moore. Insider Threat Security Reference Architecture. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada609926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
7

Alneyadi, Matar J. Gulf Security and the Iranian Threat. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada347197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kent, S., and A. Chi. Threat Model for BGP Path Security. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gattis, Vanessa M. Obesity: A Threat to National Security? Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada547350.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Raju, Nivedita, and Laura Grego. The Space–Nuclear Nexus in European Security. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/gepv2578.

Full text
Abstract:
The space–nuclear nexus is prominent in today’s European security environment, amid shifting alliance dynamics and developments in Russia’s war in Ukraine. This paper compares dependencies, priorities and strategic cultures of various actors in the space and nuclear domains, beginning with the North Atlantic Treaty Organization (NATO), the European Union (EU) and their three nuclear-armed states: France, the United Kingdom and the United States. These actors feature centrally in Russian threat perceptions and converge on their sources of threats—primarily Russia, and to a lesser degree China,
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!