Journal articles on the topic 'Security Thread'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security Thread.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sun, Fu. "Analysis of the Screw Thread Connection Strength Based on Nonlinear Finite Element Method." Applied Mechanics and Materials 401-403 (September 2013): 55–58. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.55.
Full textWang, Meidi, Haoyun Liu, Pan Huang, and Zhe Wu. "Penetrating Imaging of Concealed Features in Banknotes with Near-Field Scanning Microwave Microscopy." Electronics 13, no. 23 (2024): 4729. http://dx.doi.org/10.3390/electronics13234729.
Full textSpahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 1, no. 2 (2015): 62. http://dx.doi.org/10.26417/ejis.v1i2.p62-67.
Full textSpahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 2, no. 1 (2015): 62. http://dx.doi.org/10.26417/ejis.v2i1.p62-67.
Full textLiu, Jian, Dong Sheng Fan, Yue Wu, Guo Jiang Fu, and Mei Ju Liu. "Study of Remote Elevator Monitoring Fault Detection System." Advanced Materials Research 499 (April 2012): 459–63. http://dx.doi.org/10.4028/www.scientific.net/amr.499.459.
Full textZou, Changwei, Xudong Wang, Yaoqing Gao, and Jingling Xue. "Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization." ACM Transactions on Software Engineering and Methodology 31, no. 2 (2022): 1–37. http://dx.doi.org/10.1145/3494516.
Full textEt. al., Pavithra G,. "A Novel Watermarking and Re-Encryption Approach to Avoid Illegal Content Sharing In Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 2603–9. http://dx.doi.org/10.17762/turcomat.v12i2.2229.
Full textBui, Phuc, Minh Le, Binh Hoang, Nguyen Ngoc, and Huong Pham. "Data Partitioning and Asynchronous Processing to Improve the Embedded Software Performance on Multicore Processors." Informatics and Automation 21, no. 2 (2022): 243–74. http://dx.doi.org/10.15622/ia.21.2.2.
Full textPriambodo, Agung. "PERSIMPANGAN DILEMA PENANGANAN PENGUNGSI ASING DI INDONESIA PASCA PENERBITAN PERPRES NO. 125 TAHUN 2016." Cakrawala - Jurnal Humaniora 21, no. 2 (2021): 122–29. http://dx.doi.org/10.31294/jc.v21i2.10995.
Full textWoody, Carol. "Mission Thread Security Analysis: A Tool for Systems Engineers to Characterize Operational Security behavior." INSIGHT 16, no. 2 (2013): 37–40. http://dx.doi.org/10.1002/inst.201316237.
Full textEilers, Marco, Thibault Dardinier, and Peter Müller. "CommCSL: Proving Information Flow Security for Concurrent Programs using Abstract Commutativity." Proceedings of the ACM on Programming Languages 7, PLDI (2023): 1682–707. http://dx.doi.org/10.1145/3591289.
Full textManasa, R., and Jayanthila Devi A. "Cyber Security Attacks Detecting Thread in the Virtual World of Corporate Sectors." International Journal of Case Studies in Business, IT, and Education (IJCSBE) 7, no. 2 (2023): 90–105. https://doi.org/10.5281/zenodo.7818522.
Full textBhatti, David Samuel, Salbia Sidrat, Shahzad Saleem, et al. "Performance analysis: Securing SIP on multi-threaded/multi-core proxy server using public keys on Diffie–Hellman (DH) in single and multi-server queuing scenarios." PLOS ONE 19, no. 1 (2024): e0293626. http://dx.doi.org/10.1371/journal.pone.0293626.
Full textSumaira Hassan, Muhammad Shafiullah, Ali Ahmed, and Fahim Muhammad Khan. "Advances in AI to Predict and Prevent Cyber Security Attacks: A Comprehensive Analysis of Modern World." Physical Education, Health and Social Sciences 3, no. 1 (2025): 47–55. https://doi.org/10.63163/jpehss.v3i1.209.
Full textKambourakis, Georgios, Constantinos Kolias, Dimitrios Geneiatakis, Georgios Karopoulos, Georgios Michail Makrakis, and Ioannis Kounelis. "A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks." Symmetry 12, no. 4 (2020): 579. http://dx.doi.org/10.3390/sym12040579.
Full textGiri, Roshan, Shanker Prasad Chimouriya, and Bal Ram Ghimire. "STUDY OF SECURITY FEATURES PRESENT IN NEPALI PASSPORT." JOURNAL OF TECHNOLOGY & INNOVATION 3, no. 2 (2023): 58–63. http://dx.doi.org/10.26480/jtin.02.2023.58.63.
Full textGharibshah, Joobin, Evangelos E. Papalexakis, and Michalis Faloutsos. "REST: A Thread Embedding Approach for Identifying and Classifying User-Specified Information in Security Forums." Proceedings of the International AAAI Conference on Web and Social Media 14 (May 26, 2020): 217–28. http://dx.doi.org/10.1609/icwsm.v14i1.7293.
Full textLi, Feng, Zhi Hua Wang, and Hu Cheng Li. "Fast Static Security Analysis of Day-Ahead Generation Scheduling 96 Period Cases Adapting to Large Power System." Advanced Materials Research 732-733 (August 2013): 669–76. http://dx.doi.org/10.4028/www.scientific.net/amr.732-733.669.
Full textPang, Toh Yen, Juan D. Pelaez Restrepo, Chi-Tsun Cheng, Alim Yasin, Hailey Lim, and Miro Miletic. "Developing a Digital Twin and Digital Thread Framework for an ‘Industry 4.0’ Shipyard." Applied Sciences 11, no. 3 (2021): 1097. http://dx.doi.org/10.3390/app11031097.
Full textGiri, R., P. Bhattarai, S. P. Chimouriya, and B. R. Ghimire. "Examination of Security Features in Nepali Currency of Denomination Rs. 500 and Rs. 1000 Using Video Spectral Comparator-6000." Journal of Nepal Physical Society 7, no. 4 (2021): 36–42. http://dx.doi.org/10.3126/jnphyssoc.v7i4.42929.
Full textB N, Mangalagowri, and Dr N. Sandeep Varma. "Intrusion Detection System of IPv6 Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 1267–74. http://dx.doi.org/10.22214/ijraset.2022.46628.
Full textJonev, Katarina, Ivan Rancic, and Hatidza Berisha. "CONTEMPORARY WARS AND ARMED CONFLICTS." Knowledge International Journal 26, no. 6 (2019): 1827–37. http://dx.doi.org/10.35120/kij26061827j.
Full textZahraa Raji Al-zobaiby. "Developing data mining algorithms for predicting cyber security risks using predictive analytics." World Journal of Advanced Research and Reviews 25, no. 2 (2025): 585–92. https://doi.org/10.30574/wjarr.2025.25.2.0344.
Full textAgrawal and Mankar. "Mobile Cloud Computing." International Journal of Ingenious Research, Invention and Development (IJIRID) 1, no. 2 (2023): 29–32. https://doi.org/10.5281/zenodo.7820178.
Full textMatveev, Aleksei Aleksandrovich. "Migration security within the system of global security: mechanisms, principles, actors." Философская мысль, no. 3 (March 2021): 66–80. http://dx.doi.org/10.25136/2409-8728.2021.3.33512.
Full textWang, Yi-Wei, and Ja-Ling Wu. "A Privacy-Preserving Symptoms Retrieval System with the Aid of Homomorphic Encryption and Private Set Intersection Schemes." Algorithms 16, no. 5 (2023): 244. http://dx.doi.org/10.3390/a16050244.
Full textGeppert, Karol, and Jerzy Konieczny. "Analysis of Potential Threats to the Critical Infrastructure of the 31st Tactical Air Base, in the Context of the Security of the Poznan Agglomeration." Przegląd Strategiczny, no. 16 (January 22, 2024): 219–35. http://dx.doi.org/10.14746/ps.2023.1.16.
Full textSingh, Anshul, Aryan Shenoy, and Nihar Thanekar. "Chain Thread: Blockchain-Powered Product Verification and Authenticity Tracking." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 4976–81. https://doi.org/10.22214/ijraset.2025.69592.
Full textAnderson, Ross, and Tyler Moore. "Information security: where computer science, economics and psychology meet." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 367, no. 1898 (2009): 2717–27. http://dx.doi.org/10.1098/rsta.2009.0027.
Full textMr., Rajeev &. Mr. Dhirender. "A SURVEY OF URBAN PEOPLE AWARENESS ABOUT NEW INDIAN CURRENCY SECURITY FEATURES AFTER DEMONETIZATION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 563–67. https://doi.org/10.5281/zenodo.829771.
Full textZhang, Rui Xia, Ya Liang Wang, and Yan Lan Liu. "Research on File System Event Monitoring in Android Platform." Applied Mechanics and Materials 443 (October 2013): 494–98. http://dx.doi.org/10.4028/www.scientific.net/amm.443.494.
Full textPaul Okudolo, Ikemefuna Taire, and Itumeleng Mekoa. "Recurring thread in local administration and its impact on human security in Africa : experience from Nigeria." African Renaissance SI, no. 3 (2019): 57–74. http://dx.doi.org/10.31920/2516-5305/2019/sin3a4.
Full textLiu, Yu, Zhibo Pang, Gyorgy Dan, Dapeng Lan, and Shaofang Gong. "A Taxonomy for the Security Assessment of IP-Based Building Automation Systems: The Case of Thread." IEEE Transactions on Industrial Informatics 14, no. 9 (2018): 4113–23. http://dx.doi.org/10.1109/tii.2018.2844955.
Full textCollins, Rob, Peter Pearson, and Peter Chattaway. "3.4.2 Improving Systems Integrity by Using Thread Analysis for Design Validation." INCOSE International Symposium 10, no. 1 (2000): 446–54. http://dx.doi.org/10.1002/j.2334-5837.2000.tb00410.x.
Full textChandra, G. Rajesh, K. Jagan Mohan, Osamah Ibrahim Khalaf, et al. "A superior secure key spawn using boosted uniqueness encryption for cloud computing in advanced extensive mobile network." SINERGI 28, no. 2 (2024): 405. http://dx.doi.org/10.22441/sinergi.2024.2.019.
Full textFlynn, Christopher, and Emily Tsokos. "Energy security, moratoria and domestic gas: Australia, LNG and its gas policy catch-22." APPEA Journal 57, no. 1 (2017): 26. http://dx.doi.org/10.1071/aj16232.
Full textBrooks, Mitchell, and Matthew Hause. "Model‐Based Cyber Security at the Enterprise and Systems Level." INCOSE International Symposium 33, no. 1 (2023): 649–65. http://dx.doi.org/10.1002/iis2.13044.
Full textWang, Wen Cai, Wen Bin Wei, and Ling Wang. "Numerical Simulation Study on Combined Supporting Scheme of Bolts and Anchor Cable." Applied Mechanics and Materials 638-640 (September 2014): 898–903. http://dx.doi.org/10.4028/www.scientific.net/amm.638-640.898.
Full textSandhya, P. K*1 &. Prof. K. S. Valsaraj2. "SURVEY ON SMART HOME TECHNOLOGIES TO UNDERSTAND ITS SCALING ISSUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Metanoia 19 (April 5, 2019): 59–62. https://doi.org/10.5281/zenodo.2630850.
Full textXia, Zhixin, Xiaolei Yang, Afei Li, Yongshan Liu, and Siyuan He. "Research on Information Security Transmission of Port Multi-Thread Equipment Based on Advanced Encryption Standard and Preprocessing Optimization." Applied Sciences 14, no. 24 (2024): 11887. https://doi.org/10.3390/app142411887.
Full textMaj, Ewa. "Suwerenność w myśli politycznej współczesnego ruchu narodowego w Polsce." Myśl Polityczna. Political Thought 2(22) (2024): 31–54. https://doi.org/10.31268/mppt.2024.14.
Full textNuriev, Marat, Rimma Zaripova, Sergey Sitnikov, and Rustam Nurgaliev. "The principles of building a parallel program for steganographic file protection." E3S Web of Conferences 458 (2023): 09027. http://dx.doi.org/10.1051/e3sconf/202345809027.
Full textLi, Hui. "Computer Security Issues and Legal System Based on Cloud Computing." Computational Intelligence and Neuroscience 2022 (July 11, 2022): 1–11. http://dx.doi.org/10.1155/2022/8112212.
Full textChen, Wei Bing, Gang Lin Zhang, and Lu Feng. "Realization and Design of Mobile Video Surveillance Client Platform Based on Smart Phone." Applied Mechanics and Materials 602-605 (August 2014): 1753–56. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.1753.
Full textXiong, Qi, Xiao Feng He, and Jie Tang. "Design and Implementation of Authentication Server with High Concurrency." Advanced Materials Research 834-836 (October 2013): 1791–94. http://dx.doi.org/10.4028/www.scientific.net/amr.834-836.1791.
Full textJamiluddin and Novia Yuliana. "THE IMPACT OF THREAD KELAMBU WATERFALL TOURISM ON THE SOCIO-ECONOMIC CONDITIONS OF THE PEOPLE OF AIK BERIK VILLAGE, BATUKLIANG UTARA SUB-DISTRICT CENTRAL LOMBOK DISTRICT." Proceedings of the International Conference on Social Studies Education (ICoSSE) 1, no. 1 (2024): 212–19. https://doi.org/10.20414/icosse.v1i1.23.
Full textWang, Kunpeng, Jingmei Li, Zhongchuan Fu, and Tianyu Chen. "IRePf: An Instruction Reorganization Virtual Platform for Kernel Stack Overflow Detection." Security and Communication Networks 2022 (May 13, 2022): 1–14. http://dx.doi.org/10.1155/2022/7645210.
Full textAl-Refai, Hasan, and Ali Ahmad Alawneh. "User Authentication and Authorization Framework in IoT Protocols." Computers 11, no. 10 (2022): 147. http://dx.doi.org/10.3390/computers11100147.
Full textSinghal, Prateek, Puneet Sharma, and Sheenu Rizvi. "Thwarting Sybil Attack by CAM Method in WSN using Cooja Simulator Framework." International Journal of Engineering & Technology 7, no. 4.19 (2018): 589–95. http://dx.doi.org/10.14419/ijet.v7i4.19.27965.
Full textIndarti, Erlyn. "Strengthen Security and Public Order: Accountability Management in Improving the Quality of Law Enforcement." Academic Journal of Interdisciplinary Studies 9, no. 2 (2020): 82. http://dx.doi.org/10.36941/ajis-2020-0025.
Full text