Journal articles on the topic 'Security threat'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security threat.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Koper-Staszowska, Wioletta. "Security versus Threat – Interrelations." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 3 (2018): 22–25. http://dx.doi.org/10.5604/01.3001.0012.7517.
Full textSliusarenko, Iryna. "Essentiality and Classification of International Security Threats at the Global Level (Based on Resolutions of the UN General Assembly First Committee, 2014–2021)." International Relations: Theory and Practical Aspects, no. 13 (June 26, 2024): 57–70. https://doi.org/10.31866/2616-745X.13.2024.306861.
Full textA. K. Bagdat and Z. M. Alimzhanova. "INFORMATION SECURITY THREATS FOR INTEGRATION SYSTEMS." Bulletin of Toraighyrov University. Physics & Mathematics series, no. 4.2024 (December 30, 2024): 20–29. https://doi.org/10.48081/dfqb8925.
Full textSaptono, Edy, Ribka Keiza, and Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia." Technium Social Sciences Journal 23 (September 9, 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.
Full textGudimetla, Sandeep Reddy, and Niranjan Reddy Kotha. "AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 1 (2018): 638–42. http://dx.doi.org/10.61841/turcomat.v9i1.14730.
Full textDatta, N. Bala Suresh. "Holistic Cyber Threat Intelligence System with Bert for Advanced Threat Detection." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2662–64. https://doi.org/10.22214/ijraset.2025.68780.
Full textPotla, Srikanth. "Threat Modeling in Application Security: A Practical Approach." European Journal of Computer Science and Information Technology 13, no. 30 (2025): 10–19. https://doi.org/10.37745/ejcsit.2013/vol13n301019.
Full textJenab, Kouroush, Sam Khoury, and Kim LaFevor. "Flow-Graph and Markovian Methods for Cyber Security Analysis." International Journal of Enterprise Information Systems 12, no. 1 (2016): 59–84. http://dx.doi.org/10.4018/ijeis.2016010104.
Full textPaskauskas, R. Andrew. "Decoding 5G security: toward a hybrid threat ontology." Open Research Europe 4 (March 6, 2025): 34. https://doi.org/10.12688/openreseurope.16916.2.
Full textAlbert, Craig, Amado Baez, and Joshua Rutland. "Human security as biosecurity." Politics and the Life Sciences 40, no. 1 (2021): 83–105. http://dx.doi.org/10.1017/pls.2021.1.
Full textYarovenko, Hanna. "Evaluating the threat to national information security." Problems and Perspectives in Management 18, no. 3 (2020): 195–210. http://dx.doi.org/10.21511/ppm.18(3).2020.17.
Full textPendergrass, John C., Karen Heart, C. Ranganathan, and V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine." International Journal of Healthcare Information Systems and Informatics 9, no. 4 (2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.
Full textLe, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Full textSmirnov, R. A., and S. N. Novikov. "Research on Information Security Risk Assessment Techniques." Interexpo GEO-Siberia 6 (May 18, 2022): 250–57. http://dx.doi.org/10.33764/2618-981x-2022-6-250-257.
Full textZhang, Shuqin, Guangyao Bai, Hong Li, Peipei Liu, Minzhi Zhang, and Shujun Li. "Multi-Source Knowledge Reasoning for Data-Driven IoT Security." Sensors 21, no. 22 (2021): 7579. http://dx.doi.org/10.3390/s21227579.
Full textFarid, Miftah, and Ajeng Ayu Adhisty. "STATE ACTION AS AN INDIVIDUAL SECURITY THREAT IN CASE OF CYBERCRIME SECURITIZATION." Jurnal Pertahanan 5, no. 3 (2019): 77. http://dx.doi.org/10.33172/jp.v5i3.589.
Full textHasan, Mohamad, and Tania Malik. "AI-Enhanced VPN Security Framework: Integrating Open-Source Threat Intelligence and Machine Learning to Secure Digital Networks." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 760–68. http://dx.doi.org/10.34190/eccws.23.1.2505.
Full textBeladiya, Vandan, and Mihir Sontakke. "Cyber Security SOC Analyst." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 2409–12. https://doi.org/10.22214/ijraset.2025.67835.
Full textSharma, Gaurav, Stilianos Vidalis, Catherine Menon, Niharika Anand, and Somesh Kumar. "Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment." Electronics 10, no. 15 (2021): 1849. http://dx.doi.org/10.3390/electronics10151849.
Full textWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.pp258-267.
Full textWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.p258-267.
Full textWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. https://doi.org/10.11591/csit.v4i3.pp258-267.
Full textMehdiyev, T. M., A. K. Shaykhanova, and G. B. Bekeshova. "ANALYSIS OF THREAT INTELLIGENCE SYSTEMS." Bulletin of Shakarim University. Technical Sciences 1, no. 4(16) (2024): 49–57. https://doi.org/10.53360/2788-7995-2024-4(16)-7.
Full textAbhiram reddy bommareddy. "AI-Enhanced Microservice Security in Cloud-Based Financial Platforms: A Case Study of AWS Implementation." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1268–79. https://doi.org/10.32628/cseit241061171.
Full textKhin, Myat Nwe Win, and Myo Kay Khine Thaw Yin. "Information Sharing of Cyber Threat Intelligence with their Issue and Challenges." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 878–80. https://doi.org/10.5281/zenodo.3589821.
Full textIsmail, Assoujaa. "Designing Effective Threat Hunting to Enhance Security Programs." WSEAS TRANSACTIONS ON COMMUNICATIONS 23 (December 30, 2024): 142–48. https://doi.org/10.37394/23204.2024.23.19.
Full textPrayuda, Rendi, Fitrisia Munir, Riezki Adma Jayandi, Dini Tiara Sasmi, Cifebrima Suyastri, and Rio Sundari. "The Global Pandemic of COVID-19 as a Non-Traditional Security Threat in Indonesia." Andalas Journal of International Studies (AJIS) 11, no. 1 (2022): 63. http://dx.doi.org/10.25077/ajis.11.1.63-77.2022.
Full textبوسنان, د. سفيان. "Illegal migration and the European Union " a perusal of securing the phenomenon"." مجلة العلوم السياسية, no. 55 (February 20, 2019): 205–28. http://dx.doi.org/10.30907/jj.v0i55.20.
Full textRutvij, Shah, Puthraya Karthik, and Paul Josson. "AI-Driven Threat Intelligence Systems: Predictive Cybersecurity Models for Adaptive IT Defense Mechanisms." Global Journal of Engineering and Technology [GJET] 4, no. 2 (2025): 13–15. https://doi.org/10.5281/zenodo.14964173.
Full textSaidu, I. R., T. Suleiman, and U. E. Akpan. "THE CHALLENGES OF SECURITY THREAT IN NIGERIA CYBERSPACE." FUDMA JOURNAL OF SCIENCES 5, no. 1 (2021): 193–201. http://dx.doi.org/10.33003/fjs-2021-0501-554.
Full textSri, Kanth Mandru. "Explainable AI for Endpoint Security Threat Analysis." European Journal of Advances in Engineering and Technology 11, no. 1 (2024): 56–63. https://doi.org/10.5281/zenodo.13325168.
Full textCoyles, David. "The security-threat-community." City 21, no. 6 (2017): 699–723. http://dx.doi.org/10.1080/13604813.2017.1412598.
Full textPrins, Gwyn, and Robert Salisbury. "Risk, Threat and Security." RUSI Journal 153, no. 1 (2008): 6–11. http://dx.doi.org/10.1080/03071840801984581.
Full textFOURIE, PETER, and MARTIN SCHÖNTEICH. "AFRICA'S NEW SECURITY THREAT." African Security Review 10, no. 4 (2001): 29–42. http://dx.doi.org/10.1080/10246029.2001.9627950.
Full textCUREA, Cătălina-Gabriela. "А HYBRID SECURITY THREAT". SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 24 (28 липня 2023): 67–72. http://dx.doi.org/10.19062/2247-3173.2023.24.9.
Full textIlvonen, Ilona, and Pasi Virtanen. "Preparing for Cyber Threats with Information Security Policies." International Journal of Cyber Warfare and Terrorism 3, no. 4 (2013): 22–31. http://dx.doi.org/10.4018/ijcwt.2013100103.
Full textDervišević, Tarik, Sabina Baraković, and Jasmina Baraković Husić. "Case Study: Security of System for Remote Management of Windows." B&H Electrical Engineering 14, no. 2 (2020): 4–12. http://dx.doi.org/10.2478/bhee-2020-0007.
Full textTanvir Rahman Akash, Nusrat Jahan Sany, Lamia Akter, and Sanjida Akter Sarna. "Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 248–63. https://doi.org/10.32996/jcsts.2025.7.3.90.
Full textSemenenko, O., Y. Dobrovolsky, I. Tselishchev, V. Ivanov, Т. Akinina, and V. Dubovyi. "ON DETERMINATION OF THREATS TO THE NATIONAL SECURITY OF UKRAINE FROM THE UNDERWATER SPACE." Collection of scientific works of Odesa Military Academy 2, no. 14 (2021): 187–92. http://dx.doi.org/10.37129/2313-7509.2020.14.2.187-192.
Full textMeland, Per Håkon, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, and Paolo Giorgini. "Threat Analysis in Goal-Oriented Security Requirements Modelling." International Journal of Secure Software Engineering 5, no. 2 (2014): 1–19. http://dx.doi.org/10.4018/ijsse.2014040101.
Full textDr. S. Gopinath, Mr. M. Hemanand, Mr. P. Arunprasath, Mr. M. Vivek, Mr. P. Balaji, and S.S. Leena Charan. "Maritime Cyber security." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 02 (2025): 167–72. https://doi.org/10.47392/irjaem.2025.0029.
Full textGrachev, Aleksandr, and Aleksandr Litvinenko. "Economic losses in the system of ensuring the economic security of an economic entity and the State." Economy under Guard 1, no. 1 (2024): 51–59. http://dx.doi.org/10.36511/2078-5356-2024-1-51-59.
Full textAlbarrak, Khalied M. "Securing the Future of Web-Enabled IoT: A Critical Analysis of Web of Things Security." Applied Sciences 14, no. 23 (2024): 10867. http://dx.doi.org/10.3390/app142310867.
Full textGuchua, Alika, and Thornike Zedelashvili. "Cyberwar as a Phenomenon of Asymmetric Threat and Cyber-Nuclear Security Threats." Історико-політичні проблеми сучасного світу, no. 40 (December 15, 2019): 50–57. http://dx.doi.org/10.31861/mhpi2019.40.50-57.
Full textSliusarenko, Iryna. "Classification of the Security Threats at the Regional and Subregional Levels (Based on First Committee Resolutions of the United Nations General Assembly)." International Relations: Theory and Practical Aspects, no. 6 (December 9, 2020): 126–39. https://doi.org/10.31866/2616-745x.6.2020.218779.
Full textKaur, Rajwinder, Jasminder Kaur Sandhu, Meena Pundir, Gurjinder Singh, and Aina Mehta. "Towards a Systematic Threat Modeling Approach for Wireless Sensor Networks." ECS Transactions 107, no. 1 (2022): 8855–62. http://dx.doi.org/10.1149/10701.8855ecst.
Full textDr., Arjun Singh Chauhan. "MODERN CYBER REGULATIONS AND TECH CRIMES IN THE 21ST CENTURY." Indian Journal of Law and Society I, no. 8 (2024): 39–53. https://doi.org/10.5281/zenodo.10644551.
Full textSyomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.
Full textSheik, Al Tariq, Carsten Maple, Gregory Epiphaniou, and Mehrdad Dianati. "A Comprehensive Survey of Threats in Platooning—A Cloud-Assisted Connected and Autonomous Vehicle Application." Information 15, no. 1 (2023): 14. http://dx.doi.org/10.3390/info15010014.
Full textArat, Ferhat, and Sedat Akleylek. "Modified graph-based algorithm to analyze security threats in IoT." PeerJ Computer Science 9 (December 8, 2023): e1743. http://dx.doi.org/10.7717/peerj-cs.1743.
Full text