Academic literature on the topic 'Security threats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security threats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security threats"
Isokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain." Teisė 122 (March 30, 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.
Full textA. K. Bagdat and Z. M. Alimzhanova. "INFORMATION SECURITY THREATS FOR INTEGRATION SYSTEMS." Bulletin of Toraighyrov University. Physics & Mathematics series, no. 4.2024 (December 30, 2024): 20–29. https://doi.org/10.48081/dfqb8925.
Full textPrayuda, Rendi, Fitrisia Munir, Riezki Adma Jayandi, Dini Tiara Sasmi, Cifebrima Suyastri, and Rio Sundari. "The Global Pandemic of COVID-19 as a Non-Traditional Security Threat in Indonesia." Andalas Journal of International Studies (AJIS) 11, no. 1 (2022): 63. http://dx.doi.org/10.25077/ajis.11.1.63-77.2022.
Full textPASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.
Full textTanvir Rahman Akash, Nusrat Jahan Sany, Lamia Akter, and Sanjida Akter Sarna. "Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 248–63. https://doi.org/10.32996/jcsts.2025.7.3.90.
Full textSaddam RA, Angga Pranata, Sugiono, et al. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.
Full textJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (2013): 6. http://dx.doi.org/10.33317/ssurj.v3i1.62.
Full textPOPESCU, Eliza-Elena. "VoIP Security Threats." International Journal of Information Security and Cybercrime 13, no. 1 (2024): 66–70. http://dx.doi.org/10.19107/ijisc.2024.01.06.
Full textJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (2013): 6. http://dx.doi.org/10.33317/ssurj.62.
Full textSaptono, Edy, Ribka Keiza, and Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia." Technium Social Sciences Journal 23 (September 9, 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.
Full textDissertations / Theses on the topic "Security threats"
Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Full textMahmood, Faisal. "SIP Security Threats and Countermeasures." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18126.
Full textSafdar, Naveed. "Internal security threats to Pakistan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FSafdar.pdf.
Full textXu, Zhang. "Understanding Security Threats in Cloud." W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477067957.
Full textCramer, Jane Kellett 1964. "National security panics : overestimating threats to national security." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8312.
Full textWullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.
Full textByman, G. (Gabriel). "Connected devices:security threats vs. implemented security." Bachelor's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201704111464.
Full textBiswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.
Full textZakharov, I. "Threats to information security of the enterprise." Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/7954.
Full textGong, Xuwei. "Security Threats and Countermeasures for Connected Vehicles." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.
Full textBooks on the topic "Security threats"
1953-, Aldis Anne, and Herd Graeme P, eds. Soft security threats and European security. Routledge, 2005.
Find full textUnited States. Bureau of Alcohol, Tobacco, and Firearms., ed. Bomb threats and physical security planning. The Bureau, 1987.
Find full textBarnett, Dana, and Efraim Karsh. Soft Threats to National Security. Routledge, 2021. http://dx.doi.org/10.4324/9781003243151.
Full textProbst, Christian W., Jeffrey Hunker, Dieter Gollmann, and Matt Bishop, eds. Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.
Full textJones, J. Anthony A., Trahel G. Vardanian, and Christina Hakopian, eds. Threats to Global Water Security. Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2344-5.
Full textGaufman, Elizaveta. Security Threats and Public Perception. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-43201-4.
Full textApikyan, Samuel, and David Diamond, eds. Nuclear Threats and Security Challenges. Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9894-5.
Full textFutter, Andrew, ed. Threats to Euro-Atlantic Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-19730-8.
Full textRusdi, Siswanto. Maritime security and its threats. Maritime Security Coordinating Board, 2012.
Find full textOffice, New Zealand Audit. Managing threats to domestic security. Audit Office, 2003.
Find full textBook chapters on the topic "Security threats"
Möller, Dietmar P. F. "Threats and Threat Intelligence." In Advances in Information Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_2.
Full textDeFranco, Joanna F., and Bob Maley. "Security Threats." In What Every Engineer Should Know About Cyber Security and Digital Forensics, 2nd ed. CRC Press, 2022. http://dx.doi.org/10.1201/9781003245223-1.
Full textLal, Rollie. "Economic Threats." In Security Studies, 4th ed. Routledge, 2023. http://dx.doi.org/10.4324/9781003247821-35.
Full textKhan, Suhel Ahmad, Rajeev Kumar, and Raees Ahmad Khan. "Threats to Security." In Software Security. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003330516-3.
Full textKaunert, Christian, and Ori Wertman. "Reconceptualizing Security Threats." In Handbook of Security Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-91875-4_41.
Full textKurze, Arnaud, and Christopher K. Lamont. "Global Security Threats." In Mapping Global Justice. Routledge, 2022. http://dx.doi.org/10.4324/9781003143819-15.
Full textKaunert, Christian, and Ori Wertman. "Reconceptualizing Security Threats." In Handbook of Security Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-51761-2_41-1.
Full textKhalil, Kasem, Haytham Idriss, Tarek Idriss, and Magdy Bayoumi. "PUF: Security Threats." In Lightweight Hardware Security and Physically Unclonable Functions. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-76328-1_6.
Full textFennelly, Lawrence J., and Marianna A. Perry. "Insider Threats." In Security Officers and Supervisors. CRC Press, 2024. http://dx.doi.org/10.4324/9781003402718-124.
Full textRenwick, Neil. "Pandemic Threats." In Northeast Asian Critical Security. Palgrave Macmillan UK, 2004. http://dx.doi.org/10.1057/9780230287181_4.
Full textConference papers on the topic "Security threats"
Singh, Kamal, Rohit Saxena, and Brijesh Kumar. "AI Security: Cyber Threats and Threat-Informed Defense." In 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, 2024. https://doi.org/10.1109/csnet64211.2024.10851770.
Full textRouzbahani, Mani Asgari, and Hossein Gharaee Garakani. "Blockchain Security Threats: Survey." In 2024 11th International Symposium on Telecommunications (IST). IEEE, 2024. https://doi.org/10.1109/ist64061.2024.10843593.
Full textTatarka, Slavomír, Michal Janovec, and Jozef Papán. "IoT Security Threats and Solutions." In 2024 International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2024. https://doi.org/10.1109/iceta63795.2024.10850844.
Full textR.Tamilkodi, Mrs.A.Harika, Mogalapalli Harika, P. Venkata Sai Abhilash, Chenagana Harish Sai, and Pranav Ps. "Enhanced Security Measures Against Phishing Threats." In 2024 5th International Conference on Data Intelligence and Cognitive Informatics (ICDICI). IEEE, 2024. https://doi.org/10.1109/icdici62993.2024.10810772.
Full textAsassfeh, Mahmoud Rajallah, Esraa Abu Elsoud, Sultan Mohammed Albilasi, et al. "Cloud Security: Analyzing Threats and Challenges." In 2024 25th International Arab Conference on Information Technology (ACIT). IEEE, 2024. https://doi.org/10.1109/acit62805.2024.10877035.
Full textAlfaw, Aysha H., and Alauddin Al-Omary. "5G Security Threats." In 2022 International Conference on Data Analytics for Business and Industry (ICDABI). IEEE, 2022. http://dx.doi.org/10.1109/icdabi56818.2022.10041502.
Full textShrivas, Mahendra Kumar, Thomas Yeboah Dean, and S. Selva Brunda. "The Disruptive Blockchain Security Threats and Threat Categorization." In 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 2020. http://dx.doi.org/10.1109/icpc2t48082.2020.9071475.
Full textAlwaheidi, Mohammed, Shareeful Islam, Spyridon Papastergiou, and Kitty Kioskli. "Integrating Human Factors into Data-driven Threat Management for Overall Security Enhancement." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004778.
Full textJames, I. "Modelling ultraviolet threats." In SPIE Security + Defence, edited by David H. Titterton, Robert J. Grasso, and Mark A. Richardson. SPIE, 2016. http://dx.doi.org/10.1117/12.2250332.
Full textPutz, Benedikt, and Gunther Pernul. "Detecting Blockchain Security Threats." In 2020 IEEE International Conference on Blockchain (Blockchain). IEEE, 2020. http://dx.doi.org/10.1109/blockchain50366.2020.00046.
Full textReports on the topic "Security threats"
Ravikumar, Jeevarathinam. Cyber Security Threats - Past|Present|Future. River Publishers, 2017. http://dx.doi.org/10.13052/popcas016.
Full textKastner, Ryan, and Ted Huffmire. Threats and Challenges in Reconfigurable Hardware Security. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada511928.
Full textWahyono, Pujo. Transnational Crime and Security Threats in Indonesia. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada518422.
Full textYi, J., T. Clausen, and U. Herberg. Security Threats to Simplified Multicast Forwarding (SMF). RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7985.
Full textTschofenig, H., and D. Kroeselberg. Security Threats for Next Steps in Signaling (NSIS). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4081.
Full textResearch Institute (IFPRI), International Food Policy. Migration: Tightening borders and threats to food security. International Food Policy Research Institute, 2018. http://dx.doi.org/10.2499/9780896292970_05.
Full textAlbright, David E. Threats to US Security in a Postcontainment World. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada271602.
Full textFord, James L., and C. R. Schuller. Controlling Threats to Nuclear Security: A Hollistic Model. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada421832.
Full textYi, J., U. Herberg, and T. Clausen. Security Threats for the Neighborhood Discovery Protocol (NHDP). RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7186.
Full textBlank, Stephen J. Threats to Russian Security: the View From Moscow. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada382720.
Full text