Academic literature on the topic 'Security threats'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security threats.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security threats"

1

Isokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain." Teisė 122 (March 30, 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.

Full text
Abstract:
The research aims at establishing which activities or situations in maritime domain, which threaten maritime safety and / or maritime security, fall within the concept of international peace and security. Having demonstrated the validity of the international law principles that safeguard international peace and security in maritime area, the research reveals a changing list of the threats to international peace and security, which now encompasses activities and situations at sea, including terrorism, sea piracy and armed robbery against ships, proliferation of weapons of mass destruction, etc.
APA, Harvard, Vancouver, ISO, and other styles
2

A. K. Bagdat and Z. M. Alimzhanova. "INFORMATION SECURITY THREATS FOR INTEGRATION SYSTEMS." Bulletin of Toraighyrov University. Physics & Mathematics series, no. 4.2024 (December 30, 2024): 20–29. https://doi.org/10.48081/dfqb8925.

Full text
Abstract:
This article considers threats to integration systems, as well as methods of prevention. Threat modeling involves identifying potential threats to a system, assessing the likelihood and impact of each threat, and developing strategies to prevent or mitigate those threats. For integration systems, there are many potential information security threats, including unauthorized access, malware, insider threats, DoS attacks, SQL injection, and data leakage. To ensure the security and integrity of enterprise integration systems, it is crucial for organizations to understand these threats and implemen
APA, Harvard, Vancouver, ISO, and other styles
3

Prayuda, Rendi, Fitrisia Munir, Riezki Adma Jayandi, Dini Tiara Sasmi, Cifebrima Suyastri, and Rio Sundari. "The Global Pandemic of COVID-19 as a Non-Traditional Security Threat in Indonesia." Andalas Journal of International Studies (AJIS) 11, no. 1 (2022): 63. http://dx.doi.org/10.25077/ajis.11.1.63-77.2022.

Full text
Abstract:
The transition and development of forms of threats to the security of an international state at this time cannot always be resolved by armed forces and not only like war, this form of threat is known as non-traditional threat terms that threaten human security. The global Covid-19 pandemic not only poses a threat to aspects of national security but also has a major impact on human security. This study uses the Copenhagen perspective as the main theory in research and is supported by the concept of non-traditional security and the concept of securitization. This research method is a qualitative
APA, Harvard, Vancouver, ISO, and other styles
4

PASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.

Full text
Abstract:
Abstract: Each historical era corresponded to a certain type of technological revolution that produced transformations both in terms of the theory of military science and in the field of strategies, techniques, tactics and procedures for preparing and conducting the phenomenon of war. Thus, the beginning of the 21st century has been marked by major transformations of the global security environment, an environment conducive to hybrid dangers and threats that can seriously affect contemporary human society. Moreover, migration, terrorism, organized crime, the nuclear threat and pandemics are an
APA, Harvard, Vancouver, ISO, and other styles
5

Tanvir Rahman Akash, Nusrat Jahan Sany, Lamia Akter, and Sanjida Akter Sarna. "Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 248–63. https://doi.org/10.32996/jcsts.2025.7.3.90.

Full text
Abstract:
Increasing technological complexity of cyber threats creates a major challenge between securing data privacy and maintaining potent cybersecurity practices. The paper examines privacy-protecting security methods in cybersecurity by detailing organizational approaches to defend private information throughout the cyber threat detection and mitigation process. Organizations need to establish the appropriate levels of data security because implementations that limit privacy too much threaten their security capabilities but weak protection measures create vulnerabilities to data breaches. The resea
APA, Harvard, Vancouver, ISO, and other styles
6

Saddam RA, Angga Pranata, Sugiono, et al. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.

Full text
Abstract:
The development of Information Technology (IT) has changed people's mindset. The presence of the Internet as the main platform for online activity is vulnerable to criminal acts by irresponsible parties. Criminal acts in cyberspace, of course, pose a major threat to the governance of online activities. One of these major threats is the threat of network security. Networks connected to the internet are basically insecure and can always be exploited by hackers, both LAN and wireless networks. The internet network has two data transmission media, namely wired and wireless. what happens is open. E
APA, Harvard, Vancouver, ISO, and other styles
7

Jilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (2013): 6. http://dx.doi.org/10.33317/ssurj.v3i1.62.

Full text
Abstract:
Wireless Communication Technologies hascompletely revolutionized the world. Wireless CommunicationTechnologies provide ease to the users such as portability of thedevices and mobile access to the internet. These portable wirelessdevices include PDAs, laptops, smart phones etc. offers somevaluable features. These features include accessing the e-mails,SMS, MMS, calendars, addresses, phone numbers list and theinternet. These entire devices store large amount of data and theirwireless connection to network spectrum exhibit them asimportant source of computing. These devices are alwaysvulnerable t
APA, Harvard, Vancouver, ISO, and other styles
8

POPESCU, Eliza-Elena. "VoIP Security Threats." International Journal of Information Security and Cybercrime 13, no. 1 (2024): 66–70. http://dx.doi.org/10.19107/ijisc.2024.01.06.

Full text
Abstract:
Nowadays, communication is based on a wide variety of solutions, especially using the real-time ones. People use a lot of online tools that offer them audio-video solutions, and the most important thing is that anyone has access to them, and there are easy to use. VoIP (Voice over IP) is one of the most used solutions today, with which everyone can make calls over the internet. Like any other service that is exposed to the internet, it presents risks for the data violation and administrators or any people that use this service, needs to secure the system.
APA, Harvard, Vancouver, ISO, and other styles
9

Jilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (2013): 6. http://dx.doi.org/10.33317/ssurj.62.

Full text
Abstract:
Wireless Communication Technologies hascompletely revolutionized the world. Wireless CommunicationTechnologies provide ease to the users such as portability of thedevices and mobile access to the internet. These portable wirelessdevices include PDAs, laptops, smart phones etc. offers somevaluable features. These features include accessing the e-mails,SMS, MMS, calendars, addresses, phone numbers list and theinternet. These entire devices store large amount of data and theirwireless connection to network spectrum exhibit them asimportant source of computing. These devices are alwaysvulnerable t
APA, Harvard, Vancouver, ISO, and other styles
10

Saptono, Edy, Ribka Keiza, and Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia." Technium Social Sciences Journal 23 (September 9, 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.

Full text
Abstract:
Boundary is an important part of the state's sovereignty and becomes a fortress of all kinds of threats. The threat about security of natural resources is one of non-military threat which affects Indonesia’s security. Betung Kerihun National Park adjoins to Malaysia in northern of Indonesia, so it can be vulnerable to threats. The purposes of this research are to analyze the threat of security toward management of Betung Kerihun National Park (TNBK), the efforts made to overcome the security threat, and the management of TNBK on the border of Indonesia and Malaysia. The research uses qualitati
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security threats"

1

Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.

Full text
Abstract:
To be able to protect an organisation's resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation's resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful for developing an information security policy for the municipality in Ronneby, using the SS 62 77 99-1
APA, Harvard, Vancouver, ISO, and other styles
2

Mahmood, Faisal. "SIP Security Threats and Countermeasures." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18126.

Full text
Abstract:
With the emergence of multimedia applications and the upcoming age of Voice over IP (VoIP), Voice setup and resources control protocols such as SIP and H.323 over the Internet are becoming increasingly attractive applications. In the last few years as a real competitor in traditional telephony services (PSTN), SIP has gained much attention when compared with H.323. SIP works at presentation and application layer thus it mainly faces security issue at these layers. The objective of this thesis is to describe the most relevant SIP related security issues and then present security mechanisms that
APA, Harvard, Vancouver, ISO, and other styles
3

Safdar, Naveed. "Internal security threats to Pakistan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FSafdar.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Security Building in Post-Conflict Environments))--Naval Postgraduate School, Dec. 2004.<br>Thesis advisor(s): Robert E. Looney, Feroz Hassan Khan. Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Xu, Zhang. "Understanding Security Threats in Cloud." W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477067957.

Full text
Abstract:
As cloud computing has become a trend in the computing world, understanding its security concerns becomes essential for improving service quality and expanding business scale. This dissertation studies the security issues in a public cloud from three aspects. First, we investigate a new threat called power attack in the cloud. Second, we perform a systematical measurement on the public cloud to understand how cloud vendors react to existing security threats. Finally, we propose a novel technique to perform data reduction on audit data to improve system capacity, and hence helping to enhance se
APA, Harvard, Vancouver, ISO, and other styles
5

Cramer, Jane Kellett 1964. "National security panics : overestimating threats to national security." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8312.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Political Science, 2002.<br>Includes bibliographical references (p. 415-427).<br>Three times in this century the US public has panicked with fear because of exaggerations of external threats to the nation. These panics peaked in 1950,1960, and 1980. Why did the U.S. markedly exaggerate the Soviet threat at these times? These periods of widespread public fear were "defining moments" when the US created confrontational and militarized containment policies. These panics ratcheted up the arms race tremendously between the US and the
APA, Harvard, Vancouver, ISO, and other styles
6

Wullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.

Full text
Abstract:
Thesis (M.A.)--University of North Carolina at Chapel Hill, 2008.<br>Title from electronic title page (viewed Feb. 17, 2009). "... in partial fulfillment of the requirements for the degree of Master of Arts in the Department of Political Science, Concentration TransAtlantic Studies." Discipline: Political Science; Department/School: Political Science.
APA, Harvard, Vancouver, ISO, and other styles
7

Byman, G. (Gabriel). "Connected devices:security threats vs. implemented security." Bachelor's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201704111464.

Full text
Abstract:
The aim of this thesis was to research connected devices security threats in comparison to mitigating security solutions. Furthermore, a focused case study of a real world connected devices, an Activity Tracker, was selected to explore and analyze its implemented security solutions. In order to give a wider perspective of connected devices an analysis of connected device categorization was investigated along with other impacting factor. From the viewpoint of security threats and solutions the connected devices categorizations were abstracted to consumer, business, and government market sectors
APA, Harvard, Vancouver, ISO, and other styles
8

Biswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic
APA, Harvard, Vancouver, ISO, and other styles
9

Zakharov, I. "Threats to information security of the enterprise." Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/7954.

Full text
Abstract:
Inalienable part of the new economy is information technologies (IT) introduction and application in the all spheres of human activity. The permanent improvement of present information-communication technologies (ICT) and their application expansion are the part of strategic decisions and operative tasks for enterprises. But enterprises must spare enough attention for all aspects of the ICT-use, in order to know about the threats information safety in time. Insufficient attention to this problem often creates barriers for the effective development of the whole business and information infrast
APA, Harvard, Vancouver, ISO, and other styles
10

Gong, Xuwei. "Security Threats and Countermeasures for Connected Vehicles." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.

Full text
Abstract:
With the rapid development of connected vehicles, automotive security has become one of the most important topics. To study how to protect the security of vehicle communication, we analyze potential threats for connected vehicles and discuss countermeasures to mitigate these threats. In this thesis, we examine 25 services that connected vehicles can provide. Entities, connections, and message flows in these services are investigated and synthesized into a vehicle network structure. The 25 services are divided into six use cases including: infotainment service, remote monitoring, device control
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security threats"

1

1953-, Aldis Anne, and Herd Graeme P, eds. Soft security threats and European security. Routledge, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Bureau of Alcohol, Tobacco, and Firearms., ed. Bomb threats and physical security planning. The Bureau, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barnett, Dana, and Efraim Karsh. Soft Threats to National Security. Routledge, 2021. http://dx.doi.org/10.4324/9781003243151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Probst, Christian W., Jeffrey Hunker, Dieter Gollmann, and Matt Bishop, eds. Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jones, J. Anthony A., Trahel G. Vardanian, and Christina Hakopian, eds. Threats to Global Water Security. Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2344-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gaufman, Elizaveta. Security Threats and Public Perception. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-43201-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Apikyan, Samuel, and David Diamond, eds. Nuclear Threats and Security Challenges. Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9894-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Futter, Andrew, ed. Threats to Euro-Atlantic Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-19730-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rusdi, Siswanto. Maritime security and its threats. Maritime Security Coordinating Board, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Office, New Zealand Audit. Managing threats to domestic security. Audit Office, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security threats"

1

Möller, Dietmar P. F. "Threats and Threat Intelligence." In Advances in Information Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

DeFranco, Joanna F., and Bob Maley. "Security Threats." In What Every Engineer Should Know About Cyber Security and Digital Forensics, 2nd ed. CRC Press, 2022. http://dx.doi.org/10.1201/9781003245223-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lal, Rollie. "Economic Threats." In Security Studies, 4th ed. Routledge, 2023. http://dx.doi.org/10.4324/9781003247821-35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Khan, Suhel Ahmad, Rajeev Kumar, and Raees Ahmad Khan. "Threats to Security." In Software Security. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003330516-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kaunert, Christian, and Ori Wertman. "Reconceptualizing Security Threats." In Handbook of Security Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-91875-4_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kurze, Arnaud, and Christopher K. Lamont. "Global Security Threats." In Mapping Global Justice. Routledge, 2022. http://dx.doi.org/10.4324/9781003143819-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kaunert, Christian, and Ori Wertman. "Reconceptualizing Security Threats." In Handbook of Security Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-51761-2_41-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Khalil, Kasem, Haytham Idriss, Tarek Idriss, and Magdy Bayoumi. "PUF: Security Threats." In Lightweight Hardware Security and Physically Unclonable Functions. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-76328-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fennelly, Lawrence J., and Marianna A. Perry. "Insider Threats." In Security Officers and Supervisors. CRC Press, 2024. http://dx.doi.org/10.4324/9781003402718-124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Renwick, Neil. "Pandemic Threats." In Northeast Asian Critical Security. Palgrave Macmillan UK, 2004. http://dx.doi.org/10.1057/9780230287181_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security threats"

1

Singh, Kamal, Rohit Saxena, and Brijesh Kumar. "AI Security: Cyber Threats and Threat-Informed Defense." In 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, 2024. https://doi.org/10.1109/csnet64211.2024.10851770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rouzbahani, Mani Asgari, and Hossein Gharaee Garakani. "Blockchain Security Threats: Survey." In 2024 11th International Symposium on Telecommunications (IST). IEEE, 2024. https://doi.org/10.1109/ist64061.2024.10843593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tatarka, Slavomír, Michal Janovec, and Jozef Papán. "IoT Security Threats and Solutions." In 2024 International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2024. https://doi.org/10.1109/iceta63795.2024.10850844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

R.Tamilkodi, Mrs.A.Harika, Mogalapalli Harika, P. Venkata Sai Abhilash, Chenagana Harish Sai, and Pranav Ps. "Enhanced Security Measures Against Phishing Threats." In 2024 5th International Conference on Data Intelligence and Cognitive Informatics (ICDICI). IEEE, 2024. https://doi.org/10.1109/icdici62993.2024.10810772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Asassfeh, Mahmoud Rajallah, Esraa Abu Elsoud, Sultan Mohammed Albilasi, et al. "Cloud Security: Analyzing Threats and Challenges." In 2024 25th International Arab Conference on Information Technology (ACIT). IEEE, 2024. https://doi.org/10.1109/acit62805.2024.10877035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alfaw, Aysha H., and Alauddin Al-Omary. "5G Security Threats." In 2022 International Conference on Data Analytics for Business and Industry (ICDABI). IEEE, 2022. http://dx.doi.org/10.1109/icdabi56818.2022.10041502.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shrivas, Mahendra Kumar, Thomas Yeboah Dean, and S. Selva Brunda. "The Disruptive Blockchain Security Threats and Threat Categorization." In 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 2020. http://dx.doi.org/10.1109/icpc2t48082.2020.9071475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alwaheidi, Mohammed, Shareeful Islam, Spyridon Papastergiou, and Kitty Kioskli. "Integrating Human Factors into Data-driven Threat Management for Overall Security Enhancement." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004778.

Full text
Abstract:
Human and other non-technological issues are often overlooked, which directly and indirectly contributing to many successful cyber attacks, including DoS, social engineering, download-driven attacks, and more. Considering human issues as causes for internal threats and weaknesses, a deeper understanding of these factors is essential for overall security enhancement. Therefore, organizations of all sizes need to ensure a broad range of knowledge, skills, and awareness among all user levels, from individual end-users to security practitioners. However, this task is challenging due to the evolvin
APA, Harvard, Vancouver, ISO, and other styles
9

James, I. "Modelling ultraviolet threats." In SPIE Security + Defence, edited by David H. Titterton, Robert J. Grasso, and Mark A. Richardson. SPIE, 2016. http://dx.doi.org/10.1117/12.2250332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Putz, Benedikt, and Gunther Pernul. "Detecting Blockchain Security Threats." In 2020 IEEE International Conference on Blockchain (Blockchain). IEEE, 2020. http://dx.doi.org/10.1109/blockchain50366.2020.00046.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security threats"

1

Ravikumar, Jeevarathinam. Cyber Security Threats - Past|Present|Future. River Publishers, 2017. http://dx.doi.org/10.13052/popcas016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kastner, Ryan, and Ted Huffmire. Threats and Challenges in Reconfigurable Hardware Security. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada511928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wahyono, Pujo. Transnational Crime and Security Threats in Indonesia. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada518422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yi, J., T. Clausen, and U. Herberg. Security Threats to Simplified Multicast Forwarding (SMF). RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tschofenig, H., and D. Kroeselberg. Security Threats for Next Steps in Signaling (NSIS). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Research Institute (IFPRI), International Food Policy. Migration: Tightening borders and threats to food security. International Food Policy Research Institute, 2018. http://dx.doi.org/10.2499/9780896292970_05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Albright, David E. Threats to US Security in a Postcontainment World. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada271602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ford, James L., and C. R. Schuller. Controlling Threats to Nuclear Security: A Hollistic Model. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada421832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yi, J., U. Herberg, and T. Clausen. Security Threats for the Neighborhood Discovery Protocol (NHDP). RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Blank, Stephen J. Threats to Russian Security: the View From Moscow. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada382720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!