Journal articles on the topic 'Security threats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security threats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Isokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain." Teisė 122 (March 30, 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.
Full textA. K. Bagdat and Z. M. Alimzhanova. "INFORMATION SECURITY THREATS FOR INTEGRATION SYSTEMS." Bulletin of Toraighyrov University. Physics & Mathematics series, no. 4.2024 (December 30, 2024): 20–29. https://doi.org/10.48081/dfqb8925.
Full textPrayuda, Rendi, Fitrisia Munir, Riezki Adma Jayandi, Dini Tiara Sasmi, Cifebrima Suyastri, and Rio Sundari. "The Global Pandemic of COVID-19 as a Non-Traditional Security Threat in Indonesia." Andalas Journal of International Studies (AJIS) 11, no. 1 (2022): 63. http://dx.doi.org/10.25077/ajis.11.1.63-77.2022.
Full textPASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.
Full textTanvir Rahman Akash, Nusrat Jahan Sany, Lamia Akter, and Sanjida Akter Sarna. "Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 248–63. https://doi.org/10.32996/jcsts.2025.7.3.90.
Full textSaddam RA, Angga Pranata, Sugiono, et al. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.
Full textJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (2013): 6. http://dx.doi.org/10.33317/ssurj.v3i1.62.
Full textPOPESCU, Eliza-Elena. "VoIP Security Threats." International Journal of Information Security and Cybercrime 13, no. 1 (2024): 66–70. http://dx.doi.org/10.19107/ijisc.2024.01.06.
Full textJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "Wireless Security Threats." Sir Syed University Research Journal of Engineering & Technology 3, no. 1 (2013): 6. http://dx.doi.org/10.33317/ssurj.62.
Full textSaptono, Edy, Ribka Keiza, and Joni Wijayanto. "Security management of national park security in the border of Indonesia - Malaysia." Technium Social Sciences Journal 23 (September 9, 2021): 508–18. http://dx.doi.org/10.47577/tssj.v23i1.4371.
Full textSyomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.
Full textSliusarenko, Iryna. "Essentiality and Classification of International Security Threats at the Global Level (Based on Resolutions of the UN General Assembly First Committee, 2014–2021)." International Relations: Theory and Practical Aspects, no. 13 (June 26, 2024): 57–70. https://doi.org/10.31866/2616-745X.13.2024.306861.
Full textAyub, Kamran, and Roushdy Alshawa. "Threat Modelling and Security Enhancements in Wireless Body Area Networks for Smart Healthcare." Journal of Robotics and Automation Research 5, no. 3 (2024): 01–08. https://doi.org/10.33140/jrar.05.03.09.
Full textJaiswal, Shruti, Himani Bansal, Shiv Naresh Shivhare, and Gulshan Shrivastava. "A Novel IoT Framework for Identifying and Mitigating Security Threats." Scalable Computing: Practice and Experience 26, no. 5 (2025): 2165–83. https://doi.org/10.12694/scpe.v26i5.4909.
Full textSyed, Farzana Zaheer, and Saba Javed. "Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan." International Journal of Social Sciences and Management 4, no. 4 (2017): 267–74. http://dx.doi.org/10.3126/ijssm.v4i4.18503.
Full textPendergrass, John C., Karen Heart, C. Ranganathan, and V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine." International Journal of Healthcare Information Systems and Informatics 9, no. 4 (2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.
Full textKarpavičiūtė, Ieva. "Securitization and Lithuania’s National Security Change." Lithuanian Foreign Policy Review 36, no. 1 (2017): 9–33. http://dx.doi.org/10.1515/lfpr-2017-0005.
Full textAlbarrak, Khalied M. "Securing the Future of Web-Enabled IoT: A Critical Analysis of Web of Things Security." Applied Sciences 14, no. 23 (2024): 10867. http://dx.doi.org/10.3390/app142310867.
Full textBeladiya, Vandan, and Mihir Sontakke. "Cyber Security SOC Analyst." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 2409–12. https://doi.org/10.22214/ijraset.2025.67835.
Full textShaik Azeeza Farhana, Bommala Jagadeeswari, Chakka Pavani, Poornachand Anumolu, Naga Roop Kumar Ogirala, and Abdul Subhani. "Cyber security in the FinTech Sector: Securing Digital Transactions." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 06 (2025): 2265–67. https://doi.org/10.47392/irjaem.2025.0356.
Full textSri, Kanth Mandru. "Explainable AI for Endpoint Security Threat Analysis." European Journal of Advances in Engineering and Technology 11, no. 1 (2024): 56–63. https://doi.org/10.5281/zenodo.13325168.
Full textSmirnov, R. A., and S. N. Novikov. "Research on Information Security Risk Assessment Techniques." Interexpo GEO-Siberia 6 (May 18, 2022): 250–57. http://dx.doi.org/10.33764/2618-981x-2022-6-250-257.
Full textHojda, Mihaela Hortensia. "Information security economics: cyber security threats." Proceedings of the International Conference on Business Excellence 16, no. 1 (2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.
Full textBatham, Diksha, Ghanshyam Prasad Dubey, Mohini Sharma, Shailendra Mourya, Ashish Singh, and Anushka Sharma. "Mobile Security – Light on Security Threats." International Journal of Emerging Technology and Advanced Engineering 14, no. 2 (2024): 25–34. https://doi.org/10.46338/ijetae0224_04.
Full textMuliński, Tomasz. "ICT security in revenue administration - incidents, security incidents - detection, response, resolve." Studia Informatica. System and information technology 27, no. 2 (2023): 75–93. http://dx.doi.org/10.34739/si.2022.27.04.
Full textTanwar, Prof Rakesh. "Cyber Security Challenges." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 564–66. https://doi.org/10.22214/ijraset.2025.66263.
Full textصادق, بارزان. "Internal Security Threats on the Kurdistan Region – Iraq." Journal for Political and Security Studies 3, no. 6 (2020): 84–130. http://dx.doi.org/10.31271/jopss.10040.
Full textKoper-Staszowska, Wioletta. "Security versus Threat – Interrelations." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 3 (2018): 22–25. http://dx.doi.org/10.5604/01.3001.0012.7517.
Full textBiehun, Anatolii, Olha Osypova, Maksym Plakhtii, and Oleksandr Urdenko. "The analysis of external and internal threats of electronic ticket functioning at entertainment events." Modeling and Information Systems in Economics, no. 101 (December 1, 2021): 20–31. https://doi.org/10.33111/mise.101.3.
Full textJaźwiński, Ireneusz. "Economic Security Threats. Determinants of State Functioning and Economic Policy." Przegląd Strategiczny, no. 16 (January 22, 2024): 77–88. http://dx.doi.org/10.14746/ps.2023.1.6.
Full textAliyu Yauri, Bashir, and Joshua Abah. "Mitigating Security Threats in Virtualized Environments." International Journal of Scientific Engineering and Research 3, no. 5 (2015): 86–92. https://doi.org/10.70729/ijser15175.
Full textBari, Ahamed Basha Abdul. "Healthcare Facilities and Cyber Security Threats." Chettinad Health City Medical Journal 11, no. 04 (2022): 1. http://dx.doi.org/10.24321/2278.2044.202232.
Full textGuchua, Alika, and Thornike Zedelashvili. "Cyberwar as a Phenomenon of Asymmetric Threat and Cyber-Nuclear Security Threats." Історико-політичні проблеми сучасного світу, no. 40 (December 15, 2019): 50–57. http://dx.doi.org/10.31861/mhpi2019.40.50-57.
Full textSmalii, O. B. "A general description of threats to european security at the threshold of the 21st century." Legal horizons, no. 21 (2020): 148–52. http://dx.doi.org/10.21272/legalhorizons.2020.i21.p148.
Full textMeland, Per Håkon, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, and Paolo Giorgini. "Threat Analysis in Goal-Oriented Security Requirements Modelling." International Journal of Secure Software Engineering 5, no. 2 (2014): 1–19. http://dx.doi.org/10.4018/ijsse.2014040101.
Full textDervišević, Tarik, Sabina Baraković, and Jasmina Baraković Husić. "Case Study: Security of System for Remote Management of Windows." B&H Electrical Engineering 14, no. 2 (2020): 4–12. http://dx.doi.org/10.2478/bhee-2020-0007.
Full textYarovenko, Hanna. "Evaluating the threat to national information security." Problems and Perspectives in Management 18, no. 3 (2020): 195–210. http://dx.doi.org/10.21511/ppm.18(3).2020.17.
Full textJenab, Kouroush, Sam Khoury, and Kim LaFevor. "Flow-Graph and Markovian Methods for Cyber Security Analysis." International Journal of Enterprise Information Systems 12, no. 1 (2016): 59–84. http://dx.doi.org/10.4018/ijeis.2016010104.
Full textLe, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Full textWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.pp258-267.
Full textWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.p258-267.
Full textWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. https://doi.org/10.11591/csit.v4i3.pp258-267.
Full textIhor, Ya. Kulyniak, H. Bondarenko Yuliia, and I. Zhygalo Ivan. "Theoretical aspects of the essence and relationship between the shadow economy and the financial and economic security of the state." Economic journal Odessa polytechnic university 1, no. 11 (2020): 29–39. https://doi.org/10.5281/zenodo.3975502.
Full textКлимов, Д. В. "External threats to enterprise security." Экономика и предпринимательство, no. 2(115) (May 6, 2020): 805–7. http://dx.doi.org/10.34925/eip.2020.115.2.161.
Full textGould, David. "Organizational Resilience Approaches to Cyber Security." International Journal of Smart Education and Urban Society 9, no. 4 (2018): 53–62. http://dx.doi.org/10.4018/ijseus.2018100105.
Full textAbhiram reddy bommareddy. "AI-Enhanced Microservice Security in Cloud-Based Financial Platforms: A Case Study of AWS Implementation." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1268–79. https://doi.org/10.32628/cseit241061171.
Full textShammugam, Inthrani, Ganthan Narayana Samy, Pritheega Magalingam, Nurazean Maarop, Sundresan Perumal, and Shanmugam6 Bharanidharan. "Information security threats encountered by Malaysian public sector data centers." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1820–29. https://doi.org/10.11591/ijeecs.v21.i3.pp1820-1829.
Full textMaher, Zulfikar Ahmed, Ali Ghulam, Muhammad Yaqoob Koondhar, Iftekhar Ahmed Mahar, and Mansoor Hyder. "Security Based SCURM Process (SUBSCRUM) For Secure Agile Development." VFAST Transactions on Software Engineering 12, no. 3 (2024): 138–46. http://dx.doi.org/10.21015/vtse.v12i3.1893.
Full textSri, Kanth Mandru. "Explainable AI for Endpoint Security Threat Analysis." European Journal of Advances in Engineering and Technology 11, no. 1 (2024): 56–63. https://doi.org/10.5281/zenodo.13253288.
Full textJilani, Umair, Muhammad Umar Khan, Adnan Afroz, and Khawaja Masood Ahmed. "2 Wireless Security Threats." Sir Syed Research Journal of Engineering & Technology 1, no. 1 (2013): 6. http://dx.doi.org/10.33317/ssurj.v1i1.62.
Full text