Journal articles on the topic 'Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kumar, Ashok. "Securing the security." City 18, no. 3 (2014): 356–59. http://dx.doi.org/10.1080/13604813.2014.906731.
Full textNadler, Jerrold. "Securing social security." Washington Quarterly 22, no. 1 (1999): 185–87. http://dx.doi.org/10.1080/01636609909550377.
Full textPollak, William. "Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions." University of Michigan Journal of Law Reform, no. 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.
Full textAl-Fedaghi, Sabah. "Securing the Security System." International Journal of Security and Its Applications 11, no. 3 (2017): 95–108. http://dx.doi.org/10.14257/ijsia.2017.11.3.09.
Full textBrandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.
Full textNissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.
Full textKamradt-Scott, Adam. "Securing Indo-Pacific health security: Australia’s approach to regional health security." Australian Journal of International Affairs 72, no. 6 (2018): 500–519. http://dx.doi.org/10.1080/10357718.2018.1534942.
Full textMolloy, Patricia. "Desiring security/securing desire: (Re)re‐thinking alterity in security discourse." Cultural Values 3, no. 3 (1999): 304–28. http://dx.doi.org/10.1080/14797589909367169.
Full textWright, J. "Security? What security? [job security]." Engineering & Technology 4, no. 3 (2009): 80–81. http://dx.doi.org/10.1049/et.2009.0321.
Full textEconomides, Spyros. "Balkan security: What security? Whose security?" Southeast European and Black Sea Studies 3, no. 3 (2003): 105–29. http://dx.doi.org/10.1080/14683850412331321678.
Full textMuhammad Jamshid Khan. "Securing network infrastructure with cyber security." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 803–13. http://dx.doi.org/10.30574/wjarr.2023.17.2.0308.
Full textMuhammad, Jamshid Khan. "Securing network infrastructure with cyber security." World Journal of Advanced Research and Reviews 17, no. 2 (2023): 803–13. https://doi.org/10.5281/zenodo.8109753.
Full textTOMÁŠEK, Martin. "Security Properties Verification of Security Protocols." Acta Electrotechnica et Informatica 14, no. 2 (2014): 15–18. http://dx.doi.org/10.15546/aeei-2014-0012.
Full textHama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.
Full textDynon, Nicholas. "Securing Public Places: New Zealand’s Private Security Sector as a National Security Enabler." National Security Journal 1, no. 1 (2019): 75–92. http://dx.doi.org/10.36878/nsj201901.75.
Full textWEBER, CYNTHIA, and MARK LACY. "Securing by design." Review of International Studies 37, no. 3 (2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.
Full textNeamah, Muthanna Ibrahim. "The Security Vulnerabilities in Websites the Security." International Journal of Psychosocial Rehabilitation 24, no. 5 (2020): 4319–24. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020147.
Full textKharb, Latika, and Deepak Chahal. "Cloud Access Security Brokers: Strengthening Cloud Security." International Journal of Research Publication and Reviews 4, no. 8 (2023): 642–44. http://dx.doi.org/10.55248/gengpi.4.823.50412.
Full textAli, Ahmadian Ramaki, and Ebrahimi Atani Reza. "Language-Based Security to Apply Computer Security." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3370116.
Full textClough, Patricia Ticineto, and Craig Willse. "Gendered Security/National Security." Social Text 28, no. 4 (2010): 45–63. http://dx.doi.org/10.1215/01642472-2010-010.
Full textElliott, Lorraine. "Human security/environmental security." Contemporary Politics 21, no. 1 (2015): 11–24. http://dx.doi.org/10.1080/13569775.2014.993905.
Full textPasquinucci, Andrea. "Defeating security with security." Computer Fraud & Security 2008, no. 2 (2008): 6–9. http://dx.doi.org/10.1016/s1361-3723(08)70024-1.
Full textKeeley, James F. "Review: Security: Writing Security." International Journal: Canada's Journal of Global Policy Analysis 48, no. 3 (1993): 566–67. http://dx.doi.org/10.1177/002070209304800308.
Full textSrinivas, Adilapuram. "Unveiling Modern Authentication Strategies for Java APIs: Exploring OAuth 2.0, JWT, API Keys, and Basic Authentication." Journal of Scientific and Engineering Research 9, no. 9 (2022): 119–25. https://doi.org/10.5281/zenodo.14631323.
Full textChiranjeevi, G., R. Abhishek Reddy, R. Shyam, Swati Sah, and Rejwan Bin Sulaiman. "Docker Based Decentralized Vulnerability Assessment with Port Scanning Powered by Artificial Intelligence." FMDB Transactions on Sustainable Intelligent Networks 1, no. 4 (2024): 220–41. https://doi.org/10.69888/ftsin.2024.000290.
Full textHelmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.
Full textOthman, Sadeq. "Securing Robotic Communication using Multiple Security Techniques." International Journal of Computer Applications 178, no. 1 (2017): 1–4. http://dx.doi.org/10.5120/ijca2017915704.
Full textAntonius, Rachad, Micheline Labelle, and François Rocher. "Canadian Immigration Policies: Securing a Security Paradigm?" International Journal of Canadian Studies, no. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.
Full textRomero Ortiz, María Elena, and Carlos Uscanga Prieto. "Japan: Securing Cooperation or Cooperating to Security?" México y la Cuenca del Pacífico 5, no. 14 (2016): 53–78. http://dx.doi.org/10.32870/mycp.v5i14.506.
Full textSingh, Ritesh, Lalit Kumar, Debraj Banik, and S. Sundar. "Smart security and securing data through watermarking." IOP Conference Series: Materials Science and Engineering 263 (November 2017): 052040. http://dx.doi.org/10.1088/1757-899x/263/5/052040.
Full textSri, Harsha Vardhan Sanne. "Securing the Helm: Navigating Container Security in Kubernetes." European Journal of Advances in Engineering and Technology 9, no. 3 (2022): 167–71. https://doi.org/10.5281/zenodo.11906265.
Full textShin, Beom-Shik. "Collective Security, Common Security, Cooperative Security: Concept and Reality." Journal of International Politics 15, no. 1 (2010): 5. http://dx.doi.org/10.18031/jip.2010.03.15.1.5.
Full textRushton, Simon. "Global Health Security: Security for whom? Security from what?" Political Studies 59, no. 4 (2011): 779–96. http://dx.doi.org/10.1111/j.1467-9248.2011.00919.x.
Full textMetodieva, Tsvetelina, and Iliana Simeonova. "MIGRATION SECURITY AS A COMPONENT OF CORPORATE SECURITY." Journal Scientific and Applied Research 27, no. 1 (2024): 163–69. http://dx.doi.org/10.46687/jsar.v27i1.416.
Full textToka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.
Full textAli, Ahmadian Ramaki, and Ebrahimi Atani Reza. "LANGUAGE-BASED SECURITY TO APPLY COMPUTER SECURITY." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3532949.
Full textKyung-Im Cho. "Security Deposit as Collateral Security." Korean Lawyers Association Journal 64, no. 12 (2015): 143–88. http://dx.doi.org/10.17007/klaj.2015.64.12.004.
Full textHOFREITER, Ladislav. "SECURITY CULTURE AND SECURITY MANAGEMENT." Krízový Manažment 14, no. 2 (2015): 63–68. http://dx.doi.org/10.26552/krm.c.2015.2.63-68.
Full textINTRILIGATOR, MICHAEL D. "GLOBAL SECURITY AND HUMAN SECURITY." International Journal of Development and Conflict 01, no. 01 (2011): 1–10. http://dx.doi.org/10.1142/s2010269011000026.
Full textJohansen, Robert C. "Real Security is Democratic Security." Alternatives: Global, Local, Political 16, no. 2 (1991): 209–42. http://dx.doi.org/10.1177/030437549101600206.
Full textMalcolmson, Robert W. "Review: International Security: Alternative Security." International Journal: Canada's Journal of Global Policy Analysis 46, no. 4 (1991): 733–34. http://dx.doi.org/10.1177/002070209104600413.
Full textCohen, Fred. "Strategic Security Intelligence — Embedded Security." Network Security 2002, no. 2 (2002): 14–15. http://dx.doi.org/10.1016/s1353-4858(02)00218-0.
Full textLeach, Dr John. "Security engineering and security RoI." Computers & Security 22, no. 6 (2003): 482–86. http://dx.doi.org/10.1016/s0167-4048(03)00605-9.
Full textMeyer, Helen. "Security risk or security solution?" Computers & Security 15, no. 4 (1996): 317. http://dx.doi.org/10.1016/0167-4048(96)88943-7.
Full textSØRENSEN, GEORG. "Individual Security and National Security." Security Dialogue 27, no. 4 (1996): 371–86. http://dx.doi.org/10.1177/0967010696027004002.
Full textTrzciński, Łukasz, and Juliusz Piwowarski. "Security culture and security anthropology." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 33, no. 33 (2019): 131–53. http://dx.doi.org/10.5604/01.3001.0013.1955.
Full textStosic, Lazar, and Dragan Velickovic. "Computer security and security technologies." Journal of Process Management. New Technologies 1, no. 1 (2013): 14–19. http://dx.doi.org/10.5937/jpmnt1301014s.
Full textFekete, Liz. "Peoples' Security Versus National Security." Race & Class 44, no. 3 (2003): 78–84. http://dx.doi.org/10.1177/030639603128968790.
Full textPerlmutter, Amos, and Benjamin Frankel. "SECURITY STUDIES and Security Studies." Security Studies 1, no. 1 (1991): iv. http://dx.doi.org/10.1080/09636419109347452.
Full textSoneji, Samir, and Gary King. "Statistical Security for Social Security." Demography 49, no. 3 (2012): 1037–60. http://dx.doi.org/10.1007/s13524-012-0106-z.
Full text