Littérature scientifique sur le sujet « Mitigation strategies security »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Mitigation strategies security ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Mitigation strategies security"
Alqurashi, Fahad, Mohammed AL-Hashimi, Mostafa Saleh, and Osama Abulnaja. "Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction." Computers 14, no. 2 (2025): 71. https://doi.org/10.3390/computers14020071.
Texte intégralLavanya, A. "Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies." International Journal of Science and Research (IJSR) 13, no. 12 (2024): 448–53. https://doi.org/10.21275/sr241205115818.
Texte intégralAnam Amin, Laiba Tanveer, Emmania Abid, Mahnoor Absar, and Mahnoor Tariq. "Mitigation strategies for greenhouse gases to ensure food security." NUST Journal of Natural Sciences 9, no. 3 (2024): 12–30. http://dx.doi.org/10.53992/njns.v9i3.192.
Texte intégralR, Sai Shreya, and Kavitha R. "Securing SaaS: Key Challenges and Effective Mitigation Strategies." International Journal of Multidisciplinary Research in Science, Engineering and Technology 7, no. 05 (2024): 10170–78. http://dx.doi.org/10.15680/ijmrset.2024.0705096.
Texte intégralParuchuri, B. V. N. Prasad, and Anoop Sharma. "Developing Effective Mitigation Strategies for Data Privacy in the Metaverse." Journal of Advances and Scholarly Researches in Allied Education 21, no. 7 (2024): 346–54. https://doi.org/10.29070/9zdvqv35.
Texte intégralA, Aarthy Devi, Ashok Kumar Mohan, and Sethumadhavan M. "Wireless Security Auditing: Attack Vectors and Mitigation Strategies." Procedia Computer Science 115 (2017): 674–82. http://dx.doi.org/10.1016/j.procs.2017.09.153.
Texte intégralPalanisamy, Rathika, Azah Anir Norman, and Laiha Mat Kiah. "BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts." Journal of Organizational Computing and Electronic Commerce 31, no. 4 (2021): 320–42. http://dx.doi.org/10.1080/10919392.2022.2028530.
Texte intégralSutanto, Yulius. "Cybersecurity Challenges and AI-Powered Mitigation Strategies in CCTV Surveillance Systems." International Journal of Information System and Innovative Technology 3, no. 2 (2024): 17–24. https://doi.org/10.63322/fsk65573.
Texte intégralKumar, Akash. "Risk Mitigation and Strategies in Aviation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32352.
Texte intégralReddy, Raghu Chaitanya Vasi. "Security Challenges and Mitigation Strategies in AI-Enhanced Integration Platforms." European Journal of Computer Science and Information Technology 13, no. 10 (2025): 46–56. https://doi.org/10.37745/ejcsit.2013/vol13n104656.
Texte intégralThèses sur le sujet "Mitigation strategies security"
Jenkins, Jeffrey Lyne. "Alleviating Insider Threats: Mitigation Strategies and Detection Techniques." Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/297023.
Texte intégralJoelsson, Jonas. "On Swedish bioenergy strategies to reduce CO2 emissions and oil use." Doctoral thesis, Mittuniversitetet, Institutionen för teknik och hållbar utveckling, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-13868.
Texte intégralJohansen, Johan. "Maritime political risk conceptualisation and mapping of maritime political risk in order to improve management and mitigation strategies for the offshore oil and gas industry in the Gulf of Guinea." Thesis, Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/17802.
Texte intégralLivres sur le sujet "Mitigation strategies security"
Philippines) APEC Symposium on Climate Change (2012 Manila. Adaptation strategies with mitigation potential for food and water security. Asia Pacific Economic Cooperation, 2012.
Trouver le texte intégralAfrican Technology Policy Studies Network, ed. Tracking effective indigenous adaptation strategies on impacts of climate variability on food security and health of subsistence farmers in Tanzania. African Technology Policy Studies Network, 2011.
Trouver le texte intégralL, Perry Walt, ed. Withdrawing from Iraq: Alternative schedules, associated risks, and mitigating strategies. RAND, 2009.
Trouver le texte intégralGardiner, Drew. Balancing Act. ILO, 2024. http://dx.doi.org/10.54394/jduj2404.
Texte intégralCISSP, Timothy Youngblood. Cybersecurity Threats, Malware Trends, and Strategies: Discover Risk Mitigation Strategies for Modern Threats to Your Organization. Packt Publishing, Limited, 2023.
Trouver le texte intégralYoungblood, Timothy. Cybersecurity Threats, Malware Trends, and Strategies: Discover Risk Mitigation Strategies for Modern Threats to Your Organization. de Gruyter GmbH, Walter, 2023.
Trouver le texte intégralCatak, Ferhat Ozgur. Cyber Security and Adversarial Machine Learning: Emerging Attacks and Mitigation Strategies. IGI Global, 2021.
Trouver le texte intégralTracking effective indigenous adaptation strategies on impacts of climate variability on food security and health of subsistence farmers in Tanzania. African Technology Policy Studies Network, 2011.
Trouver le texte intégralHuntjens, Patrick, Ting Zhang, and Katharina Nachbar. Climate Change and Implications for Security and Justice. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198805373.003.0007.
Texte intégralWithdrawing from Iraq: Alternative schedules, associated risks, and mitigating strategies. RAND/National Defense Research Institute, 2009.
Trouver le texte intégralChapitres de livres sur le sujet "Mitigation strategies security"
McElreath, David Hughes, Daniel Adrian Doss, Barbara Russo, et al. "Disaster Preparedness and Mitigation Strategies." In Introduction to Homeland Security, 3rd ed. CRC Press, 2021. http://dx.doi.org/10.4324/9780429491962-7.
Texte intégralTan, Lisa J. Y. "Economic Exploits and Risk Mitigation Strategies." In A Comprehensive Guide for Web3 Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-39288-7_6.
Texte intégralKesavamoorthy, R., and P. Karthikeyan. "Cyberspace and Outer Space Security and Mitigation Strategies." In Cyber Space and Outer Space Security. River Publishers, 2024. http://dx.doi.org/10.1201/9781003558118-1.
Texte intégralRajkumar, K., S. Karthikeyan, V. Kavitha, and U. Hariharan. "Ransomware Attacks in Cyber Space and Mitigation Strategies." In Cyber Space and Outer Space Security. River Publishers, 2024. http://dx.doi.org/10.1201/9781003558118-4.
Texte intégralNisha, T. N., and Vansh Makhija. "Chatbot Security: Unveiling Vulnerabilities and Crafting Mitigation Strategies." In Algorithms for Intelligent Systems. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-3333-3_7.
Texte intégralDwivedi, Surabhi, R. Balaji, Praveen Ampatt, and S. D. Sudarsan. "A Survey on Security Threats and Mitigation Strategies for NoSQL Databases." In Information Systems Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-49099-6_4.
Texte intégralSingh, Swarnima, and R. B. Singh. "Systems Approach in Sustainable Livelihood Adaptation and Mitigation Strategies." In Simulating Climate Change and Livelihood Security. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4648-5_8.
Texte intégralLiu, Jingyuan, and Pirathayini Srikantha. "Distributed Attack and Mitigation Strategies for Active Power Distribution Networks." In Security of Cyber-Physical Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45541-5_13.
Texte intégralPatra, Subhashree, Amit Kumar, and Purabi Saikia. "Deforestation and Forests Degradation Impacts on Livelihood Security and Climate Change: Indian Initiatives Towards Its Mitigation." In Environmental Degradation: Challenges and Strategies for Mitigation. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95542-7_18.
Texte intégralKalapodis, Nikolaos, Georgios Sakkas, Alexandre Lazarou, et al. "EU-Integrated Multifunctional Forest and Fire Management, Policies, and Practices: Challenges Between “As-Is” and “To-Be” State." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_6.
Texte intégralActes de conférences sur le sujet "Mitigation strategies security"
Sharma, Chetna, and Chandani Sharma. "Cloud Computing Security: Threats and Mitigation Strategies." In 2024 International Conference on Signal Processing and Advance Research in Computing (SPARC). IEEE, 2024. https://doi.org/10.1109/sparc61891.2024.10829335.
Texte intégralSheggam, Harshith, and Xiaowen Zhang. "Exploring Security Risks and Mitigation Strategies in AI Code Helpers." In 2024 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2024. https://doi.org/10.1109/lisat63094.2024.10807934.
Texte intégralGupta, Prashant K., Bireshwar Dass Mazumdar, and Divolika Bajpai. "Information Superhighway for Neurological Disorders: Security Vulnerabilities and their mitigation strategies." In 2025 International Conference on Computer, Electrical & Communication Engineering (ICCECE). IEEE, 2025. https://doi.org/10.1109/iccece61355.2025.10940286.
Texte intégralTawffaq, Maher Rafi, Mohammed Ahmed Jasim, Basim Ghalib Mejbel, et al. "IoT Security in a Connected World: Analyzing Threats, Vulnerabilities, and Mitigation Strategies." In 2024 36th Conference of Open Innovations Association (FRUCT). IEEE, 2024. http://dx.doi.org/10.23919/fruct64283.2024.10749944.
Texte intégralPopic, Srdjan, Bojan Ramic, and Sasa Bojanic. "Security Challenges and Mitigation Strategies for CAN-Based Protocols: A Comprehensive Survey." In 2025 24th International Symposium INFOTEH-JAHORINA (INFOTEH). IEEE, 2025. https://doi.org/10.1109/infoteh64129.2025.10959305.
Texte intégralAhmed, Huzaifah Tariq, Syed Asghar Abbas Zaidi, and Tariq Mumtaz. "Enhancing Security in Smart Home IoT Networks: Vulnerability Analysis and Mitigation Strategies." In 2024 26th International Multitopic Conference (INMIC). IEEE, 2024. https://doi.org/10.1109/inmic64792.2024.11004309.
Texte intégralThummala, Venkata Reddy, Phanindra Kumar Kankanampati, Pratik Agarwal, Swethasri Kavuri, Ravi Mandliya, and Arpit Goel. "Network Security Threats and Mitigation Strategies in Mobile Networks: A Machine Learning Perspective." In 2025 International Conference on Pervasive Computational Technologies (ICPCT). IEEE, 2025. https://doi.org/10.1109/icpct64145.2025.10940458.
Texte intégralYasani, Rajashekar Reddy, Putalpattu Muni Prasad, Pattlola Srinivas, N. V. Raja Sekhar Reddy, Parag Jawarkar, and Vedaprada Raghunath. "AI-Driven Solutions for Cloud Security Implementing Intelligent Threat Detection and Mitigation Strategies." In 2024 International Conference on Intelligent Computing and Emerging Communication Technologies (ICEC). IEEE, 2024. https://doi.org/10.1109/icec59683.2024.10837032.
Texte intégralKarki, Ajit, and Raktim Deb. "Comprehensive Security Analysis and Threat Mitigation Strategies for Software-Defined Networking (SDN) Environments." In 2025 3rd International Conference on Intelligent Systems, Advanced Computing and Communication (ISACC). IEEE, 2025. https://doi.org/10.1109/isacc65211.2025.10969300.
Texte intégralDavis, Brittany D., Yang Liu, and Mohd Anwar. "Repository of Metadata-Related Threats and Mitigation Strategies to Enhance Security in Smart Homes." In 2024 Conference on AI, Science, Engineering, and Technology (AIxSET). IEEE, 2024. https://doi.org/10.1109/aixset62544.2024.00035.
Texte intégralRapports d'organisations sur le sujet "Mitigation strategies security"
Rahman, Habibur, and Wahid bin Ahsan. Fraud Mitigation, Usability Challenges, and Financial Literacy in Mobile Financial Services for Rural Bangladesh. Userhub, 2024. http://dx.doi.org/10.58947/journal.wpgr45.
Texte intégralEise, Jessica, Natalie Lambert, Tiwaladeoluwa Adekunle, and Laura Eise. More Inclusive, More Practical: Climate Change Communication Research to Serve the Future. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317278.
Texte intégralGonzalez Diez, Verónica M., John Redwood, and Lourdes Alvarez Prado. IDB-9: IDB Integrated Strategy for Climate Change Adaptation and Mitigation, and Sustainable and Renewable Energy. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0010531.
Texte intégralMutyasira, Vine. A Multi-Phase Assessment of the Effects of COVID-19 on Food Systems and Rural Livelihoods in Zimbabwe. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/apra.2021.034.
Texte intégralCenacchi, Nicola, and Timothy B. Sulser. Strategic Modeling for Future Agriculture in Asia. Asian Productivity Organization, 2025. https://doi.org/10.61145/qprg4794.
Texte intégralAryal, Jeetendra Prakash. Contribution of Agriculture to Climate Change and Low-Emission Agricultural Development in Asia and the Pacific. Asian Development Bank Institute, 2022. http://dx.doi.org/10.56506/vaoy9373.
Texte intégralAryal, Jeetendra P. Contribution of Agriculture to Climate Change and Low-Emission Agricultural Development in Asia and the Pacific. Asian Development Bank Institute, 2022. http://dx.doi.org/10.56506/wdbc4659.
Texte intégralAgarwal, Smisha, Madhu Jalan, Holly C. Wilcox, et al. Evaluation of Mental Health Mobile Applications. Agency for Healthcare Research and Quality (AHRQ), 2022. http://dx.doi.org/10.23970/ahrqepctb41.
Texte intégralErästö, Tytti, Fei Su, and Wilfred Wan. Navigating Security Dilemmas in Indo-Pacific Waters. Stockholm International Peace Research Institute, 2024. http://dx.doi.org/10.55163/dkwb3559.
Texte intégralMosello, Beatrice, Christian König, Emily Wright, and Gareth Price. Rethinking human mobility in the face of global changes. Adelphi research gemeinnützige GmbH, 2021. http://dx.doi.org/10.55317/casc010.
Texte intégral