Artykuły w czasopismach na temat „Security measures”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Security measures”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Gunuganti, Anvesh, and Srikanth Mandru. "Securing Crypto Currency Exchanges: Implementing Cutting - Edge Security Measures for Enhanced Protection." International Journal of Science and Research (IJSR) 12, no. 1 (2023): 1273–77. https://doi.org/10.21275/sr24531140255.
Pełny tekst źródłaRamolia, Nidhi, Pranav Piyushbhai Tank, R. N. Ravikumar, Babar Zeb, Manish Kumar, and Sushil Kumar Singh. "Futuristic Metaverse: Security and Counter Measures." ICCK Transactions on Intelligent Systematics 2, no. 1 (2025): 49. https://doi.org/10.62762/tis.2024.194631.
Pełny tekst źródłaMcCathie, Andy. "Internet security fears prompt IT security measures." Network Security 2000, no. 5 (2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.
Pełny tekst źródłaDr. B. D. Karhad, Dr B. D. Karhad. "Food Security in India: Issues and Measures." Indian Journal of Applied Research 4, no. 4 (2011): 26–29. http://dx.doi.org/10.15373/2249555x/apr2014/30.
Pełny tekst źródłaD'souza, Jason John, and Seeza Franklin. "Li-Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (2018): 2588–90. http://dx.doi.org/10.31142/ijtsrd15706.
Pełny tekst źródłaGupta, Vaibhav, Sumit Goswami, Ashok Kumar Ashok Kumar, and Mohinder Singh. "Networking and Security Measures." DESIDOC Bulletin of Information Technology 24, no. 2 (2004): 9–16. http://dx.doi.org/10.14429/dbit.24.2.3621.
Pełny tekst źródłaRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (2002): 1. http://dx.doi.org/10.1145/763944.763945.
Pełny tekst źródłaRushinek, Avi, and Sara Rushinek. "E-commerce security measures." Ubiquity 2002, November (2002): 1. http://dx.doi.org/10.1145/763948.763945.
Pełny tekst źródłaStanton, Ray. "Weighing up security measures." Computer Fraud & Security 2006, no. 1 (2006): 17–20. http://dx.doi.org/10.1016/s1361-3723(06)70297-4.
Pełny tekst źródłaWood, Charles Cresson. "Floppy diskette security measures." Computers & Security 4, no. 3 (1985): 223–28. http://dx.doi.org/10.1016/0167-4048(85)90032-x.
Pełny tekst źródłaLi, Yan. "Network Security Protection Measures." Advanced Materials Research 971-973 (June 2014): 1659–62. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1659.
Pełny tekst źródłaARAVINDA A KUMAR and Divya TL. "Security measures implemented in RESTful API Development." Open Access Research Journal of Engineering and Technology 7, no. 1 (2024): 105–12. http://dx.doi.org/10.53022/oarjet.2024.7.1.0042.
Pełny tekst źródłaValera, Jasmine P., and Sunguk Lee. "Security Measures in Overcoming Mobile IPv6 Security Issues." International Journal of Database Theory and Application 9, no. 7 (2016): 297–304. http://dx.doi.org/10.14257/ijdta.2016.9.7.26.
Pełny tekst źródłaKhabirov, Artur Ilfarovich, and Gulnara Mullanurovna Khamitova. "Security Measures and Liability Measures in Loan Agreements." Journal of Politics and Law 12, no. 5 (2019): 1. http://dx.doi.org/10.5539/jpl.v12n5p1.
Pełny tekst źródłaNelson, Masese. "Security Measures for Protecting of Information Technology Assets." International Journal of Science and Research (IJSR) 11, no. 2 (2022): 401–5. http://dx.doi.org/10.21275/sr22129224133.
Pełny tekst źródłaMalazizi, Nahid. "Tourism and International Borders: Global Health Security Measures." International Journal of Science and Research (IJSR) 10, no. 10 (2021): 900–904. https://doi.org/10.21275/sr211012113522.
Pełny tekst źródłaChristin, Nicolas. "The effectiveness of security measures." Communications of the ACM 65, no. 9 (2022): 92. http://dx.doi.org/10.1145/3547132.
Pełny tekst źródłaGupta, Anish, Vimal Bibhu, and Rashid Hussain. "Security Measures in Data Mining." International Journal of Information Engineering and Electronic Business 4, no. 3 (2012): 34–39. http://dx.doi.org/10.5815/ijieeb.2012.03.05.
Pełny tekst źródłaUffen, Jörg, and Michael H. Breitner. "Management of Technical Security Measures." International Journal of Social and Organizational Dynamics in IT 3, no. 1 (2013): 14–31. http://dx.doi.org/10.4018/ijsodit.2013010102.
Pełny tekst źródłaCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Pełny tekst źródłaKeenan, Debra Palmer, Christine Olson, James C. Hersey, and Sondra M. Parmer. "Measures of Food Insecurity/Security." Journal of Nutrition Education 33 (September 2001): S49—S58. http://dx.doi.org/10.1016/s1499-4046(06)60069-9.
Pełny tekst źródłaTREMBLAY, JEAN-FRANÇOIS. "SECURITY MEASURES IMPEDE U.S. VISITS." Chemical & Engineering News 81, no. 11 (2003): 40–41. http://dx.doi.org/10.1021/cen-v081n011.p040.
Pełny tekst źródłaFeher, Ben, Lior Sidi, Asaf Shabtai, Rami Puzis, and Leonardas Marozas. "WebRTC security measures and weaknesses." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.092138.
Pełny tekst źródłaMarozas, Leonardas, Asaf Shabtai, Rami Puzis, Ben Feher, and Lior Sidi. "WebRTC security measures and weaknesses." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 78. http://dx.doi.org/10.1504/ijitst.2018.10013302.
Pełny tekst źródłaJ A, Smitha, Rakshith G Raj, Sumanth J Samuel, and Pramath P Yaji. "Security Measures of Textual Data." International Journal of Innovative Research in Information Security 9, no. 03 (2023): 55–60. http://dx.doi.org/10.26562/ijiris.2023.v0903.01.
Pełny tekst źródłaAdıgüzel, Selminaz, and Murat Düzgün. "Air Transportation Security Measures: Ics2." Journal of Aviation 9, no. 1 (2025): 168–80. https://doi.org/10.30518/jav.1591826.
Pełny tekst źródłaMunnangi, Sivasatyanarayanareddy. "Best Practices for Implementing Robust Security Measures." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 2 (2019): 2032–56. https://doi.org/10.61841/turcomat.v10i2.15041.
Pełny tekst źródłaM., Chorna, and Shumilo O. "CREATING A PACKAGE OF MEASURES AIMED AT MANAGING THE ECONOMIC SECURITY OF RETAIL TRADE ENTERPRISES." ECONOMIC STRATEGY AND PROSPECTS OF TRADE AND SERVICES SECTOR DEVELOPMENT 2 (30) (January 9, 2020): 78–88. https://doi.org/10.5281/zenodo.3602147.
Pełny tekst źródłaGadre, Monica. "Data Security in Cloud Security Attacks and Preventive Measures." International Journal for Research in Applied Science and Engineering Technology 6, no. 3 (2018): 529–36. http://dx.doi.org/10.22214/ijraset.2018.3085.
Pełny tekst źródłaKaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.
Pełny tekst źródłaKhan, Koffka. "Securing Immersive Realms: A Review of Security Measures in 360-Degree Virtual Reality Video Streaming." International Journal of Science and Research (IJSR) 12, no. 12 (2023): 727–33. http://dx.doi.org/10.21275/sr231208045505.
Pełny tekst źródłaJason, John D'souza, and Franklin Seeza. "Li Fi Security Issues and its Measures." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 2588–90. https://doi.org/10.31142/ijtsrd15706.
Pełny tekst źródłaPopescu, Mirona Ana Maria, Andreea Barbu, Petronela Cristina Simion, and Georgiana Moiceanu. "Research on Data Security Measures in Romania." Proceedings of the International Conference on Business Excellence 18, no. 1 (2024): 3277–83. http://dx.doi.org/10.2478/picbe-2024-0267.
Pełny tekst źródłaTorres, C. G., M. E. Turner, J. R. Harkess, and G. R. Istre. "Security measures for AIDS and HIV." American Journal of Public Health 81, no. 2 (1991): 210–11. http://dx.doi.org/10.2105/ajph.81.2.210.
Pełny tekst źródłaZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Pełny tekst źródłaDamoah, Dominic, Edem Kporha, Edward D. Ansong, Ronky Doh, Joseph Abandoh-Sam, and Brighter Agyeman. "Improving Security Measures on Grid Computing." International Journal of Computer Applications 83, no. 9 (2013): 6–11. http://dx.doi.org/10.5120/14474-2490.
Pełny tekst źródłaRudakova, O. Yu, T. A. Rudakova, and I. N. Sannikova. "Spatial measures for ensuring economic security." National Interests: Priorities and Security 16, no. 1 (2020): 44–59. http://dx.doi.org/10.24891/ni.16.1.44.
Pełny tekst źródłaPevnev, Volodimir, and Serhii Kapchynskyi. "DATABASE SECURITY: THREATS AND PREVENTIVE MEASURES." Advanced Information Systems 2, no. 1 (2018): 69–72. http://dx.doi.org/10.20998/2522-9052.2018.1.13.
Pełny tekst źródłaBenjamin, John, G. Sirmans, and Emily Zietz. "Security Measures and the Apartment Market." Journal of Real Estate Research 14, no. 3 (1997): 347–58. http://dx.doi.org/10.1080/10835547.1997.12090900.
Pełny tekst źródłaFUJITA, Shintaro, and Kenji SAWADA. "Security Measures Technology for Control Systems." Journal of The Institute of Electrical Engineers of Japan 142, no. 4 (2022): 212–14. http://dx.doi.org/10.1541/ieejjournal.142.212.
Pełny tekst źródłaLittlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Pełny tekst źródłaWalsh, Matthew, and William Streilein. "Security Measures for Safeguarding the Bioeconomy." Health Security 18, no. 4 (2020): 313–17. http://dx.doi.org/10.1089/hs.2020.0029.
Pełny tekst źródłaSchuldt, Alison. "Security measures at the nuclear pore." Nature Cell Biology 6, no. 2 (2004): 91. http://dx.doi.org/10.1038/ncb0204-91.
Pełny tekst źródłaSchroden, Jonathan J. "Measures for Security in a Counterinsurgency." Journal of Strategic Studies 32, no. 5 (2009): 715–44. http://dx.doi.org/10.1080/01402390903189394.
Pełny tekst źródłaAlessi, Dario R., and Yogesh Kulathu. "Security measures of a master regulator." Nature 497, no. 7448 (2013): 193–94. http://dx.doi.org/10.1038/nature12101.
Pełny tekst źródłaKITAURA, Shigeru, and Sumiaki OHOTUYAMA. "Verification about security measures for derailment." Proceedings of the Transportation and Logistics Conference 2017.26 (2017): 1018. http://dx.doi.org/10.1299/jsmetld.2017.26.1018.
Pełny tekst źródłaAndrews, Christine. "Improving data security measures in business." Computer Fraud & Security 2009, no. 8 (2009): 8–10. http://dx.doi.org/10.1016/s1361-3723(09)70099-5.
Pełny tekst źródłaHorak, O. J. "Means and Measures for Data Security." IFAC Proceedings Volumes 22, no. 19 (1989): 1–6. http://dx.doi.org/10.1016/s1474-6670(17)52787-1.
Pełny tekst źródłaCollinson, Helen. "Win 95 security measures mollify users." Computers & Security 15, no. 2 (1996): 125–26. http://dx.doi.org/10.1016/0167-4048(96)89336-9.
Pełny tekst źródłaCieśla, Rafał. "Security measures in combating document falsifiers." Nowa Kodyfikacja Prawa Karnego 44 (December 29, 2017): 41–53. http://dx.doi.org/10.19195/2084-5065.44.4.
Pełny tekst źródła