Gotowa bibliografia na temat „Security Thread”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Security Thread”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Security Thread"
Sun, Fu. "Analysis of the Screw Thread Connection Strength Based on Nonlinear Finite Element Method." Applied Mechanics and Materials 401-403 (September 2013): 55–58. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.55.
Pełny tekst źródłaWang, Meidi, Haoyun Liu, Pan Huang, and Zhe Wu. "Penetrating Imaging of Concealed Features in Banknotes with Near-Field Scanning Microwave Microscopy." Electronics 13, no. 23 (2024): 4729. http://dx.doi.org/10.3390/electronics13234729.
Pełny tekst źródłaSpahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 1, no. 2 (2015): 62. http://dx.doi.org/10.26417/ejis.v1i2.p62-67.
Pełny tekst źródłaSpahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 2, no. 1 (2015): 62. http://dx.doi.org/10.26417/ejis.v2i1.p62-67.
Pełny tekst źródłaLiu, Jian, Dong Sheng Fan, Yue Wu, Guo Jiang Fu, and Mei Ju Liu. "Study of Remote Elevator Monitoring Fault Detection System." Advanced Materials Research 499 (April 2012): 459–63. http://dx.doi.org/10.4028/www.scientific.net/amr.499.459.
Pełny tekst źródłaZou, Changwei, Xudong Wang, Yaoqing Gao, and Jingling Xue. "Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization." ACM Transactions on Software Engineering and Methodology 31, no. 2 (2022): 1–37. http://dx.doi.org/10.1145/3494516.
Pełny tekst źródłaEt. al., Pavithra G,. "A Novel Watermarking and Re-Encryption Approach to Avoid Illegal Content Sharing In Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 2603–9. http://dx.doi.org/10.17762/turcomat.v12i2.2229.
Pełny tekst źródłaBui, Phuc, Minh Le, Binh Hoang, Nguyen Ngoc, and Huong Pham. "Data Partitioning and Asynchronous Processing to Improve the Embedded Software Performance on Multicore Processors." Informatics and Automation 21, no. 2 (2022): 243–74. http://dx.doi.org/10.15622/ia.21.2.2.
Pełny tekst źródłaPriambodo, Agung. "PERSIMPANGAN DILEMA PENANGANAN PENGUNGSI ASING DI INDONESIA PASCA PENERBITAN PERPRES NO. 125 TAHUN 2016." Cakrawala - Jurnal Humaniora 21, no. 2 (2021): 122–29. http://dx.doi.org/10.31294/jc.v21i2.10995.
Pełny tekst źródłaWoody, Carol. "Mission Thread Security Analysis: A Tool for Systems Engineers to Characterize Operational Security behavior." INSIGHT 16, no. 2 (2013): 37–40. http://dx.doi.org/10.1002/inst.201316237.
Pełny tekst źródłaRozprawy doktorskie na temat "Security Thread"
Christensson, Daniel, and Emelie Eriksson. "The Smart Home From a Security Perspective." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40185.
Pełny tekst źródłaRusso, Luigi. "The Phantom Thread Between Malleable and Non-Malleable Cryptography." Electronic Thesis or Diss., Sorbonne université, 2025. http://www.theses.fr/2025SORUS070.
Pełny tekst źródłaOlandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Pełny tekst źródłaBlažek, Ondřej. "Generátor nelegitimního síťového provozu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317007.
Pełny tekst źródłaZahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.
Pełny tekst źródłaMabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.
Pełny tekst źródłaTakacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.
Pełny tekst źródłaLambe, Erik. "Information Security Culture and Threat Perception : Comprehension and awareness of latent threats in organisational settings concerned with information security." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352263.
Pełny tekst źródłaPiškula, David. "Internet of Things." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399196.
Pełny tekst źródłaGrytsenko, Denys. "Migration and Security in Europe." Thesis, Högskolan i Halmstad, Sektionen för hälsa och samhälle (HOS), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-16319.
Pełny tekst źródłaKsiążki na temat "Security Thread"
Jalal, Massouda. Hanging by a thread: Afghan women's rights and security threats. IFFRAS, 2014.
Znajdź pełny tekst źródłaJalal, Massouda. Hanging by a thread: Afghan womens rights and security threats. Gyan, 2016.
Znajdź pełny tekst źródłaRemerowski, Ted, and Marrin Canell. Security threat. Films for the Humanities and Sciences, 2004.
Znajdź pełny tekst źródłaPolice, Illinois State. Bomb threats: Recommended procedures for : security, handling the threat, evacuation, the search. Illinois State Police, 1996.
Znajdź pełny tekst źródłaUnited States. Dept. of State. Office of Public Communication. Editorial Division, ed. Narcotics: Threat to global security. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1990.
Znajdź pełny tekst źródłaS, Nagar K., Sharma Gautam, and International Seminar on "The Security of the Indian Sub-Continent: Challenges from the Super Power Politics" (1986 : University of Gorakhpur), eds. India's security: Super power threat. Reliance Pub. House, 1990.
Znajdź pełny tekst źródłaS, Nagar K., Sharma Gautam, and International Seminar on "The Security of the Indian Sub-Continent: Challenges from the Super Power Politics" (1986 : University of Gorakhpur), eds. India's security: Super power threat. Reliance, 1987.
Znajdź pełny tekst źródłaUnited States. Dept. of the Air Force and United States. Air Force Satellite Control Network System Program Office, eds. The hacker threat: ADP security. Dept. of the Air Force, 1989.
Znajdź pełny tekst źródła1953-, Aldis Anne, and Herd Graeme P, eds. Soft security threats and European security. Routledge, 2005.
Znajdź pełny tekst źródłaIII, Clark Champ, ed. Infosecurity 2008 threat analysis. Syngress Publishing, 2008.
Znajdź pełny tekst źródłaCzęści książek na temat "Security Thread"
Knobloch, Martin. "Thread Risk Modelling." In Web Application Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_12.
Pełny tekst źródłaGuo, Yan, Yu Wang, Guodong Ding, Donglin Cao, Gang Zhang, and Yi Lv. "Juicer: Scalable Extraction for Thread Meta-information of Web Forum." In Intelligence and Security Informatics. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01393-5_15.
Pełny tekst źródłaKyriakides, Ioannis, Stelios Neophytou, Anastasis Kounoudes, Konstantinos Michail, Yiannis Argyrou, and Thomas Wieland. "Processing and Communications Rate Requirements in Sensor Networks for Physical Thread Assessment." In Critical Information Infrastructures Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31664-2_4.
Pełny tekst źródłaWang, Lei, Menghan Hu, Duo Li, Zhaohui Che, and Xiaoliang Zhang. "Security Thread Detection in Passport Using Improved Template Matching." In Communications in Computer and Information Science. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8108-8_8.
Pełny tekst źródłaKümmel, Gerhard. "Debating German Special Forces: A Scandal in the Military, a Documentary, and a Thread." In Advanced Sciences and Technologies for Security Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47511-6_8.
Pełny tekst źródłaPorcar, Manuel. "Biological Standards and Biosecurity: The Unexplored Link." In NATO Science for Peace and Security Series C: Environmental Security. Springer Netherlands, 2021. http://dx.doi.org/10.1007/978-94-024-2086-9_4.
Pełny tekst źródłaMöller, Dietmar P. F. "Threats and Threat Intelligence." In Advances in Information Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_2.
Pełny tekst źródłaChaudhary, Hafiz Ahmad Awais, Ivan Guevara, Jobish John, et al. "Model-Driven Engineering in Digital Thread Platforms: A Practical Use Case and Future Challenges." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19762-8_14.
Pełny tekst źródłaJohnson, Ross. "Security Measures." In Antiterrorism and Threat Response, 2nd ed. CRC Press, 2020. https://doi.org/10.4324/9781003374015-7.
Pełny tekst źródłaJohnson, Ross. "Security Management Programs." In Antiterrorism and Threat Response, 2nd ed. CRC Press, 2020. https://doi.org/10.4324/9781003374015-19.
Pełny tekst źródłaStreszczenia konferencji na temat "Security Thread"
Murugesan, Kumar, Muralidhara VN, and Tirth Master. "Comprehensive Security Analysis and DoS Attack Mitigation in Thread Networks." In 2025 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2025. https://doi.org/10.1109/wcnc61545.2025.10978458.
Pełny tekst źródłaSingh, Kamal, Rohit Saxena, and Brijesh Kumar. "AI Security: Cyber Threats and Threat-Informed Defense." In 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, 2024. https://doi.org/10.1109/csnet64211.2024.10851770.
Pełny tekst źródłaSampath, Amrutha, Kristofor Dickson, George W. Lange, Carey Wu, and Keith A. Serrels. "Evaluation of the Analyzability of Complex Secure Intellectual Property Using Fault Isolation Techniques versus the Hardware Security Threat They Pose." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0385.
Pełny tekst źródłaSaxena, Akshat, J. Vijayashree, J. Jayashree, Vaibhavi Jha, and Sidharth Kakrani. "Securing the Threads: In-Depth Analysis of IoT Architecture and Threat Mitigation." In 2024 13th International Conference on System Modeling & Advancement in Research Trends (SMART). IEEE, 2024. https://doi.org/10.1109/smart63812.2024.10882542.
Pełny tekst źródłaNishchal, Naveen K. "Information Security using the Properties of Optical Vortex Lattice." In Digital Holography and Three-Dimensional Imaging. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/dh.2024.m4b.6.
Pełny tekst źródłaRao, Sonu Kumar, and Naveen K. Nishchal. "Optical Asymmetric Color Image Encryption using Vector Light Field Encoding." In Digital Holography and Three-Dimensional Imaging. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/dh.2024.w4a.36.
Pełny tekst źródłaWang, Andy Ju An. "A security thread in a thread-based curriculum." In the 9th ACM SIGITE conference. ACM Press, 2008. http://dx.doi.org/10.1145/1414558.1414609.
Pełny tekst źródłaUnwala, Ishaq, Zafar Taqvi, and Jiang Lu. "IoT Security: ZWave and Thread." In 2018 IEEE Green Technologies Conference (GreenTech). IEEE, 2018. http://dx.doi.org/10.1109/greentech.2018.00040.
Pełny tekst źródłaAkestoridis, Dimitrios-Georgios, Vyas Sekar, and Patrick Tague. "On the Security of Thread Networks." In WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2022. http://dx.doi.org/10.1145/3507657.3528544.
Pełny tekst źródłaBrotzman, Robert, Danfeng Zhang, Mahmut Kandemir, and Gang Tan. "Ghost Thread." In CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy. ACM, 2021. http://dx.doi.org/10.1145/3422337.3447846.
Pełny tekst źródłaRaporty organizacyjne na temat "Security Thread"
Ozano, Kim, Andrew Roby, and Jacob Tompkins. Learning Journey on Water Security: UK Water Offer. Institute of Development Studies (IDS), 2022. http://dx.doi.org/10.19088/k4d.2022.026.
Pełny tekst źródłaSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Characterization. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126557.
Pełny tekst źródłaSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Definition. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126558.
Pełny tekst źródłaSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Characterization Worksheets. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126571.
Pełny tekst źródłaMontelibano, Joji, and Andrew Moore. Insider Threat Security Reference Architecture. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada609926.
Pełny tekst źródłaPasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Pełny tekst źródłaAlneyadi, Matar J. Gulf Security and the Iranian Threat. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada347197.
Pełny tekst źródłaKent, S., and A. Chi. Threat Model for BGP Path Security. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7132.
Pełny tekst źródłaGattis, Vanessa M. Obesity: A Threat to National Security? Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada547350.
Pełny tekst źródłaRaju, Nivedita, and Laura Grego. The Space–Nuclear Nexus in European Security. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/gepv2578.
Pełny tekst źródła