Gotowa bibliografia na temat „Security Thread”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Security Thread”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Security Thread"

1

Sun, Fu. "Analysis of the Screw Thread Connection Strength Based on Nonlinear Finite Element Method." Applied Mechanics and Materials 401-403 (September 2013): 55–58. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.55.

Pełny tekst źródła
Streszczenie:
Some parts of the projectile is in screw connection, the stress and deformation caused by screw threads are important indexes of the security, and therefore stress distribution of the connection of thread must be accurately calculated. According to the structural characteristics of threaded connection, nonlinear finite element contact analysis was used, strength of the thread connection part was simulated and analyzed by applying effective loads, and this algorithm was validated.
Style APA, Harvard, Vancouver, ISO itp.
2

Wang, Meidi, Haoyun Liu, Pan Huang, and Zhe Wu. "Penetrating Imaging of Concealed Features in Banknotes with Near-Field Scanning Microwave Microscopy." Electronics 13, no. 23 (2024): 4729. http://dx.doi.org/10.3390/electronics13234729.

Pełny tekst źródła
Streszczenie:
Traditional anti-counterfeiting techniques and methods are inadequate to meet the modern, sophisticated anti-counterfeiting requirement in banknotes. We applied our homemade near-field scanning microwave microscopy (NSMM) for penetrating imaging of concealed anti-counterfeiting features in banknotes. This NSMM imaged and characterized several vital concealed anti-counterfeiting features in the banknotes, including the dynamic color-shifting security threads, color-changing denomination numbers, magnetically embedded security threads, and white watermarks. At the same time, with the obstruction
Style APA, Harvard, Vancouver, ISO itp.
3

Spahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 1, no. 2 (2015): 62. http://dx.doi.org/10.26417/ejis.v1i2.p62-67.

Pełny tekst źródła
Streszczenie:
The national and international security of states, nowadays, is threatened by many elements or factors, like environmental issues, the spread of mass destruction weapons, wars or ethnic conflicts in developing countries, organized crime, illegal trafficking and the corruption as a side effect of globalization. All these issues are considered as challenges that all the countries must cope with through the drafting of applicable and effective national and global security policies. The aim of this paper is the evaluation of security environment, setting forth various views over new threats or ris
Style APA, Harvard, Vancouver, ISO itp.
4

Spahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 2, no. 1 (2015): 62. http://dx.doi.org/10.26417/ejis.v2i1.p62-67.

Pełny tekst źródła
Streszczenie:
The national and international security of states, nowadays, is threatened by many elements or factors, like environmental issues, the spread of mass destruction weapons, wars or ethnic conflicts in developing countries, organized crime, illegal trafficking and the corruption as a side effect of globalization. All these issues are considered as challenges that all the countries must cope with through the drafting of applicable and effective national and global security policies. The aim of this paper is the evaluation of security environment, setting forth various views over new threats or ris
Style APA, Harvard, Vancouver, ISO itp.
5

Liu, Jian, Dong Sheng Fan, Yue Wu, Guo Jiang Fu, and Mei Ju Liu. "Study of Remote Elevator Monitoring Fault Detection System." Advanced Materials Research 499 (April 2012): 459–63. http://dx.doi.org/10.4028/www.scientific.net/amr.499.459.

Pełny tekst źródła
Streszczenie:
Remote Elevator Monitoring (REM) is an important means to ensure elevator secure, reliable working. In this paper, an elevator remote monitoring control scheme is proposed based on multi-threaded technology. Due to all threads in the multi-threaded technology may visit the same overall situation object and the shared resource, center system communicates with embedded terminal is achieved by the method. The remote elevator monitoring system has been designed based on the multi-threaded technology; the main thread interface function is realized by monitor center software, other management operat
Style APA, Harvard, Vancouver, ISO itp.
6

Zou, Changwei, Xudong Wang, Yaoqing Gao, and Jingling Xue. "Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization." ACM Transactions on Software Engineering and Methodology 31, no. 2 (2022): 1–37. http://dx.doi.org/10.1145/3494516.

Pełny tekst źródła
Streszczenie:
Shadow stacks play an important role in protecting return addresses to mitigate ROP attacks. Parallel shadow stacks, which shadow the call stack of each thread at the same constant offset for all threads, are known not to support multi-threading well. On the other hand, compact shadow stacks must maintain a separate shadow stack pointer in thread-local storage (TLS) , which can be implemented in terms of a register or the per-thread Thread-Control-Block (TCB) , suffering from poor compatibility in the former or high performance overhead in the latter. In addition, shadow stacks are vulnerable
Style APA, Harvard, Vancouver, ISO itp.
7

Et. al., Pavithra G,. "A Novel Watermarking and Re-Encryption Approach to Avoid Illegal Content Sharing In Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 2603–9. http://dx.doi.org/10.17762/turcomat.v12i2.2229.

Pełny tekst źródła
Streszczenie:
Cloud computing is a set of information stored in a cloud, it can be accessed by the user whenever there is a need to access. Cloud computing is a combination of large interconnected computers. Importance of clod computing are storage and processing power to run application. Information can be access from anywhere .Data management is also one importance of the cloud computing. It improves performance. And also a lower infrastructure cost. Lower bandwidth does not support. Another important disadvantage is security thread. Cloud computing requires a constant internet connection. By using waterm
Style APA, Harvard, Vancouver, ISO itp.
8

Bui, Phuc, Minh Le, Binh Hoang, Nguyen Ngoc, and Huong Pham. "Data Partitioning and Asynchronous Processing to Improve the Embedded Software Performance on Multicore Processors." Informatics and Automation 21, no. 2 (2022): 243–74. http://dx.doi.org/10.15622/ia.21.2.2.

Pełny tekst źródła
Streszczenie:
Nowadays, ensuring information security is extremely inevitable and urgent. We are also witnessing the strong development of embedded systems, IoT. As a result, research to ensure information security for embedded software is being focused. However, studies on optimizing embedded software on multi-core processors to ensure information security and increase the performance of embedded software have not received much attention. The paper proposes and develops the embedded software performance improvement method on multi-core processors based on data partitioning and asynchronous processing. Data
Style APA, Harvard, Vancouver, ISO itp.
9

Priambodo, Agung. "PERSIMPANGAN DILEMA PENANGANAN PENGUNGSI ASING DI INDONESIA PASCA PENERBITAN PERPRES NO. 125 TAHUN 2016." Cakrawala - Jurnal Humaniora 21, no. 2 (2021): 122–29. http://dx.doi.org/10.31294/jc.v21i2.10995.

Pełny tekst źródła
Streszczenie:
This article aims to unravel the issues of the threat of waves of refugees and asylum seekers in Indonesia. The concept of non-traditional security is adopted in this study as a framework for analyzing social problems of refugees and asylum seekers that have an impact on national security and interests. This research uses descriptive-qualitative analysis method to draw a common thread of threats that may arise along with the implementation of Presidential Decree no. 125 of 2016 concerning Handling of Refugees from Overseas. Referring to the results of data analysis, this study draws four reaso
Style APA, Harvard, Vancouver, ISO itp.
10

Woody, Carol. "Mission Thread Security Analysis: A Tool for Systems Engineers to Characterize Operational Security behavior." INSIGHT 16, no. 2 (2013): 37–40. http://dx.doi.org/10.1002/inst.201316237.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Security Thread"

1

Christensson, Daniel, and Emelie Eriksson. "The Smart Home From a Security Perspective." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40185.

Pełny tekst źródła
Streszczenie:
Based on the fact that many electronic devices are digitalized in our world in order to facilitate our lives, there is a large potential for development in the home. Smart Home solutions are giving us the opportunity to control and manage for example alarms, electricity and surveillance but the technology's rapid improvement paves the way for issues related to security. The objectives for this work will bring up common communication technologies, security and vulnerabilities in the context of a Smart Home and what could be done for future work. In order to investigate the objectives, a literat
Style APA, Harvard, Vancouver, ISO itp.
2

Russo, Luigi. "The Phantom Thread Between Malleable and Non-Malleable Cryptography." Electronic Thesis or Diss., Sorbonne université, 2025. http://www.theses.fr/2025SORUS070.

Pełny tekst źródła
Streszczenie:
À la pointe des techniques cryptographiques qui permettent des applications numériques sécurisées se trouvent les schémas de chiffrement à clé publique (PKE) et les preuves à divulgation nulle de connaissance (ZK). Un PKE permet à deux parties sans secret partagé de communiquer en toute sécurité, tandis que les preuves ZK valident des déclarations sans révéler quoi que ce soit au-delà de leur validité. La malléabilité, en termes cryptographiques, fait référence à la possibilité de modifier et de transformer efficacement, de manière prévisible, un message chiffré ou une preuve ; c'est une carac
Style APA, Harvard, Vancouver, ISO itp.
3

Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.

Pełny tekst źródła
Streszczenie:
To be able to protect an organisation's resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation's resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful for developing an information security policy for the municipality in Ronneby, using the SS 62 77 99-1
Style APA, Harvard, Vancouver, ISO itp.
4

Blažek, Ondřej. "Generátor nelegitimního síťového provozu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317007.

Pełny tekst źródła
Streszczenie:
The diploma thesis deals with the problems of DoS/DDoS attacks and development of a tool, in C lanugage, for generating them. In the first chapter the principles of DoS attacks targeting the internet and transport layers of ISO/OSI model are described and also according to their characteristics divided. Selected attacks on the application layer are also described here in detail togehter with protocols which they are based on. In the following chapter there has been created a comparison of freely available tools, which could be used as a attack generators. The practical part is dedicated to a d
Style APA, Harvard, Vancouver, ISO itp.
5

Zahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.

Pełny tekst źródła
Streszczenie:
The advent of virtualization technologies has evolved the IT infrastructure and organizations are migrating to virtual platforms. Virtualization is also the foundation for cloud platform services. Virtualization is known to provide more security into the infrastructure apart from agility and flexibility. However security aspects of virtualization are often overlooked. Various attacks to the virtualization hypervisor and its administration component are desirable for adversaries. The threats to virtualization must be rigorously scrutinized to realize common breaches and knowing what is more att
Style APA, Harvard, Vancouver, ISO itp.
6

Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.

Pełny tekst źródła
Streszczenie:
The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it developed during the period from 1994 to 2012. Accordingly, the assessment allows for the identification of shortcomings in the current national security policy on external security threats, based on the alignment of external threat perceptions with the Government Programme of Action. Essentially what had to be determined is whether perceived official threats correspond with the actual situation. Accordingly, the main research question of the study i
Style APA, Harvard, Vancouver, ISO itp.
7

Takacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.

Pełny tekst źródła
Streszczenie:
Current thesis is a documentative approach to sum up experiences of a practical projectof implementing Cyber Threat Intelligence into an existing information securitymanagement system and delivering best practices using action design researchmethodology. The project itself was delivered to a multinational energy provider in 2017.The aim of the CTI-implementation was to improve the information security posture ofthe customer. The author, as participant of the delivery team presents an extensive reviewof the current literature on CTI and puts the need for threat intelligence into context. Theaut
Style APA, Harvard, Vancouver, ISO itp.
8

Lambe, Erik. "Information Security Culture and Threat Perception : Comprehension and awareness of latent threats in organisational settings concerned with information security." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352263.

Pełny tekst źródła
Streszczenie:
A new challenge for organisations in the 21st century is how they should ensure information security in a time and environment where the widespread use of Information Communication Technologies (ICTs), such as smartphones, means that information has been made vulnerable in numerous new ways. Recent research on information security has focused on information security culture and how to successfully communicate security standards within an organisation. This study aims to examine how latent threats to information security are conceptualised and examined within an organisation in which informatio
Style APA, Harvard, Vancouver, ISO itp.
9

Piškula, David. "Internet of Things." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399196.

Pełny tekst źródła
Streszczenie:
This thesis focuses on the Internet of Things and some of the most important problems it faces today. Among these are the overdependence on the Cloud and lack of autonomy, poor security and privacy, complicated initialization and power consumption. The work aims to implement a complex IoT solution that solves the discussed problems. The project is part of a collaboration with NXP Semicondutors and will be used to showcase the company's technologies.
Style APA, Harvard, Vancouver, ISO itp.
10

Grytsenko, Denys. "Migration and Security in Europe." Thesis, Högskolan i Halmstad, Sektionen för hälsa och samhälle (HOS), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-16319.

Pełny tekst źródła
Streszczenie:
Migration has been seen as an issue that needs to be addressed by governments as well as international organizations such as the European Union, IOM and so on. Over the last twenty years or so many political and scholars designed to combat the problem of migration at both national and international level. This thesis aims to explain whether migration is becoming viewed as a security threat for the EU or it’s just a challenge. I will focus primarily on the issue of migration to the European Union. The theory of securitization has been used to examine the process whether the issue of migration h
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "Security Thread"

1

Jalal, Massouda. Hanging by a thread: Afghan women's rights and security threats. IFFRAS, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Jalal, Massouda. Hanging by a thread: Afghan womens rights and security threats. Gyan, 2016.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Remerowski, Ted, and Marrin Canell. Security threat. Films for the Humanities and Sciences, 2004.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Police, Illinois State. Bomb threats: Recommended procedures for : security, handling the threat, evacuation, the search. Illinois State Police, 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

United States. Dept. of State. Office of Public Communication. Editorial Division, ed. Narcotics: Threat to global security. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

S, Nagar K., Sharma Gautam, and International Seminar on "The Security of the Indian Sub-Continent: Challenges from the Super Power Politics" (1986 : University of Gorakhpur), eds. India's security: Super power threat. Reliance Pub. House, 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

S, Nagar K., Sharma Gautam, and International Seminar on "The Security of the Indian Sub-Continent: Challenges from the Super Power Politics" (1986 : University of Gorakhpur), eds. India's security: Super power threat. Reliance, 1987.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

United States. Dept. of the Air Force and United States. Air Force Satellite Control Network System Program Office, eds. The hacker threat: ADP security. Dept. of the Air Force, 1989.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

1953-, Aldis Anne, and Herd Graeme P, eds. Soft security threats and European security. Routledge, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

III, Clark Champ, ed. Infosecurity 2008 threat analysis. Syngress Publishing, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Security Thread"

1

Knobloch, Martin. "Thread Risk Modelling." In Web Application Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Guo, Yan, Yu Wang, Guodong Ding, Donglin Cao, Gang Zhang, and Yi Lv. "Juicer: Scalable Extraction for Thread Meta-information of Web Forum." In Intelligence and Security Informatics. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01393-5_15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Kyriakides, Ioannis, Stelios Neophytou, Anastasis Kounoudes, Konstantinos Michail, Yiannis Argyrou, and Thomas Wieland. "Processing and Communications Rate Requirements in Sensor Networks for Physical Thread Assessment." In Critical Information Infrastructures Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31664-2_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Wang, Lei, Menghan Hu, Duo Li, Zhaohui Che, and Xiaoliang Zhang. "Security Thread Detection in Passport Using Improved Template Matching." In Communications in Computer and Information Science. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8108-8_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Kümmel, Gerhard. "Debating German Special Forces: A Scandal in the Military, a Documentary, and a Thread." In Advanced Sciences and Technologies for Security Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47511-6_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Porcar, Manuel. "Biological Standards and Biosecurity: The Unexplored Link." In NATO Science for Peace and Security Series C: Environmental Security. Springer Netherlands, 2021. http://dx.doi.org/10.1007/978-94-024-2086-9_4.

Pełny tekst źródła
Streszczenie:
AbstractThe issue of standardisation in Synthetic Biology has important implications at both the technical and governance levels. At the former, standardisation in biology (a still-ongoing process) is expected to exponentially increase the potential of synthetic biology by democratising, easing and expanding our ability to engineer life. Indeed, it has to be stressed that Synthetic Biology is -or at least aims at being- a fully engineering discipline. And engineering, from industrial to electronics, largely relies on standards. A standard is a part, piece, device or procedure with well-establi
Style APA, Harvard, Vancouver, ISO itp.
7

Möller, Dietmar P. F. "Threats and Threat Intelligence." In Advances in Information Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Chaudhary, Hafiz Ahmad Awais, Ivan Guevara, Jobish John, et al. "Model-Driven Engineering in Digital Thread Platforms: A Practical Use Case and Future Challenges." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19762-8_14.

Pełny tekst źródła
Streszczenie:
AbstractThe increasing complexity delivered by the heterogeneity of the cyber-physical systems is being addressed and decoded by edge technologies, IoT development, robotics, digital twin engineering, and AI. Nevertheless, tackling the orchestration of these complex ecosystems has become a challenging problem. Specially the inherent entanglement of the different emerging technologies makes it hard to maintain and scale such ecosystems. In this context, the usage of model-driven engineering as a more abstract form of glue-code, replacing the boilerplate fashion, has improved the software develo
Style APA, Harvard, Vancouver, ISO itp.
9

Johnson, Ross. "Security Measures." In Antiterrorism and Threat Response, 2nd ed. CRC Press, 2020. https://doi.org/10.4324/9781003374015-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Johnson, Ross. "Security Management Programs." In Antiterrorism and Threat Response, 2nd ed. CRC Press, 2020. https://doi.org/10.4324/9781003374015-19.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Security Thread"

1

Murugesan, Kumar, Muralidhara VN, and Tirth Master. "Comprehensive Security Analysis and DoS Attack Mitigation in Thread Networks." In 2025 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2025. https://doi.org/10.1109/wcnc61545.2025.10978458.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Singh, Kamal, Rohit Saxena, and Brijesh Kumar. "AI Security: Cyber Threats and Threat-Informed Defense." In 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, 2024. https://doi.org/10.1109/csnet64211.2024.10851770.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Sampath, Amrutha, Kristofor Dickson, George W. Lange, Carey Wu, and Keith A. Serrels. "Evaluation of the Analyzability of Complex Secure Intellectual Property Using Fault Isolation Techniques versus the Hardware Security Threat They Pose." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0385.

Pełny tekst źródła
Streszczenie:
Abstract Secure edge devices and the need for hardware security are of paramount importance due to the growing demand for cybersecurity. Hardware security has been strengthened using complex architecture to provide uncompromisable security and prevent malicious cybersecurity attacks. To prevent unauthorized access using even the most advanced failure analysis (FA) techniques, the Hardware Security Module (HSM) implements cryptographic algorithms and data obfuscation using many raw combinational logic and state machines. When a newly taped-out device fails to operate or fails to come out of its
Style APA, Harvard, Vancouver, ISO itp.
4

Saxena, Akshat, J. Vijayashree, J. Jayashree, Vaibhavi Jha, and Sidharth Kakrani. "Securing the Threads: In-Depth Analysis of IoT Architecture and Threat Mitigation." In 2024 13th International Conference on System Modeling & Advancement in Research Trends (SMART). IEEE, 2024. https://doi.org/10.1109/smart63812.2024.10882542.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Nishchal, Naveen K. "Information Security using the Properties of Optical Vortex Lattice." In Digital Holography and Three-Dimensional Imaging. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/dh.2024.m4b.6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Rao, Sonu Kumar, and Naveen K. Nishchal. "Optical Asymmetric Color Image Encryption using Vector Light Field Encoding." In Digital Holography and Three-Dimensional Imaging. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/dh.2024.w4a.36.

Pełny tekst źródła
Streszczenie:
Vector beam is a type of beam that has inhomogeneous polarization distribution across the transverse plane. In this study, an arbitrary vector light beam is used for asymmetric color image encryption achieving high level of security.
Style APA, Harvard, Vancouver, ISO itp.
7

Wang, Andy Ju An. "A security thread in a thread-based curriculum." In the 9th ACM SIGITE conference. ACM Press, 2008. http://dx.doi.org/10.1145/1414558.1414609.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Unwala, Ishaq, Zafar Taqvi, and Jiang Lu. "IoT Security: ZWave and Thread." In 2018 IEEE Green Technologies Conference (GreenTech). IEEE, 2018. http://dx.doi.org/10.1109/greentech.2018.00040.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Akestoridis, Dimitrios-Georgios, Vyas Sekar, and Patrick Tague. "On the Security of Thread Networks." In WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2022. http://dx.doi.org/10.1145/3507657.3528544.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Brotzman, Robert, Danfeng Zhang, Mahmut Kandemir, and Gang Tan. "Ghost Thread." In CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy. ACM, 2021. http://dx.doi.org/10.1145/3422337.3447846.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Security Thread"

1

Ozano, Kim, Andrew Roby, and Jacob Tompkins. Learning Journey on Water Security: UK Water Offer. Institute of Development Studies (IDS), 2022. http://dx.doi.org/10.19088/k4d.2022.026.

Pełny tekst źródła
Streszczenie:
The overarching goals for the UK in relation to global water security are to; tackle and reverse growing water insecurity and its consequences caused by depletion and degradation of natural water sources; and address poor water management and increasing demand. To do this, the UK has a well-developed water ‘offer’ that together can help reach the goal of global water security. This note details some of that water offer: UK water leadership: The UK developed the concept of modern sanitation and water supply, with an early example being the Victorian Bazalgette London sewer; Ownership and regula
Style APA, Harvard, Vancouver, ISO itp.
2

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Characterization. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126557.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Definition. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126558.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Characterization Worksheets. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126571.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Montelibano, Joji, and Andrew Moore. Insider Threat Security Reference Architecture. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada609926.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Pełny tekst źródła
Streszczenie:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
Style APA, Harvard, Vancouver, ISO itp.
7

Alneyadi, Matar J. Gulf Security and the Iranian Threat. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada347197.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Kent, S., and A. Chi. Threat Model for BGP Path Security. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7132.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Gattis, Vanessa M. Obesity: A Threat to National Security? Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada547350.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Raju, Nivedita, and Laura Grego. The Space–Nuclear Nexus in European Security. Stockholm International Peace Research Institute, 2025. https://doi.org/10.55163/gepv2578.

Pełny tekst źródła
Streszczenie:
The space–nuclear nexus is prominent in today’s European security environment, amid shifting alliance dynamics and developments in Russia’s war in Ukraine. This paper compares dependencies, priorities and strategic cultures of various actors in the space and nuclear domains, beginning with the North Atlantic Treaty Organization (NATO), the European Union (EU) and their three nuclear-armed states: France, the United Kingdom and the United States. These actors feature centrally in Russian threat perceptions and converge on their sources of threats—primarily Russia, and to a lesser degree China,
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!