Artykuły w czasopismach na temat „Security Thread”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Security Thread”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Sun, Fu. "Analysis of the Screw Thread Connection Strength Based on Nonlinear Finite Element Method." Applied Mechanics and Materials 401-403 (September 2013): 55–58. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.55.
Pełny tekst źródłaWang, Meidi, Haoyun Liu, Pan Huang, and Zhe Wu. "Penetrating Imaging of Concealed Features in Banknotes with Near-Field Scanning Microwave Microscopy." Electronics 13, no. 23 (2024): 4729. http://dx.doi.org/10.3390/electronics13234729.
Pełny tekst źródłaSpahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 1, no. 2 (2015): 62. http://dx.doi.org/10.26417/ejis.v1i2.p62-67.
Pełny tekst źródłaSpahiu, VILMA. "Evaluation of Security Issuse. New Threats Twoards National and International Security." European Journal of Interdisciplinary Studies 2, no. 1 (2015): 62. http://dx.doi.org/10.26417/ejis.v2i1.p62-67.
Pełny tekst źródłaLiu, Jian, Dong Sheng Fan, Yue Wu, Guo Jiang Fu, and Mei Ju Liu. "Study of Remote Elevator Monitoring Fault Detection System." Advanced Materials Research 499 (April 2012): 459–63. http://dx.doi.org/10.4028/www.scientific.net/amr.499.459.
Pełny tekst źródłaZou, Changwei, Xudong Wang, Yaoqing Gao, and Jingling Xue. "Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization." ACM Transactions on Software Engineering and Methodology 31, no. 2 (2022): 1–37. http://dx.doi.org/10.1145/3494516.
Pełny tekst źródłaEt. al., Pavithra G,. "A Novel Watermarking and Re-Encryption Approach to Avoid Illegal Content Sharing In Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 2603–9. http://dx.doi.org/10.17762/turcomat.v12i2.2229.
Pełny tekst źródłaBui, Phuc, Minh Le, Binh Hoang, Nguyen Ngoc, and Huong Pham. "Data Partitioning and Asynchronous Processing to Improve the Embedded Software Performance on Multicore Processors." Informatics and Automation 21, no. 2 (2022): 243–74. http://dx.doi.org/10.15622/ia.21.2.2.
Pełny tekst źródłaPriambodo, Agung. "PERSIMPANGAN DILEMA PENANGANAN PENGUNGSI ASING DI INDONESIA PASCA PENERBITAN PERPRES NO. 125 TAHUN 2016." Cakrawala - Jurnal Humaniora 21, no. 2 (2021): 122–29. http://dx.doi.org/10.31294/jc.v21i2.10995.
Pełny tekst źródłaWoody, Carol. "Mission Thread Security Analysis: A Tool for Systems Engineers to Characterize Operational Security behavior." INSIGHT 16, no. 2 (2013): 37–40. http://dx.doi.org/10.1002/inst.201316237.
Pełny tekst źródłaEilers, Marco, Thibault Dardinier, and Peter Müller. "CommCSL: Proving Information Flow Security for Concurrent Programs using Abstract Commutativity." Proceedings of the ACM on Programming Languages 7, PLDI (2023): 1682–707. http://dx.doi.org/10.1145/3591289.
Pełny tekst źródłaManasa, R., and Jayanthila Devi A. "Cyber Security Attacks Detecting Thread in the Virtual World of Corporate Sectors." International Journal of Case Studies in Business, IT, and Education (IJCSBE) 7, no. 2 (2023): 90–105. https://doi.org/10.5281/zenodo.7818522.
Pełny tekst źródłaBhatti, David Samuel, Salbia Sidrat, Shahzad Saleem, et al. "Performance analysis: Securing SIP on multi-threaded/multi-core proxy server using public keys on Diffie–Hellman (DH) in single and multi-server queuing scenarios." PLOS ONE 19, no. 1 (2024): e0293626. http://dx.doi.org/10.1371/journal.pone.0293626.
Pełny tekst źródłaSumaira Hassan, Muhammad Shafiullah, Ali Ahmed, and Fahim Muhammad Khan. "Advances in AI to Predict and Prevent Cyber Security Attacks: A Comprehensive Analysis of Modern World." Physical Education, Health and Social Sciences 3, no. 1 (2025): 47–55. https://doi.org/10.63163/jpehss.v3i1.209.
Pełny tekst źródłaKambourakis, Georgios, Constantinos Kolias, Dimitrios Geneiatakis, Georgios Karopoulos, Georgios Michail Makrakis, and Ioannis Kounelis. "A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks." Symmetry 12, no. 4 (2020): 579. http://dx.doi.org/10.3390/sym12040579.
Pełny tekst źródłaGiri, Roshan, Shanker Prasad Chimouriya, and Bal Ram Ghimire. "STUDY OF SECURITY FEATURES PRESENT IN NEPALI PASSPORT." JOURNAL OF TECHNOLOGY & INNOVATION 3, no. 2 (2023): 58–63. http://dx.doi.org/10.26480/jtin.02.2023.58.63.
Pełny tekst źródłaGharibshah, Joobin, Evangelos E. Papalexakis, and Michalis Faloutsos. "REST: A Thread Embedding Approach for Identifying and Classifying User-Specified Information in Security Forums." Proceedings of the International AAAI Conference on Web and Social Media 14 (May 26, 2020): 217–28. http://dx.doi.org/10.1609/icwsm.v14i1.7293.
Pełny tekst źródłaLi, Feng, Zhi Hua Wang, and Hu Cheng Li. "Fast Static Security Analysis of Day-Ahead Generation Scheduling 96 Period Cases Adapting to Large Power System." Advanced Materials Research 732-733 (August 2013): 669–76. http://dx.doi.org/10.4028/www.scientific.net/amr.732-733.669.
Pełny tekst źródłaPang, Toh Yen, Juan D. Pelaez Restrepo, Chi-Tsun Cheng, Alim Yasin, Hailey Lim, and Miro Miletic. "Developing a Digital Twin and Digital Thread Framework for an ‘Industry 4.0’ Shipyard." Applied Sciences 11, no. 3 (2021): 1097. http://dx.doi.org/10.3390/app11031097.
Pełny tekst źródłaGiri, R., P. Bhattarai, S. P. Chimouriya, and B. R. Ghimire. "Examination of Security Features in Nepali Currency of Denomination Rs. 500 and Rs. 1000 Using Video Spectral Comparator-6000." Journal of Nepal Physical Society 7, no. 4 (2021): 36–42. http://dx.doi.org/10.3126/jnphyssoc.v7i4.42929.
Pełny tekst źródłaB N, Mangalagowri, and Dr N. Sandeep Varma. "Intrusion Detection System of IPv6 Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 1267–74. http://dx.doi.org/10.22214/ijraset.2022.46628.
Pełny tekst źródłaJonev, Katarina, Ivan Rancic, and Hatidza Berisha. "CONTEMPORARY WARS AND ARMED CONFLICTS." Knowledge International Journal 26, no. 6 (2019): 1827–37. http://dx.doi.org/10.35120/kij26061827j.
Pełny tekst źródłaZahraa Raji Al-zobaiby. "Developing data mining algorithms for predicting cyber security risks using predictive analytics." World Journal of Advanced Research and Reviews 25, no. 2 (2025): 585–92. https://doi.org/10.30574/wjarr.2025.25.2.0344.
Pełny tekst źródłaAgrawal and Mankar. "Mobile Cloud Computing." International Journal of Ingenious Research, Invention and Development (IJIRID) 1, no. 2 (2023): 29–32. https://doi.org/10.5281/zenodo.7820178.
Pełny tekst źródłaMatveev, Aleksei Aleksandrovich. "Migration security within the system of global security: mechanisms, principles, actors." Философская мысль, no. 3 (March 2021): 66–80. http://dx.doi.org/10.25136/2409-8728.2021.3.33512.
Pełny tekst źródłaWang, Yi-Wei, and Ja-Ling Wu. "A Privacy-Preserving Symptoms Retrieval System with the Aid of Homomorphic Encryption and Private Set Intersection Schemes." Algorithms 16, no. 5 (2023): 244. http://dx.doi.org/10.3390/a16050244.
Pełny tekst źródłaGeppert, Karol, and Jerzy Konieczny. "Analysis of Potential Threats to the Critical Infrastructure of the 31st Tactical Air Base, in the Context of the Security of the Poznan Agglomeration." Przegląd Strategiczny, no. 16 (January 22, 2024): 219–35. http://dx.doi.org/10.14746/ps.2023.1.16.
Pełny tekst źródłaSingh, Anshul, Aryan Shenoy, and Nihar Thanekar. "Chain Thread: Blockchain-Powered Product Verification and Authenticity Tracking." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 4976–81. https://doi.org/10.22214/ijraset.2025.69592.
Pełny tekst źródłaAnderson, Ross, and Tyler Moore. "Information security: where computer science, economics and psychology meet." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 367, no. 1898 (2009): 2717–27. http://dx.doi.org/10.1098/rsta.2009.0027.
Pełny tekst źródłaMr., Rajeev &. Mr. Dhirender. "A SURVEY OF URBAN PEOPLE AWARENESS ABOUT NEW INDIAN CURRENCY SECURITY FEATURES AFTER DEMONETIZATION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 563–67. https://doi.org/10.5281/zenodo.829771.
Pełny tekst źródłaZhang, Rui Xia, Ya Liang Wang, and Yan Lan Liu. "Research on File System Event Monitoring in Android Platform." Applied Mechanics and Materials 443 (October 2013): 494–98. http://dx.doi.org/10.4028/www.scientific.net/amm.443.494.
Pełny tekst źródłaPaul Okudolo, Ikemefuna Taire, and Itumeleng Mekoa. "Recurring thread in local administration and its impact on human security in Africa : experience from Nigeria." African Renaissance SI, no. 3 (2019): 57–74. http://dx.doi.org/10.31920/2516-5305/2019/sin3a4.
Pełny tekst źródłaLiu, Yu, Zhibo Pang, Gyorgy Dan, Dapeng Lan, and Shaofang Gong. "A Taxonomy for the Security Assessment of IP-Based Building Automation Systems: The Case of Thread." IEEE Transactions on Industrial Informatics 14, no. 9 (2018): 4113–23. http://dx.doi.org/10.1109/tii.2018.2844955.
Pełny tekst źródłaCollins, Rob, Peter Pearson, and Peter Chattaway. "3.4.2 Improving Systems Integrity by Using Thread Analysis for Design Validation." INCOSE International Symposium 10, no. 1 (2000): 446–54. http://dx.doi.org/10.1002/j.2334-5837.2000.tb00410.x.
Pełny tekst źródłaChandra, G. Rajesh, K. Jagan Mohan, Osamah Ibrahim Khalaf, et al. "A superior secure key spawn using boosted uniqueness encryption for cloud computing in advanced extensive mobile network." SINERGI 28, no. 2 (2024): 405. http://dx.doi.org/10.22441/sinergi.2024.2.019.
Pełny tekst źródłaFlynn, Christopher, and Emily Tsokos. "Energy security, moratoria and domestic gas: Australia, LNG and its gas policy catch-22." APPEA Journal 57, no. 1 (2017): 26. http://dx.doi.org/10.1071/aj16232.
Pełny tekst źródłaBrooks, Mitchell, and Matthew Hause. "Model‐Based Cyber Security at the Enterprise and Systems Level." INCOSE International Symposium 33, no. 1 (2023): 649–65. http://dx.doi.org/10.1002/iis2.13044.
Pełny tekst źródłaWang, Wen Cai, Wen Bin Wei, and Ling Wang. "Numerical Simulation Study on Combined Supporting Scheme of Bolts and Anchor Cable." Applied Mechanics and Materials 638-640 (September 2014): 898–903. http://dx.doi.org/10.4028/www.scientific.net/amm.638-640.898.
Pełny tekst źródłaSandhya, P. K*1 &. Prof. K. S. Valsaraj2. "SURVEY ON SMART HOME TECHNOLOGIES TO UNDERSTAND ITS SCALING ISSUES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Metanoia 19 (April 5, 2019): 59–62. https://doi.org/10.5281/zenodo.2630850.
Pełny tekst źródłaXia, Zhixin, Xiaolei Yang, Afei Li, Yongshan Liu, and Siyuan He. "Research on Information Security Transmission of Port Multi-Thread Equipment Based on Advanced Encryption Standard and Preprocessing Optimization." Applied Sciences 14, no. 24 (2024): 11887. https://doi.org/10.3390/app142411887.
Pełny tekst źródłaMaj, Ewa. "Suwerenność w myśli politycznej współczesnego ruchu narodowego w Polsce." Myśl Polityczna. Political Thought 2(22) (2024): 31–54. https://doi.org/10.31268/mppt.2024.14.
Pełny tekst źródłaNuriev, Marat, Rimma Zaripova, Sergey Sitnikov, and Rustam Nurgaliev. "The principles of building a parallel program for steganographic file protection." E3S Web of Conferences 458 (2023): 09027. http://dx.doi.org/10.1051/e3sconf/202345809027.
Pełny tekst źródłaLi, Hui. "Computer Security Issues and Legal System Based on Cloud Computing." Computational Intelligence and Neuroscience 2022 (July 11, 2022): 1–11. http://dx.doi.org/10.1155/2022/8112212.
Pełny tekst źródłaChen, Wei Bing, Gang Lin Zhang, and Lu Feng. "Realization and Design of Mobile Video Surveillance Client Platform Based on Smart Phone." Applied Mechanics and Materials 602-605 (August 2014): 1753–56. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.1753.
Pełny tekst źródłaXiong, Qi, Xiao Feng He, and Jie Tang. "Design and Implementation of Authentication Server with High Concurrency." Advanced Materials Research 834-836 (October 2013): 1791–94. http://dx.doi.org/10.4028/www.scientific.net/amr.834-836.1791.
Pełny tekst źródłaJamiluddin and Novia Yuliana. "THE IMPACT OF THREAD KELAMBU WATERFALL TOURISM ON THE SOCIO-ECONOMIC CONDITIONS OF THE PEOPLE OF AIK BERIK VILLAGE, BATUKLIANG UTARA SUB-DISTRICT CENTRAL LOMBOK DISTRICT." Proceedings of the International Conference on Social Studies Education (ICoSSE) 1, no. 1 (2024): 212–19. https://doi.org/10.20414/icosse.v1i1.23.
Pełny tekst źródłaWang, Kunpeng, Jingmei Li, Zhongchuan Fu, and Tianyu Chen. "IRePf: An Instruction Reorganization Virtual Platform for Kernel Stack Overflow Detection." Security and Communication Networks 2022 (May 13, 2022): 1–14. http://dx.doi.org/10.1155/2022/7645210.
Pełny tekst źródłaAl-Refai, Hasan, and Ali Ahmad Alawneh. "User Authentication and Authorization Framework in IoT Protocols." Computers 11, no. 10 (2022): 147. http://dx.doi.org/10.3390/computers11100147.
Pełny tekst źródłaSinghal, Prateek, Puneet Sharma, and Sheenu Rizvi. "Thwarting Sybil Attack by CAM Method in WSN using Cooja Simulator Framework." International Journal of Engineering & Technology 7, no. 4.19 (2018): 589–95. http://dx.doi.org/10.14419/ijet.v7i4.19.27965.
Pełny tekst źródłaIndarti, Erlyn. "Strengthen Security and Public Order: Accountability Management in Improving the Quality of Law Enforcement." Academic Journal of Interdisciplinary Studies 9, no. 2 (2020): 82. http://dx.doi.org/10.36941/ajis-2020-0025.
Pełny tekst źródła