Добірка наукової літератури з теми "Research security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Research security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Research security"
Zh. Stoyanov, Stiliyan. "Space research and national security." Journal scientific and applied research 1, no. 1 (2012): 154–57. http://dx.doi.org/10.46687/jsar.v1i1.33.
Повний текст джерелаSzpyra, Ryszard. "Military Security within the Framework of Security Studies: Research Results." Connections: The Quarterly Journal 13, no. 3 (2014): 59–82. http://dx.doi.org/10.11610/connections.13.3.04.
Повний текст джерелаGannon, John C., Richard A. Meserve, and Maria T. Zuber. "Reconsidering Research Security." Issues in Science and Technology 41, no. 2 (2025): 90–93. https://doi.org/10.58875/onga4344.
Повний текст джерелаCohen, Eliot A. "Taiwan Security Research." Foreign Affairs 79, no. 4 (2000): 154. http://dx.doi.org/10.2307/20049846.
Повний текст джерелаMitka, Mike. "Research Laboratory Security." JAMA 302, no. 10 (2009): 1050. http://dx.doi.org/10.1001/jama.2009.1271.
Повний текст джерелаCR, Rachana. "Data Security in Cloud Computing: A Research Perspective." International Journal of Research and Review 9, no. 11 (2022): 325–30. http://dx.doi.org/10.52403/ijrr.20221144.
Повний текст джерелаTang, Jian Gang, Shi Jun Zhang, and Ji Jiang. "Research on Network Security Issues and Security Model." Applied Mechanics and Materials 519-520 (February 2014): 128–31. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.128.
Повний текст джерелаChangchit, Chuleeporn. "Security Systems Framework, Security-Related Research, Web Threats." Journal of Information Privacy and Security 7, no. 4 (2011): 1–2. http://dx.doi.org/10.1080/15536548.2011.10855920.
Повний текст джерелаZhang, Yan Kun. "Computer Network Security Threats and Security Technology Research." Advanced Materials Research 971-973 (June 2014): 1440–43. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1440.
Повний текст джерелаWang, Zhi Gang, Chang Zhen Hu, Ming Lei Hao, and Fang Lu. "Cyber Security Datasets Research." Advanced Materials Research 659 (January 2013): 191–95. http://dx.doi.org/10.4028/www.scientific.net/amr.659.191.
Повний текст джерелаДисертації з теми "Research security"
Forman, Peter James. "Securing natural gas : entity-attentive security research." Thesis, Durham University, 2017. http://etheses.dur.ac.uk/12139/.
Повний текст джерелаBruner, William W. "National Security Implications of Inexpensive Space Access." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/brunerww.htm.
Повний текст джерелаMartonosi, Susan Elizabeth. "An Operations Research approach to aviation security." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33671.
Повний текст джерелаWenhua, Qi, Zhang Qishan, and Liu Hailong. "RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606688.
Повний текст джерелаDaehnick, Christian C. "Blueprints For The Future Comparing National Security Space Architectures /." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/daehnicc.htm.
Повний текст джерелаSeidel, Scott B. "Planning combat outposts to maximize population security." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/61195.
Повний текст джерелаYoung, Jason Osgood Ewen. "Novel Materials for Use in Homeland Security Research." TopSCHOLAR®, 2013. http://digitalcommons.wku.edu/theses/1241.
Повний текст джерелаAshenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.
Повний текст джерелаWai, Hor Cheong. "Research in computer forensics." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FHor.pdf.
Повний текст джерелаMiko, Katharina, and Elisabeth Mayr. "Trading Places: Power Distributions in participatory research projects as exemplified by security research." WU Vienna University of Economics and Business, 2015. http://epub.wu.ac.at/4727/1/MikoMayr2015.pdf.
Повний текст джерелаКниги з теми "Research security"
Chen, Liqun, and Chris Mitchell, eds. Security Standardisation Research. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14054-4.
Повний текст джерелаChen, Lidong, David McGrew, and Chris Mitchell, eds. Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4.
Повний текст джерелаCremers, Cas, and Anja Lehmann, eds. Security Standardisation Research. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04762-7.
Повний текст джерелаvan der Merwe, Thyla, Chris Mitchell, and Maryam Mehrnezhad, eds. Security Standardisation Research. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64357-7.
Повний текст джерелаChen, Liqun, and Shin'ichiro Matsuo, eds. Security Standardisation Research. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27152-1.
Повний текст джерелаGünther, Felix, and Julia Hesse, eds. Security Standardisation Research. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30731-7.
Повний текст джерелаLu, Xianhui, and Chris J. Mitchell, eds. Security Standardisation Research. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-87541-0.
Повний текст джерелаGreat Britain. Department of Social Security., ed. Social security research yearbook. HMSO, 1993.
Знайти повний текст джерелаGreat Britain. Department of Social Security., ed. Social security research yearbook. HMSO, 1994.
Знайти повний текст джерелаGreat Britain. Department of Social Security., ed. Social security research yearbook. HMSO., 1991.
Знайти повний текст джерелаЧастини книг з теми "Research security"
Hirsch Ballin, Ernst, Huub Dijstelbloem, and Peter de Goede. "Human Security and Flow Security in Dutch Security Policy." In Research for Policy. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37606-2_3.
Повний текст джерелаKrishnan, Padmanabhan. "Security Research: Program Analysis Meets Security." In Formal Methods for an Informal World. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-43678-9_6.
Повний текст джерелаBarrett, Christopher B., Jeffrey Cason, and Erin C. Lentz. "Safety and security matters." In Overseas Research. Routledge, 2020. http://dx.doi.org/10.4324/9780367257095-6.
Повний текст джерелаLunt, Teresa F. "Strategic Directions in Computer Security Research." In Database Security. Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_1.
Повний текст джерелаKhan, Suhel Ahmad, Rajeev Kumar, and Raees Ahmad Khan. "Research Trends in Software Security Estimation." In Software Security. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003330516-13.
Повний текст джерелаCameron, Catherine Ann, Ayshe Talay-Ongan, Roger Hancock, and Sombat Tapanya. "Emotional Security." In International Perspectives on Early Childhood Research. Palgrave Macmillan UK, 2010. http://dx.doi.org/10.1057/9780230251373_4.
Повний текст джерелаSchilling, Andreas. "Robust Optimization of IT Security Safeguards Using Standard Security Data." In Operations Research Proceedings. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-42902-1_45.
Повний текст джерелаSakurada, Hideki, Kazuki Yoneyama, Yoshikazu Hanatani, and Maki Yoshida. "Analyzing and Fixing the QACCE Security of QUIC." In Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4_1.
Повний текст джерелаHanatani, Yoshikazu, Naoki Ogura, Yoshihiro Ohba, Lidong Chen, and Subir Das. "Secure Multicast Group Management and Key Distribution in IEEE 802.21." In Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4_10.
Повний текст джерелаMcGrew, David, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag, Denis Butin, and Johannes Buchmann. "State Management for Hash-Based Signatures." In Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4_11.
Повний текст джерелаТези доповідей конференцій з теми "Research security"
Mikhnev, Ilia Pavlovich, and Svetlana Vladimirovna Mikhneva. "Ensuring the security of critical information infrastructure: the powers of the federal government bodies of the Russian Federation." In International Research-to-practice conference. Publishing house Sreda, 2019. http://dx.doi.org/10.31483/r-32617.
Повний текст джерелаBunin, Barry J., Alexander Sutin, and Michael S. Bruno. "Maritime security laboratory for maritime security research." In Defense and Security Symposium, edited by Theodore T. Saito, Daniel Lehrfeld, and Michael J. DeWeert. SPIE, 2007. http://dx.doi.org/10.1117/12.718040.
Повний текст джерелаNie, Xiao, and Xiaobing Zhai. "M2M security threat and security mechanism research." In 2013 3rd International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2013. http://dx.doi.org/10.1109/iccsnt.2013.6967252.
Повний текст джерелаPerrig, Adrian. "Exciting Security Research Opportunity." In CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014. http://dx.doi.org/10.1145/2660267.2661034.
Повний текст джерелаChen, Hanrong, and JunMei He. "E-commerce Security Research." In 2nd International Conference on Computer Application and System Modeling. Atlantis Press, 2012. http://dx.doi.org/10.2991/iccasm.2012.115.
Повний текст джерелаDai, Kuobin. "Network Security Mechanisms Research." In 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing (IPTC). IEEE, 2011. http://dx.doi.org/10.1109/iptc.2011.65.
Повний текст джерелаSemenov, Serhii, Viacheslav Davydov, Nina Kuchuk, and Inna Petrovskaya. "Software security threat research." In 2021 XXXI International Scientific Symposium Metrology and Metrology Assurance (MMA). IEEE, 2021. http://dx.doi.org/10.1109/mma52675.2021.9610877.
Повний текст джерелаHerrmann, Jonathan G. "Research to protect water infrastructure: EPA's water security research program." In Defense and Security, edited by Theodore T. Saito. SPIE, 2005. http://dx.doi.org/10.1117/12.606957.
Повний текст джерелаGallagher, Kyle A., Gregory J. Mazzaro, Anthony F. Martone, Kelly D. Sherbondy, and Ram M. Narayanan. "Recent non-linear radar research at the Army Research Laboratory." In SPIE Defense + Security, edited by Kenneth I. Ranney and Armin Doerry. SPIE, 2017. http://dx.doi.org/10.1117/12.2266266.
Повний текст джерелаPollehn, Herbert, K. K. Choi, Stefan Svensson, and Nibir Dhar. "IR material research at the Army Research Laboratory." In Defense and Security Symposium, edited by Bjørn F. Andresen, Gabor F. Fulop, and Paul R. Norton. SPIE, 2007. http://dx.doi.org/10.1117/12.723659.
Повний текст джерелаЗвіти організацій з теми "Research security"
Ali, Alee. National Security Research Center. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1779649.
Повний текст джерелаAli, Alee. National Security Research Center. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1781340.
Повний текст джерелаJansen, Wayne. Directions in security metrics research. National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7564.
Повний текст джерелаMislove, Michael. Collaborative Research on Systems and Security. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada608315.
Повний текст джерелаHird, Geoffrey R., Daryl McCullough, Stephen Brackin, and Doug Long. Research Advances in Handling Adaptive Security. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada297004.
Повний текст джерелаBurns, Rae K. Research Directions in Database Security IV. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada268885.
Повний текст джерелаJenkins, Chris. Systems Security Architecture Research and Development. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1488465.
Повний текст джерелаEk, David R. Risk Based Security Management at Research Reactors. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1222990.
Повний текст джерелаWiskoff, Martin F. Personnel Security and Reliability: Psychological Research Issues. Defense Technical Information Center, 1987. http://dx.doi.org/10.21236/ada207148.
Повний текст джерелаSteeves, Brye, Mercedes Martinez, Paul Ziomek, and Alee Ali. National Security Research Center 2021 Strategic Plan. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1669084.
Повний текст джерела