Добірка наукової літератури з теми "Research security"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Research security".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Research security"

1

Zh. Stoyanov, Stiliyan. "Space research and national security." Journal scientific and applied research 1, no. 1 (2012): 154–57. http://dx.doi.org/10.46687/jsar.v1i1.33.

Повний текст джерела
Анотація:
In the current stage of human evolution, it is necessary and important to receive information about risks and threats which concern the national security in times of peace, as well as in times of different crises and conflicts. The paper makes a link between the space research and national security. Special attention is paid to the optical methods and means for discovery and research of processes, phenomena and objects in the atmos-phere, as well as on the earth surface.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Szpyra, Ryszard. "Military Security within the Framework of Security Studies: Research Results." Connections: The Quarterly Journal 13, no. 3 (2014): 59–82. http://dx.doi.org/10.11610/connections.13.3.04.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Gannon, John C., Richard A. Meserve, and Maria T. Zuber. "Reconsidering Research Security." Issues in Science and Technology 41, no. 2 (2025): 90–93. https://doi.org/10.58875/onga4344.

Повний текст джерела
Анотація:
Research security isn’t only about defending against external threats; it also requires ensuring that the United States remains a leader in global innovation by supporting the people and infrastructure that fuel it.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Cohen, Eliot A. "Taiwan Security Research." Foreign Affairs 79, no. 4 (2000): 154. http://dx.doi.org/10.2307/20049846.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Mitka, Mike. "Research Laboratory Security." JAMA 302, no. 10 (2009): 1050. http://dx.doi.org/10.1001/jama.2009.1271.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

CR, Rachana. "Data Security in Cloud Computing: A Research Perspective." International Journal of Research and Review 9, no. 11 (2022): 325–30. http://dx.doi.org/10.52403/ijrr.20221144.

Повний текст джерела
Анотація:
Security plays a very important role in the life of every living being. Today, in the ‘Technology’ engulfed businesses, data security is crucial for users and vendors alike. Cloud computing as a technology is the driving force behind all the financial transactions being completed every second across the globe. In the current context, Cloud data security is crucial and is of utmost importance. Data Security in the cloud refers to the technologies, policies, services, security controls that protect data in the cloud from loss, leakage or misuse through security breaches and unauthorized access.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Tang, Jian Gang, Shi Jun Zhang, and Ji Jiang. "Research on Network Security Issues and Security Model." Applied Mechanics and Materials 519-520 (February 2014): 128–31. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.128.

Повний текст джерела
Анотація:
Network security issues came from traditional network, wireless network and cloud computing environment. Large-scale cloud computing, versatility and virtualization features of network security had become a hidden threat source. This paper analyzed the sources of network security threats, and established a network security model which encompasses all types of currently known network security factors; it could provide countermeasures to ensure network security. The security model had capabilities of real-time detection, rapid response, immediate recovery, and interaction between various indepen
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Changchit, Chuleeporn. "Security Systems Framework, Security-Related Research, Web Threats." Journal of Information Privacy and Security 7, no. 4 (2011): 1–2. http://dx.doi.org/10.1080/15536548.2011.10855920.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Zhang, Yan Kun. "Computer Network Security Threats and Security Technology Research." Advanced Materials Research 971-973 (June 2014): 1440–43. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1440.

Повний текст джерела
Анотація:
Networksecurity network system is presented, including hardware, software, and itstransmission in the network information security, network security threatsmainly include: software vulnerabilities, improper configuration, safetyconsciousness is not strong, virus, hacker attacks, etc. Is not only afirewall, network security is not anti-virus, intrusion monitoring, firewall,identity authentication, encryption, and other products of simple stack, butfrom the system to the application, from the device to the service ofrelatively complete, the system of the combination of security products.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Wang, Zhi Gang, Chang Zhen Hu, Ming Lei Hao, and Fang Lu. "Cyber Security Datasets Research." Advanced Materials Research 659 (January 2013): 191–95. http://dx.doi.org/10.4028/www.scientific.net/amr.659.191.

Повний текст джерела
Анотація:
Data is the basis for cyber security research. Correct understanding and rapid access to rich and reliable data is a good beginning of our research work. In this paper we present a novel classification method of cyber security data. In addition, we collect and list some datasets, which can better help you to carry out research.
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Дисертації з теми "Research security"

1

Forman, Peter James. "Securing natural gas : entity-attentive security research." Thesis, Durham University, 2017. http://etheses.dur.ac.uk/12139/.

Повний текст джерела
Анотація:
Natural gas is a troublesome and ‘wayward’ material (Bridge, 2004; 396). Amongst other qualities, it is invisible, intangible, naturally odorless, highly inflammable, and constantly resistant to the forces that contain it. This thesis provides an account of how these qualities both introduce a series of insecurities to everyday social environments, and also make it a challenging material to govern. Specifically, I examine the way that security is performed around gas circulations in the UK’s transmission and distribution pipelines, and I describe how a range of specialized security practices h
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Bruner, William W. "National Security Implications of Inexpensive Space Access." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/brunerww.htm.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Martonosi, Susan Elizabeth. "An Operations Research approach to aviation security." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33671.

Повний текст джерела
Анотація:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center, 2005.<br>Includes bibliographical references (p. 151-163).<br>Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore first whether securing aviation deserves priority over other potential targets. We compare the historical risk of aviation terrorism to that posed by other forms of terrorism and conclude that the focus on a
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Wenhua, Qi, Zhang Qishan, and Liu Hailong. "RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606688.

Повний текст джерела
Анотація:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>Security hardware based on asymmetric algorithm is the key component of Public Key Infrastructure (PKI), which decides the safety and performance of system. Security device in server or client have some common functions. We designed the client token and cryptographic server to improve the performance of PKI, and got obvious effect.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Daehnick, Christian C. "Blueprints For The Future Comparing National Security Space Architectures /." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/daehnicc.htm.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Seidel, Scott B. "Planning combat outposts to maximize population security." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/61195.

Повний текст джерела
Анотація:
Thesis (S.M.)--Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center, 2010.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 123-124).<br>Combat outposts (COPs) are small, well-protected bases from which soldiers reside and conduct operations from. Used extensively during the "Surge" in Iraq, COPs are usually established in populated areas and are prevalent in the counterinsurgency operations in Afghanistan in 2010. This research models population security to determine combat outpost locations in a battalion area of ope
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Young, Jason Osgood Ewen. "Novel Materials for Use in Homeland Security Research." TopSCHOLAR®, 2013. http://digitalcommons.wku.edu/theses/1241.

Повний текст джерела
Анотація:
Organometallic pyridazines and compounds derived from them have been of interest in polymer research due to their atypical environmental stability (as compared to other non-aromatic organic semiconductors) as well as their conductivity. The off-metal synthesis and characterization of several pyridazyl thallium, manganese, and rhenium complexes, beginning with fulvenes 1,2- C5H3(COHR)(COR), are reported here. The diacyl fulvenes were treated with hydrazine hydrate to ring close to pyridazines. Next, the pyridazines were converted to their respective thallium salts through treatment with thalliu
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Ashenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.

Повний текст джерела
Анотація:
Large-scale data losses experienced across both public and private sector organisations have led to expectations that organisations will develop a culture that supports information security aims and objectives. Despite the fact that many organisations now run awareness, education and training programmes for their employees, however, information security incidents due to employee misuse of information still keep occurring. This suggests that these programmes are not working. The research presented in this thesis examines ways to better understand employees’ attitudes towards information securit
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Wai, Hor Cheong. "Research in computer forensics." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FHor.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Miko, Katharina, and Elisabeth Mayr. "Trading Places: Power Distributions in participatory research projects as exemplified by security research." WU Vienna University of Economics and Business, 2015. http://epub.wu.ac.at/4727/1/MikoMayr2015.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Книги з теми "Research security"

1

Chen, Liqun, and Chris Mitchell, eds. Security Standardisation Research. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14054-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Chen, Lidong, David McGrew, and Chris Mitchell, eds. Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Cremers, Cas, and Anja Lehmann, eds. Security Standardisation Research. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04762-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

van der Merwe, Thyla, Chris Mitchell, and Maryam Mehrnezhad, eds. Security Standardisation Research. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64357-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Chen, Liqun, and Shin'ichiro Matsuo, eds. Security Standardisation Research. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27152-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Günther, Felix, and Julia Hesse, eds. Security Standardisation Research. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30731-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Lu, Xianhui, and Chris J. Mitchell, eds. Security Standardisation Research. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-87541-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Great Britain. Department of Social Security., ed. Social security research yearbook. HMSO, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Great Britain. Department of Social Security., ed. Social security research yearbook. HMSO, 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Great Britain. Department of Social Security., ed. Social security research yearbook. HMSO., 1991.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Більше джерел

Частини книг з теми "Research security"

1

Hirsch Ballin, Ernst, Huub Dijstelbloem, and Peter de Goede. "Human Security and Flow Security in Dutch Security Policy." In Research for Policy. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37606-2_3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Krishnan, Padmanabhan. "Security Research: Program Analysis Meets Security." In Formal Methods for an Informal World. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-43678-9_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Barrett, Christopher B., Jeffrey Cason, and Erin C. Lentz. "Safety and security matters." In Overseas Research. Routledge, 2020. http://dx.doi.org/10.4324/9780367257095-6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Lunt, Teresa F. "Strategic Directions in Computer Security Research." In Database Security. Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Khan, Suhel Ahmad, Rajeev Kumar, and Raees Ahmad Khan. "Research Trends in Software Security Estimation." In Software Security. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003330516-13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Cameron, Catherine Ann, Ayshe Talay-Ongan, Roger Hancock, and Sombat Tapanya. "Emotional Security." In International Perspectives on Early Childhood Research. Palgrave Macmillan UK, 2010. http://dx.doi.org/10.1057/9780230251373_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Schilling, Andreas. "Robust Optimization of IT Security Safeguards Using Standard Security Data." In Operations Research Proceedings. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-42902-1_45.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Sakurada, Hideki, Kazuki Yoneyama, Yoshikazu Hanatani, and Maki Yoshida. "Analyzing and Fixing the QACCE Security of QUIC." In Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4_1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Hanatani, Yoshikazu, Naoki Ogura, Yoshihiro Ohba, Lidong Chen, and Subir Das. "Secure Multicast Group Management and Key Distribution in IEEE 802.21." In Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

McGrew, David, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag, Denis Butin, and Johannes Buchmann. "State Management for Hash-Based Signatures." In Security Standardisation Research. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49100-4_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Research security"

1

Mikhnev, Ilia Pavlovich, and Svetlana Vladimirovna Mikhneva. "Ensuring the security of critical information infrastructure: the powers of the federal government bodies of the Russian Federation." In International Research-to-practice conference. Publishing house Sreda, 2019. http://dx.doi.org/10.31483/r-32617.

Повний текст джерела
Анотація:
The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rig
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Bunin, Barry J., Alexander Sutin, and Michael S. Bruno. "Maritime security laboratory for maritime security research." In Defense and Security Symposium, edited by Theodore T. Saito, Daniel Lehrfeld, and Michael J. DeWeert. SPIE, 2007. http://dx.doi.org/10.1117/12.718040.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Nie, Xiao, and Xiaobing Zhai. "M2M security threat and security mechanism research." In 2013 3rd International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2013. http://dx.doi.org/10.1109/iccsnt.2013.6967252.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Perrig, Adrian. "Exciting Security Research Opportunity." In CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014. http://dx.doi.org/10.1145/2660267.2661034.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Chen, Hanrong, and JunMei He. "E-commerce Security Research." In 2nd International Conference on Computer Application and System Modeling. Atlantis Press, 2012. http://dx.doi.org/10.2991/iccasm.2012.115.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Dai, Kuobin. "Network Security Mechanisms Research." In 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing (IPTC). IEEE, 2011. http://dx.doi.org/10.1109/iptc.2011.65.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Semenov, Serhii, Viacheslav Davydov, Nina Kuchuk, and Inna Petrovskaya. "Software security threat research." In 2021 XXXI International Scientific Symposium Metrology and Metrology Assurance (MMA). IEEE, 2021. http://dx.doi.org/10.1109/mma52675.2021.9610877.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Herrmann, Jonathan G. "Research to protect water infrastructure: EPA's water security research program." In Defense and Security, edited by Theodore T. Saito. SPIE, 2005. http://dx.doi.org/10.1117/12.606957.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Gallagher, Kyle A., Gregory J. Mazzaro, Anthony F. Martone, Kelly D. Sherbondy, and Ram M. Narayanan. "Recent non-linear radar research at the Army Research Laboratory." In SPIE Defense + Security, edited by Kenneth I. Ranney and Armin Doerry. SPIE, 2017. http://dx.doi.org/10.1117/12.2266266.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Pollehn, Herbert, K. K. Choi, Stefan Svensson, and Nibir Dhar. "IR material research at the Army Research Laboratory." In Defense and Security Symposium, edited by Bjørn F. Andresen, Gabor F. Fulop, and Paul R. Norton. SPIE, 2007. http://dx.doi.org/10.1117/12.723659.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Research security"

1

Ali, Alee. National Security Research Center. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1779649.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Ali, Alee. National Security Research Center. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1781340.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Jansen, Wayne. Directions in security metrics research. National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7564.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Mislove, Michael. Collaborative Research on Systems and Security. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada608315.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Hird, Geoffrey R., Daryl McCullough, Stephen Brackin, and Doug Long. Research Advances in Handling Adaptive Security. Defense Technical Information Center, 1995. http://dx.doi.org/10.21236/ada297004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Burns, Rae K. Research Directions in Database Security IV. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada268885.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Jenkins, Chris. Systems Security Architecture Research and Development. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1488465.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Ek, David R. Risk Based Security Management at Research Reactors. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1222990.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Wiskoff, Martin F. Personnel Security and Reliability: Psychological Research Issues. Defense Technical Information Center, 1987. http://dx.doi.org/10.21236/ada207148.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Steeves, Brye, Mercedes Martinez, Paul Ziomek, and Alee Ali. National Security Research Center 2021 Strategic Plan. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1669084.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!