Printer Friendly

Browse Security management topic

Analysis subtopic

Articles

1-123 out of 123 article(s)
Title Author Type Date Words
ANALYSIS OF THE DETERMINANT INFRASTRUCTURE EFFECT IN SUPPORTING SUBMARINE OPERATIONAL DURABILITY TO INCREASE THE RESILIENCE OF THE INDONESIAN STATE DEFENSE SYSTEM AT SEA. Moelyanto; Marsetio; Octavian, A.; Bura, R.O.; Putra, I.N. Report Apr 1, 2021 5919
Image Deduplication Based on Hashing and Clustering in Cloud Storage. Chen, Lu; Xiang, Feng; Sun, Zhixin Report Apr 1, 2021 5969
Cyber-Attacks on Medical Implants: A Case Study of Cardiac Pacemaker Vulnerability. Rehman, Muhammad Muneeb Ur; Rehman, Hafiz Zia Ur; Khan, Zeashan Hameed Case study Nov 1, 2020 3804
Machine Learning for Prediction of Energy in Wheat Production. Mostafaeipour, Ali; Fakhrzad, Mohammad Bagher; Gharaat, Sajad; Jahangiri, Mehdi; Dhanraj, Joshuva Ar Nov 1, 2020 8025
FACTORS INFLUENCING FOOD CONSUMPTION DIVERSITY AMONG FARMING HOUSEHOLDS IN SELECTED STATES IN SOUTHWESTERN NIGERIA. Egbetokun O.A.; Fraser G.C.G. Oct 1, 2020 6314
Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection. Aljably, Randa; Tian, Yuan; Rodhaan, Mznah Al- Aug 31, 2020 8109
Differences in the Growth and Physiological Responses of the Leaves of Peucedanum japonicum and Hordeum vulgare Exposed to Salinity. Liu, Liyun; Nakamura, Yuki; Taliman, Nisar Ahmad; Sabagh, Ayman E.L.; Moghaieb, Reda E.A.; Saneoka, Aug 1, 2020 7910
Reconciling Pragmatism with Idealism in the European Union's Security Cooperation with ASEAN. Di Floristella, Angela Pennisi Aug 1, 2020 10192
Modelling Features-Based Birthmarks for Security of End-to-End Communication System. Li, Meilian; Nazir, Shah; Khan, Habib Ullah; Shahzad, Sara; Amin, Rohul Jul 31, 2020 5862
A Novel Network Anomaly Detection Method based on Data Balancing and Recursive Feature Addition. Liu, Xinqian; Ren, Jiadong; He, Haitao; Wang, Qian; Sun, Shengting Jul 1, 2020 9854
Creating and Implementing an Effective and Deterrent National Cyber Security Strategy. Senol, Mustafa; Karacuha, Ertugrul Jun 30, 2020 12773
Multilevel Security Network Communication Model Based on Multidimensional Control. Cao, Lifeng; Lu, Xin; Gao, Zhensheng; Han, Mengda; Du, Xuehui May 31, 2020 14504
Impacts of Spatial Zonation Schemes on Yield Potential Estimates at the Regional Scale. Xu, Hao; Huang, Fen; Zuo, Wenjun; Tian, Yongchao; Zhu, Yan; Cao, Weixing; Zhang, Xiaohu May 1, 2020 6538
Gov't call for urgent action on food security. Apr 13, 2020 482
Security, Islam, and Indonesia: An Anthropological Analysis of Indonesia's National Counterterrorism Agency. Nakissa, Aria Report Apr 1, 2020 14487
Comparative Analysis of Students' Perceived Agripreneurship Competencies and Likelihood to become Agripreneurs depending on Learning Approach: A Report from Uganda. Mukemboi, Stephen C.; Edwards, M. Craig; Robinson, J. Shane Report Apr 1, 2020 9774
Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism. Xiao, Shenyong; Yu, ZhiJun; Deng, YaShuang Mar 31, 2020 5772
The Potential for Improving Rice Yield and Nitrogen Use Efficiency in Smallholder Farmers: A Case Study of Jiangsu, China. Xie, Kailiu; Guo, Junjie; Ward, Katie; Luo, Gongwen; Shen, Qirong; Guo, Shiwei Mar 1, 2020 9083
ASSESSMENT OF ECONOMIC SECURITY OF ENTERPRISES: THEORETICAL AND METHODOLOGICAL ASPECTS. Shynkar, Svitlana; Gontar, Zoriana; Dubyna, Mariya; Nasypaiko, Daria; Fleychuk, Mariya Mar 1, 2020 4577
The Influence and Role of the United States of America in Ensuring the Military Security of Central and Eastern Europe. Sawa, Dawid Jan 1, 2020 4120
Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model. Chu, Ankang; Lai, Yingxu; Liu, Jing Dec 31, 2019 8006
Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System. Zhou, Jing-xian; Yan, Jian-hua Dec 1, 2019 7401
Quantification of Cultivar Change in Double Rice Regions under a Warming Climate during 1981-2009 in China. Qiu, Xiaolei; Tang, Liang; Zhu, Yan; Cao, Weixing; Liu, Leilei Dec 1, 2019 5873
The United Nations' Approach on Security Sector Reform. The Case of Libya. Kraft-Biris, Paul Dec 1, 2019 5213
A Novel Markov Model-Based Low-Power and Secure Multihop Routing Mechanism. Yang, Songxiang; Ma, Lin; Jia, Shuang; Qin, Danyang Oct 31, 2019 5878
NON-ALLIANCE POLICY AS A PRINCIPLE OF SHAPING THE NATIONAL SECURITY WITH A FOCUS ON THE CASE OF AZERBAIJAN. Ibrahim, Khayal Iskandarov; Mahammadali, Vugar Mammadzada; Saleh, Sadi Sadiyev Oct 1, 2019 3339
A Secure and Efficient ECC-Based Anonymous Authentication Protocol. Wang, Feifei; Xu, Guoai; Gu, Lize Sep 30, 2019 10660
IGP for re-evaluation of security measures before Chehlum of Imam Hussain (R.A). Sep 13, 2019 203
IGP for re-evaluation of security measures before Chehlum of Imam Hussain (R.A). Sep 13, 2019 241
Network Attack Detection Method Based on Their Time - Frequency Decomposition. Sklavounos, Dimitris; Chountasis, Spiros; Edoh, Aloysius Sep 1, 2019 2337
Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags. Khalid, Madiha; Mujahid, Umar; Muhammad, Najam-ul-Islam Aug 31, 2019 18651
Modeling and Analysis of Progressive Ice Shedding along a Transmission Line during Thermal De-Icing. Xie, Yunyun; Huang, Linyan; Wang, Da; Ding, Huaiping; Yin, Xiaochun Jul 31, 2019 8122
Inductive Method for Evaluating RFID Security Protocols. Liu, Defu; Yang, Guowu; Huang, Yong; Wu, Jinzhao Apr 30, 2019 6152
MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication. Lu, Tianbo; Meng, Ting; Li, Chao; Dong, Guozhen; Li, Huiyang; Zhang, Jiao; Zhang, Xiaoyan Apr 30, 2019 7151
COMPARATIVE ANALYSIS OF BORDER GUARDS' TRAINING IN UKRAINE AND INDIA. Bhinder, Nataliya Apr 1, 2019 6029
Sub-committee to recommend security model for judicial officers. Mar 7, 2019 265
Health and Food and Nutritional Security Policies: challenges in controlling childhood obesity. Henriques, Patricia; O'Dwyer, Gisele; Dias, Patricia Camacho; Barbosa, Roseane Moreira Sampaio; Burl Dec 1, 2018 6107
MARITIME STRATEGY DEVELOPMENT TO ENCOUNTER THE THREAT OF NATIONAL SEA SECURITY IN INDONESIA TERRITORY. Susilo, A.K.; Ciptomulyono, U.; Putra, I. Nengah; Ahmadi; Sutrisno Report Oct 1, 2018 6726
UN peacekeeping missions must be effective, well resourced: Maleeha. Sep 14, 2018 132
Feasibility analysis of distributed generation at peak hours: a case study/Analise de viabilidade da geracao distribuida em horario de ponta: estudo de caso/Analisis de viabilidad de la generacion distribuida en horario de punta: estudio de caso. Martins, Jonathan Ribeiro; Cruz, Suellen Freire Rigatto; Siquiera, Alan Patrick da Silva; Celeste, W Sep 1, 2018 6223
Gender Dimensions of Food Security, the Right to Food and Food Sovereignty in Nepal. Ghale, Yamuna; Pyakuryal, Kailash Nath; Devkota, Durga; Pant, Krishna Prasad; Timsina, Netra Prasad May 1, 2018 8272
Alak: Stresses The Importance Of A Comprehensive Analysis Of Food Security. Feb 6, 2018 277
Analysis of the Time Series Generated by a New High-Dimensional Discrete Chaotic System. Wang, Chuanfu; Fan, Chunlei; Feng, Kai; Huang, Xin; Ding, Qun Jan 1, 2018 5797
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing. Ko, Hoon; Mesicek, Libor; Choi, Jongsun; Hwang, Seogchan Jan 1, 2018 4639
An SDN-Based Approach to Ward Off LAN Attacks. Rietz, Rene; Cwalinski, Radoslaw; Konig, Hartmut; Brinner, Andreas Jan 1, 2018 8606
A New Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image. Joshi, Kamaldeep; Gill, Swati; Yadav, Rajkumar Jan 1, 2018 4680
Landscape Pattern and Ecological Security Assessment and Prediction Using Remote Sensing Approach. Liu, Pei; Jia, Shoujun; Han, Ruimei; Zhang, Hanwei Jan 1, 2018 9049
Russian Documents of Foreign and Security Policy after 2014: main changes and implications/Documentos de Politica Externa e de Seguranca da Russia apos 2014: principais mudancas e implicacoes. Piccolli, Larlecianne; Dall'Agnol, Augusto Cesar; Pereira, Tito L.B. Report Jan 1, 2018 5245
Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication. Safavi-Naini, Reihaneh; Poostindouz, Alireza; Lisy, Viliam Jan 1, 2018 10321
Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model. Wang, Ruyan; Meng, Xiaohan; Li, Yang; Wang, Jian Jan 1, 2018 6976
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures. Jaidi, Faouzi; Ayachi, Faten Labbene; Bouhoula, Adel Jan 1, 2018 11242
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services. Xiong, Jinbo; Ma, Rong; Chen, Lei; Tian, Youliang; Lin, Li; Jin, Biao Jan 1, 2018 8161
New Insights into Approaches to Evaluating Intention and Path for Network Multistep Attacks. Hu, Hao; Liu, Yuling; Yang, Yingjie; Zhang, Hongqi; Zhang, Yuchen Jan 1, 2018 9041
Future proofing organisations with zero-trust approach. Nov 29, 2017 722
Skybox introduces threat-centric vulnerability management for cloud, virtual network. Nov 7, 2017 546
Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy. Yu, Haiyang; Cai, Yongquan; Kong, Shanshan; Ning, Zhenhu; Xue, Fei; Zhong, Han Report Oct 1, 2017 9318
A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study. Kim, Hwankuk; Lee, Kyungho; Lim, Jongin Case study Sep 1, 2017 11242
An Overview of Corporate Cybercrime in India and US. Syngle, Tanya Report Apr 1, 2017 4269
An Analysis of Inadvertent Data Disclosure Incidents, 2005-2017. Coffey, John W. Report Apr 1, 2017 3645
PUBLIC SAFETY MANAGEMENT: ANALYSIS OF SECURITY PROMOTED BY THE IMPLEMENTATION OF A UIPP IN BELEM--PA./GESTAO DE SEGURANCA PUBLICA: ANALISE DA SEGURANCA PROMOVIDA PELA IMPLANTACAO DE UMA UIPP EM BELEM--PA. Batista, Katya Regina; Moreira, Marcia Athayde; de Moraes, Layse Correa; de Freitas Beckmam, Maria M Jan 1, 2017 5522
An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks. Ye, Zhengwang; Wen, Tao; Liu, Zhenyu; Song, Xiaoying; Fu, Chongguo Jan 1, 2017 11371
Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model. Ouyang, Chun-Juan; Leng, Ming; Xia, Jie-Wu; Liu, Huan Report Jan 1, 2017 6745
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings. Zhou, Caixue; Zhao, Zhiqiang; Zhou, Wan; Mei, Yuan Report Jan 1, 2017 15158
Golden security standards: 5 considerations to help your clients protect their jewelry. Oct 1, 2016 634
Research on barrier free design of the landscape environment of the city walking street based on computer multimedia: a security perspective. Wang, Yang; Zhang, Pingqing Oct 1, 2016 3828
How to use analytics to enhance security. Bradley, Stu Sep 1, 2016 1166
Analysis focusing on intrusion detection technology when an outside party breaks into computer database. Duan, Tao Mar 30, 2016 4970
Belgium steps up security measures after Paris attacks. Nov 14, 2015 205
A mathematical model: preventing active and passive attacks in mobile banking scenario. Singaravelan, N.; Bakyalakshmi, N. Report Aug 1, 2015 3263
Senate Sends Border Security Measure to House. Apr 20, 2015 792
Concepts of physical design and crime: a preliminary study into exploration of factors influencing building security cost. Anifowose, O. Maroof; Ilias, Said Report Apr 1, 2015 1813
Security measures for educational institution in Sindh discussed. Jan 6, 2015 183
Land ecological security assessment for Yancheng city based on catastrophe theory. Liang, Wang; Zhengfu, Bian; Hongquan, Chen Report Dec 1, 2014 5135
Integration of artillery and missiles systems in the air defense framework. Sandru, Vasile; Calefariu, Emilia Report Oct 1, 2014 2211
Traditional Security Measures Will Fail To Protect The Digital Workplace. Jun 9, 2014 756
The professional role of nutritionists in the context of sustainability. Naves, Camilla Ceylao Daher; Recine, Elisabetta Mar 1, 2014 4437
Key updating methods for combinatorial design based key management schemes. Xu, Chonghuan; Liu, Weinan Jan 1, 2014 6903
The political regime change and security: the political science theory and reform of security bodies. Zetocha, Karel Dec 15, 2013 8948
Food security status of rural farming households in Iwo, Ayedire and Ayedaade local government areas of Osun State, South-Western Nigeria. Adeniyi, O.R.; Ojo, O.A. Report Dec 1, 2013 4715
The National Security Council and foreign policy/Milli Guvenlik Kurulu ve dis politika. Gurpinar, Bulut Report Sep 22, 2013 11200
Is China becoming more aggressive? A neoclassical realist analysis. Sorensen, Camilla T.N. Report Sep 22, 2013 7745
Reciprocity in South Korean security policy vis-a-vis North Korea and the United States. Kim, Young-Geun Report Jun 22, 2013 8095
8 questions. May 1, 2013 849
Contributions and Romanian options to strengthen security for south eastern Europe in regional bilateral/trilateral arrangements in the Black Sea area. Grosaru, Florin-Eduard Author abstract Apr 1, 2013 3322
Supporting case-based learning in information security with web-based technology. He, Wu; Yuan, Xiaohong; Yang, Li Report Mar 22, 2013 7298
Current transatlantic perspectives on South-Eastern Europe. Grosaru, Florin-Eduard Oct 1, 2012 3091
Quorum-based key management scheme in wireless sensor networks. Wuu, Lih-Chyau; Hung, Chi-Hsiang; Chang, Chia-Ming Sep 1, 2012 7175
Bulgaria to Keep Tourism Security Measures after Burgas Bus Bombing. Aug 28, 2012 255
The securitization of catastrophic events: trauma, enactment, and preparedness exercises. Aradau, Claudia; Van Munster, Rens Report Aug 1, 2012 7810
Project will test the security of CCS stores. Brief article Apr 1, 2012 222
New approach to cybersecurity. Jan 1, 2012 520
Cybersecurity in the private sector: the nations businesses manage a significant share of online activity related to national security and must play a larger role in ensuring the overall integrity of the system. Etzioni, Amitai Sep 22, 2011 3234
Now who answers the phone in Europe? Cooperation within the CFSP after the enlargements and the Lisbon treaty. Babayan, Nelli Sep 22, 2010 6608
Strict security measures for Eid-e-Mild afoot. Feb 25, 2010 144
Strict security measures for Eid-e-Mild afoot. Feb 25, 2010 144
Critical infrastructure protection and role of infrastructure owners/operators. Necesal, Lubos; Lukas, Ludek Report Jan 1, 2010 1900
Homeland Defense: Greater Focus on Analysis of Alternatives and Threats Needed to Improve DOD's Strategic Nuclear Weapons Security. Oct 1, 2009 1140
Biosafety Laboratories: Perimeter Security Assessment of the Nation's Five BSL-4 Laboratories. Nov 1, 2008 599
U.S. Marine Corps security cooperation. Hesford, J.P.; Askins, Paul Company overview Sep 1, 2008 3154
Top Government Delegations Prepare for 7th IISS Asia Security Summit, The Shangri-La Dialogue. Conference news May 6, 2008 451
Top Government Delegations Prepare for 7th IISS Asia Security Summit, The Shangri-La Dialogue. Conference notes May 6, 2008 451
From insecurity to uncertainty: risk and the paradox of security politics. Kessler, Oliver; Daase, Christopher Essay Apr 1, 2008 8920
All along the watchtower: the Rock and Roll Hall of Fame and Museum in Cleveland protects its collection with sound security policy and innovative use of intelligent video. Longmore-Etheridge, Ann Apr 1, 2007 3195
Where is Iraq heading? Lessons from Basra. Report Apr 1, 2007 977
Northwest provides passengers with further information regarding new TSA security measures. Aug 11, 2006 267
AIR TRANSPORT : MEPS CALL ON MEMBER STATES TO PAY FOR SECURITY MEASURES. Jun 16, 2006 418
Security not Spartan at MSU. Anderson, Teresa Jun 1, 2006 3256
Explosives at forefront of airport security measures. Jean, Grace Apr 1, 2006 387
Airport security--a technology-led approach: Neil Fisher, Security Division Director of QinetiQ looks at the depth of technology-based protection available to airports. Fisher, Neil Dec 1, 2005 1849
Turning around the uninitiated, untrained or unmotivated. Russell, Margie Mar 9, 2005 463
The time for urgency is now[SM]. Mar 1, 2005 1118
Cooperation improves by LEAPS. Sep 1, 2004 986
Meeting management's expectations: whether a guard force is contract or proprietary is not as important as whether the program is focused on the company's needs. Herring, Paul Sep 1, 2004 1970
Home on the page @ www.securitymanagement.com. Jul 1, 2004 1098
Identity theft affecting more physicians and patients. McNamara, Damian May 1, 2004 658
Human security and East Asia: in the beginning. Evans, Paul M. May 1, 2004 8780
The path to peak performance: one company tells how it combined goals with performance-based management to improve security while minimizing costs. Sandford, Glenn W. Cover Story Mar 1, 2004 2376
No surprises in these boxes: while still concerned with theft and contraband, cargo companies must also keep people, and perhaps even weapons, out of cargo containers. Hoock, Gunther Mar 1, 2004 2136
Awaiting armageddon: is the paranoia justified? "No one can say that major incidents never again will occur in the U.S., but successful attacks are much more difficult than people realize.". Scherer, John L. Jan 1, 2004 1841
Forward Thinking for a changing world: Asis International 2003 49th Annual Seminars & Exhibits. (Seminar Preview and Advance Registration). Apr 1, 2003 2685
Survey assesses sports facility security. (News and Trends). Gips, Michael A. Feb 1, 2003 720
Disclosure of security breaches required in California. (Tech Talk). Piazza, Peter Feb 1, 2003 561
Federal information security still lacking. (Tech Talk). Piazza, Peter Feb 1, 2003 522

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters |