Works matching DE "SECURITY systems industry"
Results: 164
POISED FOR POWER.
- Published in:
- Power Engineer, 2005, v. 19, n. 1, p. 38, doi. 10.1049/pe:20050108
- By:
- Publication type:
- Article
Keeping the lights on.
- Published in:
- Power Engineer, 2004, v. 18, n. 2, p. 18, doi. 10.1049/pe:20040207
- By:
- Publication type:
- Article
Security Strategy for Mobile Police Information System Using SMS.
- Published in:
- Wireless Personal Communications, 2009, v. 51, n. 2, p. 349, doi. 10.1007/s11277-008-9647-2
- By:
- Publication type:
- Article
An Authentication Scheme for Ad-hoc Networks using Threshold Secret Sharing.
- Published in:
- Wireless Personal Communications, 2007, v. 43, n. 4, p. 1767, doi. 10.1007/s11277-007-9345-5
- By:
- Publication type:
- Article
Quality, Safety, and Security Systems in the Greek Port Industry: Over Twenty Years of Research, Empirical Evidence, and Future Perspectives.
- Published in:
- Logistics (2305-6290), 2024, v. 8, n. 4, p. 98, doi. 10.3390/logistics8040098
- By:
- Publication type:
- Article
Information System Design and Implementation Based on Security Desktop Virtualization Technology.
- Published in:
- Telecommunication Engineering, 2014, v. 54, n. 5, p. 637, doi. 10.3969/j.issn.1001-893x.2014.05.021
- By:
- Publication type:
- Article
Enhancing and securing cyber‐physical systems and Industry 4.0 through digital twins: A critical review.
- Published in:
- Journal of Software: Evolution & Process, 2023, v. 35, n. 7, p. 1, doi. 10.1002/smr.2494
- By:
- Publication type:
- Article
Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods.
- Published in:
- Decision Sciences, 2001, v. 32, n. 4, p. 635, doi. 10.1111/j.1540-5915.2001.tb00975.x
- By:
- Publication type:
- Article
SPREAD: Improving network security by multipath routing in mobile ad hoc networks.
- Published in:
- Wireless Networks (10220038), 2009, v. 15, n. 3, p. 279, doi. 10.1007/s11276-007-0039-4
- By:
- Publication type:
- Article
SCADA SECURITY IN THE CONTEXT OF CORPORATE NETWORK INTEGRATION.
- Published in:
- Annals (Constanţa Maritime University), 2011, v. 12, n. 15, p. 159
- By:
- Publication type:
- Article
Uzajamno perpetuiranje straha od nasilja i industrije obezbeđenja: Primer filmskih narativa i elektronskih bezbednosnih sistema za domaćinstvo.
- Published in:
- Issues in Ethnology Anthropology, 2014, v. 9, n. 1, p. 105
- By:
- Publication type:
- Article
NEW SOUTH WALES.
- Published in:
- Alternative Law Journal, 2012, v. 37, n. 4, p. 286
- By:
- Publication type:
- Article
MAIN INFLUENCE AFFECTING PROFESSIONAL DEFENCE SOLUTION AND RESULT.
- Published in:
- Annals of DAAAM & Proceedings, 2011, p. 1541
- By:
- Publication type:
- Article
WiFi and WiMAX Secure Deployments.
- Published in:
- Journal of Computer Systems, Networks, & Communications, 2010, p. 1, doi. 10.1155/2010/423281
- By:
- Publication type:
- Article
Offshoring and outsourcing the 'unauthorised': The annual reports of an anxious state.
- Published in:
- Policy & Society, 2011, v. 30, n. 3, p. 221, doi. 10.1016/j.polsoc.2011.07.006
- By:
- Publication type:
- Article
Pride and paranoia: race and the emergence of home security in Cold War America.
- Published in:
- Continuum: Journal of Media & Cultural Studies, 2014, v. 28, n. 6, p. 808, doi. 10.1080/10304312.2014.966406
- By:
- Publication type:
- Article
China's totalitarian supervision system to 90 online.
- Published in:
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2009, v. 44, n. 1, p. 32
- Publication type:
- Article
The State of Private Security Companies in Trinidad and Tobago: Towards the Development of a Governance System.
- Published in:
- African Journal of Criminology & Justice Studies, 2012, v. 6, n. 1/2, p. 45
- By:
- Publication type:
- Article
Losing control? The privatisation of anti-piracy services in Southeast Asia.
- Published in:
- Australian Journal of International Affairs, 2009, v. 63, n. 3, p. 390, doi. 10.1080/10357710903104851
- By:
- Publication type:
- Article
An Interview with Alain M. Sadeghi President, Founder and Senior Security Engineer eTechSecurityPro.
- Published in:
- 2006
- By:
- Publication type:
- Interview
Alarm Case Signals Increased Risk of Post-Closing Merger Review.
- Published in:
- European Competition & Regulatory Law Review, 2018, v. 2, n. 4, p. 296, doi. 10.21552/core/2018/4/10
- By:
- Publication type:
- Article
European Nations Make Security a High Priority.
- Published in:
- Internal Auditor, 2007, v. 64, n. 5, p. 15
- By:
- Publication type:
- Article
Hacking: A Threat to Industrial Work Forces.
- Published in:
- CURIE Journal, 2010, v. 3, n. 1, p. 41
- By:
- Publication type:
- Article
This month's categories: Awards preview: Security and Networking.
- Published in:
- ComputerWorld Hong Kong, 2010, v. 27, n. 3, p. 40
- Publication type:
- Article
Symantec CEO encouraged by MS moves on Vista.
- Published in:
- ComputerWorld Hong Kong, 2007, v. 24, n. 11, p. 47
- Publication type:
- Article
Federal Taxation.
- Published in:
- Mercer Law Review, 2013, v. 64, n. 4, p. 953
- By:
- Publication type:
- Article
Security, Commodity, Fetishism.
- Published in:
- Critique: Journal of Socialist Theory, 2007, v. 35, n. 3, p. 339, doi. 10.1080/03017600701676738
- By:
- Publication type:
- Article
Local dynamics of security in Africa: The Central African Republic and private security.
- Published in:
- African Security Review, 2008, v. 17, n. 2, p. 15, doi. 10.1080/10246029.2008.9627468
- By:
- Publication type:
- Article
Private military/security companies, human security, and state building in Africa.
- Published in:
- African Security Review, 2006, p. 98
- By:
- Publication type:
- Article
Editorial.
- Published in:
- European Journal on Criminal Policy & Research, 1999, v. 7, n. 2, p. 139, doi. 10.1023/A:1008790926082
- By:
- Publication type:
- Article
The Private Security Industry in International Perspective.
- Published in:
- European Journal on Criminal Policy & Research, 1999, v. 7, n. 2, p. 143, doi. 10.1023/A:1008701310152
- By:
- Publication type:
- Article
数字技术赋能纺织产业绿色创新与发展的探讨.
- Published in:
- Cotton Textile Technology, 2023, v. 51, n. 622, p. 33
- By:
- Publication type:
- Article
Enhanced Tone Mapping Using Regional Fused GAN Training with a Gamma-Shift Dataset.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 16, p. 7754, doi. 10.3390/app11167754
- By:
- Publication type:
- Article
GUNS, GUARDS AND GATES.
- Published in:
- Overland, 2007, n. 188, p. 14
- By:
- Publication type:
- Article
A shared secret-based algorithm for securing the OLSR routing protocol.
- Published in:
- Telecommunication Systems, 2006, v. 31, n. 2/3, p. 213, doi. 10.1007/s11235-006-6521-y
- By:
- Publication type:
- Article
Detecting a Security Disturbance in Multi Commodity Stochastic Networks.
- Published in:
- Telecommunication Systems, 2006, v. 31, n. 1, p. 11, doi. 10.1007/s11235-006-5520-3
- By:
- Publication type:
- Article
Not Just Joining the Dots But Crossing the Borders and Bridging the Voids: Constructing Security Networks after 11 September 2001.
- Published in:
- Policing & Society, 2006, v. 16, n. 1, p. 27, doi. 10.1080/10439460500399395
- By:
- Publication type:
- Article
Security Intelligence Networks and the Transformation of Contract Private Security.
- Published in:
- Policing & Society, 2006, v. 16, n. 1, p. 50, doi. 10.1080/10439460500399445
- By:
- Publication type:
- Article
Formal Methods and Validation Techniques for Ensuring Automotive Systems Security.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 12, p. 666, doi. 10.3390/info14120666
- By:
- Publication type:
- Article
Complementary Cooperation of CCTV and UAV Systems for Tourism Security and Sustainability.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 19, p. 10693, doi. 10.3390/su131910693
- By:
- Publication type:
- Article
SECURITY REQUIREMENT REPRESENTATION METHOD FOR CONFIDENCE OF SYSTEMS AND NETWORKS.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2010, v. 20, n. 1, p. 49, doi. 10.1142/S021819401000461X
- By:
- Publication type:
- Article
Security-Aware Optimized Link Routing Protocol for Mobile Ad-Hoc Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2009, v. 3, n. 1, p. 52, doi. 10.3837/tiis.2009.01.003
- By:
- Publication type:
- Article
Bridging Accountability Gaps--The Proliferation of Private Military and Security Companies and Ensuring Accountability for Human Rights Violations.
- Published in:
- Pacific McGeorge Global Business & Development Law Journal, 2010, v. 22, n. 2, p. 323
- By:
- Publication type:
- Article
General Misconceptions about Information Security Lead to an Insecure World.
- Published in:
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 4, p. 164, doi. 10.1080/19393550802369792
- By:
- Publication type:
- Article
A Factor Point Weighing Approach for Measuring Role Performances in Physical Security Protection Duties.
- Published in:
- Journal of Applied Security Research, 2015, v. 10, n. 2, p. 249, doi. 10.1080/19361610.2015.1004510
- By:
- Publication type:
- Article
PERISCOPE.
- Published in:
- Homeland Defense Journal, 2007, v. 5, n. 10, p. 45
- Publication type:
- Article
CBRNE -- The Challenges and Solutions.
- Published in:
- Homeland Defense Journal, 2007, v. 5, n. 8, p. 8
- By:
- Publication type:
- Article
Los Alamos National Laboratory Appoints Deputy Director and Principal Associate Director.
- Published in:
- Homeland Defense Journal, 2007, v. 5, n. 8, p. 6
- Publication type:
- Article
Major Growth Forecast in Video Surveillance Market.
- Published in:
- Homeland Defense Journal, 2007, v. 5, n. 7, p. 15
- Publication type:
- Article
Data Centers.
- Published in:
- Homeland Defense Journal, 2007, v. 5, n. 6, p. 56
- By:
- Publication type:
- Article