Works about SECURITY management
Results: 4722
Threat Modeling and Risk Assessment of Nuclear Facility from the Motivation Perspective.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2025, v. 50, n. 5, p. 3263, doi. 10.1007/s13369-024-09304-y
- By:
- Publication type:
- Article
Integrating Process Safety and Process Security Risk Management: Practitioner Insights for a Resilience-Oriented Framework.
- Published in:
- Processes, 2025, v. 13, n. 2, p. 392, doi. 10.3390/pr13020392
- By:
- Publication type:
- Article
Strengthening the Adoption of Copernicus Services in Latin America: Capacity Building Experiences in Ecuador and Bolivia.
- Published in:
- Sustainability (2071-1050), 2025, v. 17, n. 4, p. 1594, doi. 10.3390/su17041594
- By:
- Publication type:
- Article
Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent.
- Published in:
- Journal of Artificial Intelligence Research, 2011, v. 42, p. 887
- By:
- Publication type:
- Article
SYMMETRIC INTERESTS AND ATTENTION PATTERNS IN ASYMMETRY: Examining China–Kazakhstan Relations from a Non-external Security Perspective.
- Published in:
- World Affairs, 2023, v. 186, n. 2, p. 353, doi. 10.1177/00438200231167831
- By:
- Publication type:
- Article
Toward A Smarter Power.
- Published in:
- World Affairs, 2011, v. 174, n. 3, p. 92
- By:
- Publication type:
- Article
The European Union as a Security Actor.
- Published in:
- World Affairs, 2005, v. 168, n. 2, p. 51
- By:
- Publication type:
- Article
NATIONAL SECURITY AND HUMAN RIGHTS.
- Published in:
- Deakin Law Review, 2004, v. 9, n. 2, p. 295, doi. 10.21153/dlr2004vol9no2art244
- By:
- Publication type:
- Article
The fast-changing Arctic: rethinking security for a warmer world.
- Published in:
- 2014
- By:
- Publication type:
- Book Review
Security Officers’ Perspectives on Training1.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2009, v. 51, n. 3, p. 381, doi. 10.3138/cjccj.51.3.381
- By:
- Publication type:
- Article
Private Security's Purchase: Imaginings of a Security Patrol in a Canadian Residential Neighbourhood.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2007, v. 49, n. 5, p. 587, doi. 10.3138/cjccj.49.5.587
- By:
- Publication type:
- Article
Risks, Ethics, and Airport Security.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2006, v. 48, n. 3, p. 413, doi. 10.1353/ccj.2006.0033
- By:
- Publication type:
- Article
Reflections on Risk Analysis, Screening, and Contested Rationalities.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2006, v. 48, n. 3, p. 453, doi. 10.3138/cjccj.48.3.453
- By:
- Publication type:
- Article
Sécurité nationale et sécurité globale: I'adaptation des services de renseignements français.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2006, v. 48, n. 3, p. 435, doi. 10.1353/ccj.2006.0032
- By:
- Publication type:
- Article
Ten Uncertainties of Risk-Management Approaches to Security.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2006, v. 48, n. 3, p. 345, doi. 10.3138/cjccj.48.3.345
- By:
- Publication type:
- Article
Securing Global Transportation Networks: A Total Security, Management Approach.
- Published in:
- 2007
- By:
- Publication type:
- Book Review
A Quality Management Framework for Liner Shipping Companies to Implement the 24-Hour Advance Vessel Manifest Rule.
- Published in:
- Transportation Journal (American Society of Transportation & Logistics Inc), 2007, v. 46, n. 1, p. 5, doi. 10.5325/transportationj.46.1.0005
- By:
- Publication type:
- Article
Security and the Global Supply Chain.
- Published in:
- Transportation Journal (American Society of Transportation & Logistics Inc), 2006, v. 45, n. 4, p. 28, doi. 10.5325/transportationj.45.4.0028
- By:
- Publication type:
- Article
Enclosures, Enclaves, and Entrapment.
- Published in:
- Sociological Inquiry, 2010, v. 80, n. 2, p. 241, doi. 10.1111/j.1475-682X.2010.00329.x
- By:
- Publication type:
- Article
THE CLINIC LAB OFFICE.
- Published in:
- Wisconsin Law Review, 2013, v. 2013, n. 1, p. 145
- By:
- Publication type:
- Article
The Political Logic of Weiwen in Contemporary China.
- Published in:
- Issues & Studies, 2012, v. 48, n. 3, p. 1
- By:
- Publication type:
- Article
Ethics, security, and the war machine: the true cost of the military.
- Published in:
- Journal of Peace Education, 2021, v. 18, n. 3, p. 384, doi. 10.1080/17400201.2020.1850677
- By:
- Publication type:
- Article
Workplace Password Malpractice Report Finds Password Security Problems.
- Published in:
- Concrete International, 2021, v. 43, n. 7, p. 12
- Publication type:
- Article
INSTITUTE'S NEW NAME REFLECTS LARSON'S LEGACY.
- Published in:
- Concrete International, 2008, v. 30, n. 9, p. 13
- Publication type:
- Article
Voices of Connecticut Veterans: John Pease and "Bloody Tarawa," November 20-23, 1943.
- Published in:
- Connecticut History, 2007, v. 46, n. 2, p. 244, doi. 10.2307/44369780
- By:
- Publication type:
- Article
Anti-Counterfeit Textile Substrates Using Covert Taggants.
- Published in:
- AATCC Review, 2009, v. 9, n. 4, p. 31
- By:
- Publication type:
- Article
Security excellence from a total quality management approach.
- Published in:
- Total Quality Management & Business Excellence, 2011, v. 22, n. 3, p. 345, doi. 10.1080/14783363.2010.545556
- By:
- Publication type:
- Article
The Pertinence of International Relations.
- Published in:
- Political Studies, 1990, v. 38, n. 3, p. 502, doi. 10.1111/j.1467-9248.1990.tb01084.x
- By:
- Publication type:
- Article
The Breakdown of Public Security: The Case of Ireland 1916-1921 and Palestine 1936-1939 (Book).
- Published in:
- 1979
- By:
- Publication type:
- Book Review
Final say: Fight against fakes.
- Published in:
- 2006
- By:
- Publication type:
- Editorial
European Perception of Climate Change as a Security Issue.
- Published in:
- Peace Review, 2022, v. 34, n. 1, p. 73, doi. 10.1080/10402659.2022.2023431
- By:
- Publication type:
- Article
Climate Change in the Pacific: Land, Identity, and Security.
- Published in:
- Peace Review, 2022, v. 34, n. 1, p. 22, doi. 10.1080/10402659.2022.2023426
- By:
- Publication type:
- Article
Climate Change, Conflict and Peace in the Pacific: Challenges and a Pacific Way Forward.
- Published in:
- Peace Review, 2022, v. 34, n. 1, p. 1, doi. 10.1080/10402659.2022.2023424
- By:
- Publication type:
- Article
Brokering 'Women, Peace, and Security' in Mindanao, Philippines.
- Published in:
- Peace Review, 2021, v. 33, n. 3, p. 361, doi. 10.1080/10402659.2021.1953799
- By:
- Publication type:
- Article
The Insecurity of "Security".
- Published in:
- Peace Review, 2020, v. 32, n. 4, p. 521, doi. 10.1080/10402659.2020.1921415
- By:
- Publication type:
- Article
The Perils of Prosperity Approach in Papua.
- Published in:
- 2016
- By:
- Publication type:
- Essay
Human Rights or Just War?
- Published in:
- Peace Review, 2012, v. 24, n. 2, p. 163, doi. 10.1080/10402659.2012.677327
- By:
- Publication type:
- Article
The Human Security Commission's strategy.
- Published in:
- Peace Review, 2004, v. 16, n. 1, p. 25, doi. 10.1080/1040265042000210111
- By:
- Publication type:
- Article
MARITIME SECURITY AND INNOVATION.
- Published in:
- Innovation, 2006, v. 6, n. 1, p. 25
- By:
- Publication type:
- Article
Guardian Anjels for the Home.
- Published in:
- Innovation, 2006, v. 6, n. 1, p. 7
- Publication type:
- Article
Checking security compliance between models and code.
- Published in:
- Software & Systems Modeling, 2023, v. 22, n. 1, p. 273, doi. 10.1007/s10270-022-00991-5
- By:
- Publication type:
- Article
A descriptive study of assumptions in STRIDE security threat modeling.
- Published in:
- Software & Systems Modeling, 2022, v. 21, n. 6, p. 2311, doi. 10.1007/s10270-021-00941-7
- By:
- Publication type:
- Article
An ontological metamodel for cyber-physical system safety, security, and resilience coengineering.
- Published in:
- Software & Systems Modeling, 2022, v. 21, n. 1, p. 113, doi. 10.1007/s10270-021-00892-z
- By:
- Publication type:
- Article
Modeling and enforcing secure object flows in process-driven SOAs: an integrated model-driven approach.
- Published in:
- Software & Systems Modeling, 2014, v. 13, n. 2, p. 513, doi. 10.1007/s10270-012-0263-y
- By:
- Publication type:
- Article
The current state and future of mobile security in the light of the recent mobile security threat reports.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 13, p. 20269, doi. 10.1007/s11042-023-14400-6
- By:
- Publication type:
- Article
A novel dual-layer security scheme based on 3-cell cellular neural network encryption and data hiding scheme for color images.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 4, p. 6127, doi. 10.1007/s11042-022-13621-5
- By:
- Publication type:
- Article
Multimedia security based on quantum cryptography and blockchain.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 25, p. 36585, doi. 10.1007/s11042-022-13886-w
- Publication type:
- Article
Multimedia Technology for Security and Surveillance in Degraded Vision.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 24, p. 35245, doi. 10.1007/s11042-022-13885-x
- Publication type:
- Article
Efficient watermarking technique for protection and authentication of document images.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 16, p. 22985, doi. 10.1007/s11042-022-12174-x
- By:
- Publication type:
- Article
Correction to: A dual layer security scheme for medical images using Hessenberg and singular value decompositions.
- Published in:
- 2022
- By:
- Publication type:
- Correction Notice