Works about SECURITY systems
Results: 5000
'SWORD LENGTHS AND SURVEILLANCE': TACKLING FISTICUFFS IN PARLIAMENT: Addressing security concerns in Parliaments.
- Published in:
- Parliamentarian, 2025, v. 106, n. 1, p. 26
- By:
- Publication type:
- Article
Security and Privacy in Physical–Digital Environments: Trends and Opportunities.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 83, doi. 10.3390/fi17020083
- By:
- Publication type:
- Article
Participant Selection for Efficient and Trusted Federated Learning in Blockchain-Assisted Hierarchical Federated Learning Architectures.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 75, doi. 10.3390/fi17020075
- By:
- Publication type:
- Article
Enhancing Design and Authentication Performance Model: A Multilevel Secure Database Management System.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 74, doi. 10.3390/fi17020074
- By:
- Publication type:
- Article
Real-Time Farm Surveillance Using IoT and YOLOv8 for Animal Intrusion Detection.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 70, doi. 10.3390/fi17020070
- By:
- Publication type:
- Article
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security.
- Published in:
- Computers, Materials & Continua, 2025, v. 82, n. 2, p. 2637, doi. 10.32604/cmc.2025.058717
- By:
- Publication type:
- Article
MelCochleaGram-DeepCNN: Sequentially Fused Spectrogram and the DeepCNN Classifiers-based Audio Spoof Detection System.
- Published in:
- IETE Journal of Research, 2025, v. 71, n. 1, p. 65, doi. 10.1080/03772063.2024.2412799
- By:
- Publication type:
- Article
Genèse d’un autoritarisme numérique : répression et résistance sur Internet en Russie.
- Published in:
- Slavica Occitania, 2025, n. 60, p. 327
- By:
- Publication type:
- Article
A Multiple-Method Study on Acceptance Factors of Economic Assessment Approaches for Information Security Investments.
- Published in:
- Pacific Asia Journal of the Association for Information Systems, 2024, v. 16, n. 4, p. 1, doi. 10.17705/1pais.16402
- By:
- Publication type:
- Article
BLOCKSAGE: Blockchain-Based Cloud Architecture for Sensitive Data Management in SMEs.
- Published in:
- Sustainability (2071-1050), 2025, v. 17, n. 4, p. 1352, doi. 10.3390/su17041352
- By:
- Publication type:
- Article
DELINCUENCIA Y JUSTICIA JUVENIL: UN ANÁLISIS CRIMINOLÓGICO DE LA ACTITUD PUNITIVISTA.
- Published in:
- Revista Electrónica de Estudios Penales y de la Seguridad, 2024, v. 15, p. 1
- By:
- Publication type:
- Article
Optimizing Malware Detection and Classification in Real-Time Using Hybrid Deep Learning Approaches.
- Published in:
- International Journal of Safety & Security Engineering, 2025, v. 15, n. 1, p. 141, doi. 10.18280/ijsse.150115
- By:
- Publication type:
- Article
Artificial Intelligence and Algorithmic Approaches of Health Security Systems: A Review.
- Published in:
- Algorithms, 2025, v. 18, n. 2, p. 59, doi. 10.3390/a18020059
- By:
- Publication type:
- Article
Security Performance Analysis of Downlink Double Intelligent Reflecting Surface Non-Orthogonal Multiple Access Network for Edge Users.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 4, p. 1274, doi. 10.3390/s25041274
- By:
- Publication type:
- Article
Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications †.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 4, p. 1194, doi. 10.3390/s25041194
- By:
- Publication type:
- Article
Implementing an interprofessional education programme in Lebanon: overcoming challenges.
- Published in:
- Eastern Mediterranean Health Journal, 2018, v. 24, n. 9, p. 914, doi. 10.26719/2018.24.9.914
- By:
- Publication type:
- Article
A long-term baby mix-up case in the Eastern Mediterranean region.
- Published in:
- 2011
- By:
- Publication type:
- Case Study
A study on preference and practices of women regarding place of delivery.
- Published in:
- Eastern Mediterranean Health Journal, 2010, v. 16, n. 8, p. 874, doi. 10.26719/2010.16.8.874
- By:
- Publication type:
- Article
Short-term event recording as a measure to rule out false alarms and to shorten the duration of home monitoring in infants.
- Published in:
- Wiener Klinische Wochenschrift, 2003, v. 115, n. 1/2, p. 53, doi. 10.1007/BF03040273
- By:
- Publication type:
- Article
CONTROL ORDERS POST 9-11 AND HUMAN RIGHTS IN THE UNITED KINGDOM, AUSTRALIA AND CANADA: A KAFKAESQUE DILEMMA?
- Published in:
- Deakin Law Review, 2010, v. 15, n. 2, p. 131, doi. 10.21153/dlr2010vol15no2art122
- Publication type:
- Article
'The world will be watching and so will NSA!': A History of Technology and Security at the Olympic Games.
- Published in:
- International Journal of the History of Sport, 2021, v. 38, n. 2/3, p. 264, doi. 10.1080/09523367.2021.1909574
- By:
- Publication type:
- Article
Terrorism and Security at the Olympics: Empirical Trends and Evolving Research Agendas.
- Published in:
- International Journal of the History of Sport, 2016, v. 33, n. 4, p. 451, doi. 10.1080/09523367.2015.1136290
- By:
- Publication type:
- Article
Introduction: Olympic Perspectives.
- Published in:
- International Journal of the History of Sport, 2016, v. 33, n. 4, p. 367, doi. 10.1080/09523367.2015.1136125
- By:
- Publication type:
- Article
Gestion des risques, lutte contre le terrorisme.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2006, v. 48, n. 3, p. 359, doi. 10.3138/cjccj.48.3.359
- By:
- Publication type:
- Article
Ten Uncertainties of Risk-Management Approaches to Security.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2006, v. 48, n. 3, p. 345, doi. 10.3138/cjccj.48.3.345
- By:
- Publication type:
- Article
Open-Street Camera Surveillance and Governance in Canada.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2005, v. 47, n. 4, p. 655, doi. 10.3138/cjccj.47.4.655
- By:
- Publication type:
- Article
Automation and security: Home and office.
- Published in:
- Technology Teacher, 1995, v. 55, n. 4, p. 38
- By:
- Publication type:
- Article
Analyzing Mitigation of Container Security Risks Using Six Sigma DMAIC Approach in Supply Chain Design.
- Published in:
- Transportation Journal (American Society of Transportation & Logistics Inc), 2008, v. 47, n. 2, p. 54, doi. 10.5325/transportationj.47.2.0054
- By:
- Publication type:
- Article
Resolving to Make the Workplace Safer and Secure.
- Published in:
- Tax Executive, 2001, v. 53, n. 6, p. 418
- By:
- Publication type:
- Article
China's Internal Security Dilemma and the "Great Western Development": The Dynamics of Integration, Ethnic Nationalism and Terrorism in Xinjiang.
- Published in:
- Asian Studies Review, 2007, v. 31, n. 3, p. 323, doi. 10.1080/10357820701621350
- By:
- Publication type:
- Article
The Interlocking Roles of Campus Security and Redevelopment in University-Driven Neighborhood Change: A Case Study of the University of Pennsylvania.
- Published in:
- Journal of Higher Education Outreach & Engagement, 2024, v. 28, n. 2, p. 137
- By:
- Publication type:
- Article
Subjective Job Insecurity and the Rise of the Precariat: Evidence from the United Kingdom, Germany, and the United States.
- Published in:
- Review of Economics & Statistics, 2024, v. 106, n. 3, p. 748, doi. 10.1162/rest_a_01196
- By:
- Publication type:
- Article
The Race Between Deterrence and Displacement: Theory and Evidence from Bank Robberies.
- Published in:
- Review of Economics & Statistics, 2021, v. 103, n. 3, p. 547, doi. 10.1162/rest_a_00900
- By:
- Publication type:
- Article
DOES REPORTING DETER BURGLARS? -- AN EMPIRICAL ANALYSIS OF RISK AND RETURN IN CRIME.
- Published in:
- Review of Economics & Statistics, 1980, v. 62, n. 3, p. 424, doi. 10.2307/1927110
- By:
- Publication type:
- Article
Smart Textiles for Home Safety.
- Published in:
- AATCC Review, 2018, p. 28, doi. 10.14504/ar.18.6.2
- By:
- Publication type:
- Article
KNOWLEDGE MAPPING FOR SAFE FESTIVALS AND EVENTS: AN ONTOLOGICAL APPROACH.
- Published in:
- Event Management, 2007, v. 11, n. 1/2, p. 71, doi. 10.3727/152599508783943264
- By:
- Publication type:
- Article
Performance enhancement for audio-visual speaker identification using dynamic facial muscle model.
- Published in:
- 2006
- By:
- Publication type:
- journal article
The Complete Abolition of Nuclear Weapons.
- Published in:
- Peace Review, 2016, v. 28, n. 3, p. 302, doi. 10.1080/10402659.2016.1201943
- By:
- Publication type:
- Article
Surveillance, Information Technology, and Reconfiguring Borders.
- Published in:
- Peace Review, 2009, v. 21, n. 3, p. 385, doi. 10.1080/10402650903099476
- By:
- Publication type:
- Article
The Human Security Commission's strategy.
- Published in:
- Peace Review, 2004, v. 16, n. 1, p. 25, doi. 10.1080/1040265042000210111
- By:
- Publication type:
- Article
SALUD Y ALIMENTACIÓN.
- Published in:
- Actualidad Jurídica (1578-956X), 2014, n. 36, p. 244
- Publication type:
- Article
DECISION MAKING FOR NETWORK HEALTH ASSESSMENT IN AN INTELLIGENT INTRUSION DETECTION SYSTEM ARCHITECTURE.
- Published in:
- International Journal of Information Technology & Decision Making, 2004, v. 3, n. 2, p. 281, doi. 10.1142/S0219622004001057
- By:
- Publication type:
- Article
IT Enabling: Essence of Virtual Organizations.
- Published in:
- International Journal of Information Technology & Decision Making, 2002, v. 1, n. 3, p. 367, doi. 10.1142/S0219622002000233
- By:
- Publication type:
- Article
MARITIME SECURITY AND INNOVATION.
- Published in:
- Innovation, 2006, v. 6, n. 1, p. 25
- By:
- Publication type:
- Article
Guardian Anjels for the Home.
- Published in:
- Innovation, 2006, v. 6, n. 1, p. 7
- Publication type:
- Article
Automated anonymity verification of the ThreeBallot and VAV voting systems.
- Published in:
- Software & Systems Modeling, 2016, v. 15, n. 4, p. 1049, doi. 10.1007/s10270-014-0445-x
- By:
- Publication type:
- Article
Modeling and enforcing secure object flows in process-driven SOAs: an integrated model-driven approach.
- Published in:
- Software & Systems Modeling, 2014, v. 13, n. 2, p. 513, doi. 10.1007/s10270-012-0263-y
- By:
- Publication type:
- Article
A transformation contract to generate aspects from access control policies.
- Published in:
- Software & Systems Modeling, 2011, v. 10, n. 3, p. 395, doi. 10.1007/s10270-010-0156-x
- By:
- Publication type:
- Article
The Power of Dental Team Collaboration: Communication in a Digital World.
- Published in:
- Compendium of Continuing Education in Dentistry (15488578), 2015, p. 22
- By:
- Publication type:
- Article
When terrorism is evidence of state success: securing the state against territorial groups.
- Published in:
- Oxford Economic Papers, 2015, v. 67, n. 1, p. 116, doi. 10.1093/oep/gpu041
- By:
- Publication type:
- Article