Works matching DE "SECURITY systems industry"
Results: 160
WHY IT EXECUTIVES SHOULD HELP EMPLOYEES SECURE THEIR HOME COMPUTERS.
- Published in:
- 2008
- By:
- Publication type:
- Advertisement
Systemigram Modeling of the Small Vessel Security Strategy for Developing Enterprise Resilience.
- Published in:
- Marine Technology Society Journal, 2011, v. 45, n. 3, p. 88, doi. 10.4031/MTSJ.45.3.5
- By:
- Publication type:
- Article
Alarm Case Signals Increased Risk of Post-Closing Merger Review.
- Published in:
- European Competition & Regulatory Law Review, 2018, v. 2, n. 4, p. 296, doi. 10.21552/core/2018/4/10
- By:
- Publication type:
- Article
Secure Vehicle-to-roadside Communication Protocol Using Certificate-based Cryptosystem.
- Published in:
- IETE Technical Review, 2010, v. 27, n. 3, p. 214, doi. 10.4103/0256-4602.62783
- By:
- Publication type:
- Article
GUNS, GUARDS AND GATES.
- Published in:
- Overland, 2007, n. 188, p. 14
- By:
- Publication type:
- Article
A shared secret-based algorithm for securing the OLSR routing protocol.
- Published in:
- Telecommunication Systems, 2006, v. 31, n. 2/3, p. 213, doi. 10.1007/s11235-006-6521-y
- By:
- Publication type:
- Article
Detecting a Security Disturbance in Multi Commodity Stochastic Networks.
- Published in:
- Telecommunication Systems, 2006, v. 31, n. 1, p. 11, doi. 10.1007/s11235-006-5520-3
- By:
- Publication type:
- Article
PERSPECTIVE OF DEVELOPMENT OF SERVICES IN PRIVATE SECURITY AND NECESSITY OF CLASSIFICATION OF NEW TYPES OF POSITIONS IN THIS SPHERE IN SLOVAK REPUBLIC.
- Published in:
- Human Resources Management & Ergonomics, 2013, v. 7, n. 1, p. 128
- By:
- Publication type:
- Article
Uzajamno perpetuiranje straha od nasilja i industrije obezbeđenja: Primer filmskih narativa i elektronskih bezbednosnih sistema za domaćinstvo.
- Published in:
- Issues in Ethnology Anthropology, 2014, v. 9, n. 1, p. 105
- By:
- Publication type:
- Article
Combination of CPSO, PSO, CSA and GA for Allocation and Voltage Stability Optimization in Distributed Generation Units.
- Published in:
- International Review on Modelling & Simulations, 2011, v. 4, n. 3, p. 1266
- By:
- Publication type:
- Article
Human Security News.
- Published in:
- Journal of Human Security (RMIT Training Pty Ltd trading as RMIT Publishing), 2009, v. 5, n. 1, p. 64, doi. 10.3316/jhs0501064
- By:
- Publication type:
- Article
A PARADIGM OF NETWORK SECURITY DESIGN: A MODEL FOR TEACHING NETWORK SECURITY.
- Published in:
- Journal of Computer Information Systems, 2007, v. 48, n. 2, p. 53
- By:
- Publication type:
- Article
Fault-Tolerance and Reliability Analysis for Wireless Sensor Networks.
- Published in:
- International Journal of Performability Engineering, 2009, v. 5, n. 5, p. 419
- By:
- Publication type:
- Article
Securing the Hardware.
- Published in:
- Strategic Finance, 2004, v. 85, n. 8, p. 55
- By:
- Publication type:
- Article
Bank Transfers and Bonsai Kittens.
- Published in:
- Strategic Finance, 2003, v. 85, n. 4, p. 72
- Publication type:
- Article
Acceptable Security Controls a Rarity, Says Survey.
- Published in:
- International Journal of Micrographics & Optical Technology, 2009, v. 27, n. 1/2, p. 8
- Publication type:
- Article
Regulatory, Compliance & Standards.
- Published in:
- International Journal of Micrographics & Optical Technology, 2008, v. 26, n. 5, p. 5
- Publication type:
- Article
$389 M Mobile Application Security Market Set to Explode as Threats Increase.
- Published in:
- Microwave Journal, 2012, v. 55, n. 11, p. 56
- By:
- Publication type:
- Article
Indra and Cisco Work on Defence and Security Innovation.
- Published in:
- Microwave Journal, 2009, v. 52, n. 7, p. 52
- Publication type:
- Article
COMMERCIAL MARKET.
- Published in:
- Microwave Journal, 2004, v. 47, n. 11, p. 59
- Publication type:
- Article
Private security companies.
- Published in:
- New Political Economy, 2005, v. 10, n. 1, p. 121, doi. 10.1080/13563460500031297
- By:
- Publication type:
- Article
Improvements in performance and security for complex networks.
- Published in:
- International Journal of Computer Mathematics, 2009, v. 86, n. 2, p. 209, doi. 10.1080/00207160701864467
- By:
- Publication type:
- Article
Stochastic game net and applications in security analysis for enterprise network.
- Published in:
- International Journal of Information Security, 2012, v. 11, n. 1, p. 41, doi. 10.1007/s10207-011-0148-z
- By:
- Publication type:
- Article
Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions.
- Published in:
- International Journal of Information Security, 2009, v. 8, n. 1, p. 49, doi. 10.1007/s10207-008-0063-0
- By:
- Publication type:
- Article
Complete analysis of configuration rules to guarantee reliable network security policies.
- Published in:
- International Journal of Information Security, 2008, v. 7, n. 2, p. 103, doi. 10.1007/s10207-007-0045-7
- By:
- Publication type:
- Article
Why I Hate Security.
- Published in:
- 2015
- By:
- Publication type:
- Opinion
MAIN INFLUENCE AFFECTING PROFESSIONAL DEFENCE SOLUTION AND RESULT.
- Published in:
- Annals of DAAAM & Proceedings, 2011, p. 1541
- By:
- Publication type:
- Article
WiFi and WiMAX Secure Deployments.
- Published in:
- Journal of Computer Systems, Networks, & Communications, 2010, p. 1, doi. 10.1155/2010/423281
- By:
- Publication type:
- Article
SECURITY REQUIREMENT REPRESENTATION METHOD FOR CONFIDENCE OF SYSTEMS AND NETWORKS.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2010, v. 20, n. 1, p. 49, doi. 10.1142/S021819401000461X
- By:
- Publication type:
- Article
Transformation of Ground Vibration Signal for Debris-Flow Monitoring and Detection in Alarm Systems.
- Published in:
- Sensors (14248220), 2012, v. 12, n. 4, p. 4870, doi. 10.3390/s120404870
- By:
- Publication type:
- Article
Sensor Network Architectures for Monitoring Underwater Pipelines.
- Published in:
- Sensors (14248220), 2011, v. 11, n. 11, p. 10738, doi. 10.3390/s111110738
- By:
- Publication type:
- Article
Losing control? The privatisation of anti-piracy services in Southeast Asia.
- Published in:
- Australian Journal of International Affairs, 2009, v. 63, n. 3, p. 390, doi. 10.1080/10357710903104851
- By:
- Publication type:
- Article
Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 989, doi. 10.1007/s11227-013-0965-0
- By:
- Publication type:
- Article
A self-adaptive K selection mechanism for re-authentication load balancing in large-scale systems.
- Published in:
- Journal of Supercomputing, 2012, v. 61, n. 1, p. 166, doi. 10.1007/s11227-011-0655-8
- By:
- Publication type:
- Article
Scalable and efficient key management for heterogeneous sensor networks.
- Published in:
- Journal of Supercomputing, 2008, v. 45, n. 1, p. 44, doi. 10.1007/s11227-008-0184-2
- By:
- Publication type:
- Article
An active database architecture for knowledge-based incremental abstraction of complex concepts from continuously arriving time-oriented raw data.
- Published in:
- Journal of Intelligent Information Systems, 2007, v. 28, n. 3, p. 199, doi. 10.1007/s10844-006-0008-x
- By:
- Publication type:
- Article
Quality, Safety, and Security Systems in the Greek Port Industry: Over Twenty Years of Research, Empirical Evidence, and Future Perspectives.
- Published in:
- Logistics (2305-6290), 2024, v. 8, n. 4, p. 98, doi. 10.3390/logistics8040098
- By:
- Publication type:
- Article
The Private Security Industry in International Perspective.
- Published in:
- European Journal on Criminal Policy & Research, 1999, v. 7, n. 2, p. 143, doi. 10.1023/A:1008701310152
- By:
- Publication type:
- Article
Editorial.
- Published in:
- European Journal on Criminal Policy & Research, 1999, v. 7, n. 2, p. 139, doi. 10.1023/A:1008790926082
- By:
- Publication type:
- Article
User behaviour towards protective information technologies: the role of national cultural differences.
- Published in:
- Information Systems Journal, 2009, v. 19, n. 4, p. 391, doi. 10.1111/j.1365-2575.2007.00289.x
- By:
- Publication type:
- Article
Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods.
- Published in:
- Decision Sciences, 2001, v. 32, n. 4, p. 635, doi. 10.1111/j.1540-5915.2001.tb00975.x
- By:
- Publication type:
- Article
Security and delay issues in SIP systems.
- Published in:
- International Journal of Communication Systems, 2009, v. 22, n. 8, p. 1023, doi. 10.1002/dac.1018
- By:
- Publication type:
- Article
Secure fast WLAN handoff using time-bound delegated authentication.
- Published in:
- International Journal of Communication Systems, 2009, v. 22, n. 5, p. 565, doi. 10.1002/dac.983
- By:
- Publication type:
- Article
Ad hoc network routing and security: A review.
- Published in:
- International Journal of Communication Systems, 2007, v. 20, n. 8, p. 909, doi. 10.1002/dac.840
- By:
- Publication type:
- Article
SCADA SECURITY IN THE CONTEXT OF CORPORATE NETWORK INTEGRATION.
- Published in:
- Annals (Constanţa Maritime University), 2011, v. 12, n. 15, p. 159
- By:
- Publication type:
- Article
Petrochemical Equipment Detection by Improved Yolov5 with Multiscale Deep Feature Fusion and Attention Mechanism.
- Published in:
- Journal of Electrical & Computer Engineering, 2022, p. 1, doi. 10.1155/2022/8612174
- By:
- Publication type:
- Article
General Misconceptions about Information Security Lead to an Insecure World.
- Published in:
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 4, p. 164, doi. 10.1080/19393550802369792
- By:
- Publication type:
- Article
Common Sense for Your Network.
- Published in:
- IT Professional, 2010, v. 12, n. 3, p. 11, doi. 10.1109/MITP.2010.86
- By:
- Publication type:
- Article
Anatomy of the Information Security Workforce.
- Published in:
- IT Professional, 2010, v. 12, n. 1, p. 14, doi. 10.1109/MITP.2010.23
- By:
- Publication type:
- Article
Responding to Security Issues in WiMAX Networks.
- Published in:
- IT Professional, 2008, v. 10, n. 5, p. 15, doi. 10.1109/MITP.2008.110
- By:
- Publication type:
- Article