Works matching DE "SECURITY systems industry"
Results: 161
Dezinformáció az Ipar 4.0 rendszerek elleni támadásokban: Az elektromos autók dezinformációs csapdái a szélsőséges közösségimédia-platformokon (Telegram, 4chan, Truth Social) – A félrevezető tartalmak vizsgálata,3 1. rész.
- Published in:
- Military Engineer / Hadmérnök, 2024, v. 19, n. 3, p. 137, doi. 10.32567/hm.2024.3.9
- By:
- Publication type:
- Article
A model for establishing a quality culture in a major private security company.
- Published in:
- Total Quality Management & Business Excellence, 2009, v. 20, n. 8, p. 787, doi. 10.1080/14783360903128058
- By:
- Publication type:
- Article
Wearable, Human-Interactive, Health-Monitoring, Wireless Devices Fabricated by Macroscale Printing Techniques.
- Published in:
- Advanced Functional Materials, 2014, v. 24, n. 22, p. 3299, doi. 10.1002/adfm.201303874
- By:
- Publication type:
- Article
The Whys and Wherefores of Innovation in the World of Cybersecurity.
- Published in:
- ISSA Journal, 2017, v. 15, n. 4, p. 16
- By:
- Publication type:
- Article
Security Technology Market, Predictions, and Future Cyber Focus.
- Published in:
- ISSA Journal, 2017, v. 15, n. 4, p. 9
- By:
- Publication type:
- Article
Bringing Security Proactively Into the Enterprise.
- Published in:
- Intel Technology Journal, 2004, v. 8, n. 4, p. 303
- By:
- Publication type:
- Article
PlanetLab and its Applicability to the Proactive Enterprise.
- Published in:
- Intel Technology Journal, 2004, v. 8, n. 4, p. 269
- By:
- Publication type:
- Article
The Private Security Industry in International Perspective.
- Published in:
- European Journal on Criminal Policy & Research, 1999, v. 7, n. 2, p. 143, doi. 10.1023/A:1008701310152
- By:
- Publication type:
- Article
Editorial.
- Published in:
- European Journal on Criminal Policy & Research, 1999, v. 7, n. 2, p. 139, doi. 10.1023/A:1008790926082
- By:
- Publication type:
- Article
Explaining the puzzling stagnation of apprenticeships in Germany's security services: A case of insufficient institutional work?
- Published in:
- Journal of Professions & Organization, 2017, v. 4, n. 3, p. 302, doi. 10.1093/jpo/jox008
- By:
- Publication type:
- Article
数字技术赋能纺织产业绿色创新与发展的探讨.
- Published in:
- Cotton Textile Technology, 2023, v. 51, n. 622, p. 33
- By:
- Publication type:
- Article
CADLA: An efficient cluster-based anomaly nodes detection for mobile ad-hoc networks: A learning automata approach.
- Published in:
- Journal of Information Assurance & Security, 2013, v. 8, n. 6, p. 250
- By:
- Publication type:
- Article
Complementary Cooperation of CCTV and UAV Systems for Tourism Security and Sustainability.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 19, p. 10693, doi. 10.3390/su131910693
- By:
- Publication type:
- Article
Network Fusion: Information and Intelligence Sharing for a Networked World.
- Published in:
- Homeland Security Affairs, 2012, v. 8, p. 1
- By:
- Publication type:
- Article
TOWARDS A THIRD PHASE OF REGULATION.
- Published in:
- SA Crime Quarterly, 2011, n. 38, p. 23
- By:
- Publication type:
- Article
EDITORIAL.
- Published in:
- SA Crime Quarterly, 2011, n. 38, p. 1
- By:
- Publication type:
- Article
Seguridad privada en Guatemala: diferentes caminos hacia un mismo resultado.
- Published in:
- IBEROAMERICANA. América Latina - España - Portugal, 2009, n. 35, p. 176
- By:
- Publication type:
- Article
Estudio comparativo de la cárcel en España y México en la actualidad.
- Published in:
- Estudios Sociales: Revista de Alimentación Contemporánea y Desarrollo Regional, 2012, v. 20, n. 40, p. 97
- By:
- Publication type:
- Article
Dreams of Accountability, Guaranteed Surveillance: The Promises and Costs of Body-Worn Cameras.
- Published in:
- Surveillance & Society, 2016, v. 14, n. 1, p. 122, doi. 10.24908/ss.v14i1.6282
- By:
- Publication type:
- Article
Surveillance Design Communities in Europe: A Network Analysis.
- Published in:
- Surveillance & Society, 2016, v. 14, n. 1, p. 34, doi. 10.24908/ss.v14i1.5622
- By:
- Publication type:
- Article
Surveillance On/Off: Examining Home Surveillance Systems From The User's Perspective.
- Published in:
- Surveillance & Society, 2016, v. 14, n. 1, p. 59, doi. 10.24908/ss.v14i1.5488
- By:
- Publication type:
- Article
Political Economy and the Australian Government's CCTV Programme: An Exploration of State-Sponsored Street Cameras and the Cultivation of Consent and Business in Local Communities.
- Published in:
- Surveillance & Society, 2016, v. 14, n. 1, p. 90, doi. 10.24908/ss.v14i1.5372
- By:
- Publication type:
- Article
$389 M Mobile Application Security Market Set to Explode as Threats Increase.
- Published in:
- Microwave Journal, 2012, v. 55, n. 11, p. 56
- By:
- Publication type:
- Article
Indra and Cisco Work on Defence and Security Innovation.
- Published in:
- Microwave Journal, 2009, v. 52, n. 7, p. 52
- Publication type:
- Article
COMMERCIAL MARKET.
- Published in:
- Microwave Journal, 2004, v. 47, n. 11, p. 59
- Publication type:
- Article
An Interview with Alain M. Sadeghi President, Founder and Senior Security Engineer eTechSecurityPro.
- Published in:
- 2006
- By:
- Publication type:
- Interview
Enhancing and securing cyber‐physical systems and Industry 4.0 through digital twins: A critical review.
- Published in:
- Journal of Software: Evolution & Process, 2023, v. 35, n. 7, p. 1, doi. 10.1002/smr.2494
- By:
- Publication type:
- Article
NEW FEATURES OF AUDIT AND MONITORING FOR ENTERPRISE NETWORK SECURITY.
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2011, v. 1, n. 3, p. 243
- By:
- Publication type:
- Article
Petrochemical Equipment Detection by Improved Yolov5 with Multiscale Deep Feature Fusion and Attention Mechanism.
- Published in:
- Journal of Electrical & Computer Engineering, 2022, p. 1, doi. 10.1155/2022/8612174
- By:
- Publication type:
- Article
SECURITY REQUIREMENT REPRESENTATION METHOD FOR CONFIDENCE OF SYSTEMS AND NETWORKS.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2010, v. 20, n. 1, p. 49, doi. 10.1142/S021819401000461X
- By:
- Publication type:
- Article
Hacking: A Threat to Industrial Work Forces.
- Published in:
- CURIE Journal, 2010, v. 3, n. 1, p. 41
- By:
- Publication type:
- Article
Anatomy of the Information Security Workforce.
- Published in:
- IT Professional, 2010, v. 12, n. 1, p. 14, doi. 10.1109/MITP.2010.23
- By:
- Publication type:
- Article
Responding to Security Issues in WiMAX Networks.
- Published in:
- IT Professional, 2008, v. 10, n. 5, p. 15, doi. 10.1109/MITP.2008.110
- By:
- Publication type:
- Article
Managing Risk Propagation in Extended Enterprise Networks.
- Published in:
- IT Professional, 2008, v. 10, n. 4, p. 14, doi. 10.1109/MITP.2008.90
- By:
- Publication type:
- Article
Technology Trade Groups Consolidate their Power.
- Published in:
- IT Professional, 2008, v. 10, n. 3, p. 6
- Publication type:
- Article
Cisco-Microsoft Announce Joint Architecture Interoperability.
- Published in:
- IT Professional, 2006, v. 8, n. 5, p. 7
- Publication type:
- Article
Researcher Produces Completely Stealthy Malware.
- Published in:
- IT Professional, 2006, v. 8, n. 4, p. 5
- Publication type:
- Article
CONFERENCES.
- Published in:
- IT Professional, 2006, v. 8, n. 3, p. 50
- Publication type:
- Article
Corporate Best Practices.
- Published in:
- IT Professional, 2005, v. 7, n. 3, p. 5
- Publication type:
- Article
Virtual Private Networks - Based Home System.
- Published in:
- Electronics & Electrical Engineering, 2009, n. 96, p. 62
- By:
- Publication type:
- Article
WHY IT EXECUTIVES SHOULD HELP EMPLOYEES SECURE THEIR HOME COMPUTERS.
- Published in:
- 2008
- By:
- Publication type:
- Advertisement
Private security companies.
- Published in:
- New Political Economy, 2005, v. 10, n. 1, p. 121, doi. 10.1080/13563460500031297
- By:
- Publication type:
- Article
Concurrent Composition of Secure Protocols in the Timing Model.
- Published in:
- Journal of Cryptology, 2007, v. 20, n. 4, p. 431, doi. 10.1007/s00145-007-0567-1
- By:
- Publication type:
- Article
Security and delay issues in SIP systems.
- Published in:
- International Journal of Communication Systems, 2009, v. 22, n. 8, p. 1023, doi. 10.1002/dac.1018
- By:
- Publication type:
- Article
Secure fast WLAN handoff using time-bound delegated authentication.
- Published in:
- International Journal of Communication Systems, 2009, v. 22, n. 5, p. 565, doi. 10.1002/dac.983
- By:
- Publication type:
- Article
Ad hoc network routing and security: A review.
- Published in:
- International Journal of Communication Systems, 2007, v. 20, n. 8, p. 909, doi. 10.1002/dac.840
- By:
- Publication type:
- Article
PERSPECTIVE OF DEVELOPMENT OF SERVICES IN PRIVATE SECURITY AND NECESSITY OF CLASSIFICATION OF NEW TYPES OF POSITIONS IN THIS SPHERE IN SLOVAK REPUBLIC.
- Published in:
- Human Resources Management & Ergonomics, 2013, v. 7, n. 1, p. 128
- By:
- Publication type:
- Article
Formal Methods and Validation Techniques for Ensuring Automotive Systems Security.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 12, p. 666, doi. 10.3390/info14120666
- By:
- Publication type:
- Article
MAIN INFLUENCE AFFECTING PROFESSIONAL DEFENCE SOLUTION AND RESULT.
- Published in:
- Annals of DAAAM & Proceedings, 2011, p. 1541
- By:
- Publication type:
- Article
La vida social de los precios Evaluaciones monetarias y acción económica en los mercados de la seguridad privada.
- Published in:
- Civitas - Revista de Ciências Sociais, 2010, v. 10, n. 3, p. 450
- By:
- Publication type:
- Article