-
441
Adaptive security architecture defense platform based on software defined security
Published 2020-12-01Subjects: “…adaptive security architecture;cloud security;software defined security;website application security…”
Get full text
Article -
442
A Secure Connection: Finding the Form of ASEAN Cyber Security Cooperation
Published 2013-07-01“…Internet security is somehow being understated in ASEAN’s strategy facing 2015. …”
Get full text
Article -
443
Human Security as a Basis of a New Regional Security Initiative
Published 2015-12-01Subjects: “…human security…”
Get full text
Article -
444
Non-Traditional Security Threats and NATO’s Response in the Contemporary Security Environment
Published 2023-12-01Subjects: Get full text
Article -
445
Methods for Selection of Network Security Systems in accordance with Information Security Policies
Published 2015-03-01Subjects: “…information security policy…”
Get full text
Article -
446
What Physical Layer Security Can Do for 6G Security
Published 2023-01-01Subjects: Get full text
Article -
447
What kind of cyber security? Theorising cyber security and mapping approaches
Published 2018-05-01Subjects: “…Cyber security…”
Get full text
Article -
448
Drive Encryption and Secure Login to a Secure Workstation for Special Applications
Published 2012-09-01Subjects: Get full text
Article -
449
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01Subjects: “…security protocol;implementations security;Swift language;formal analysis;model extraction…”
Get full text
Article -
450
How to Study Gender in International Security? An Introduction to Feminist Security Studies
Published 2020-03-01Subjects: Get full text
Article -
451
Investigation of economic security in terms of relations “innovation security — innovation culture”
Published 2012-12-01Subjects: “…region’s economic security…”
Get full text
Article -
452
US foreign policy : from security to international security cooperation based on
Published 2008-12-01Get full text
Article -
453
JaCoWeb Security - A CORBA Security Discretionary Prototype
Published 2000-12-01Subjects: “…Security…”
Get full text
Article -
454
WEB SITE SECURITY DISCLOSURE POLICIES OF ONLINE SECURITIES FIRMS: ARE THEY SATISFACTORY?
Published 2007-01-01Get full text
Article -
455
Security Substrate Based Security Management and Control Mecbanism of Reconfigurable Network
Published 2014-07-01Subjects: “…next generation internet design;reconfigurable network;security substrate;dynamic security model…”
Get full text
Article -
456
Security & safety issues and endogenous security for intelligent connected vehicles
Published 2024-12-01Subjects: Get full text
Article -
457
Securing Communication in MQTT enabled Internet of Things with Lightweight security protocol
Published 2017-04-01Subjects: Get full text
Article -
458
Secure Physical Layer Network Coding versus Secure Network Coding
Published 2021-12-01Subjects: Get full text
Article -
459
The Development of Private Security and the Dilemmas Surrounding the Effects of Private Security Services
Published 2016-12-01Subjects: “…private security…”
Get full text
Article -
460
Regionalizing security and decentralizing Nigeria’s security architecture: What is the position of the media?
Published 2021-10-01“… Background: The debate on decentralization of Nigeria’s internal security architecture is not a recent one and the clamour for state and community policing have not died down either. …”
Get full text
Article