-
1
The UN Security Council and prevention of displacement
Published 2012“…Respecting the prohibitions against forced and arbitrary displacement could significantly reduce the risk of, or prevent, displacement in situations of armed conflict, as could insisting on accountability for violations of these prohibitions that amount to war crimes or crimes against humanity. …”
Journal article -
2
Security enhancements to prevent DNS cache poisoning attacks
Published 2018Get full text
Final Year Project (FYP) -
3
Design of security scheme to prevent DNS cache poisoning attacks
Published 2019Get full text
Final Year Project (FYP) -
4
Securing mhealth applications with grid-based honey encryption
Published 2021Get full text
Get full text
Proceedings -
5
Physical security analysis and simulation of the multi-layer security system for the Offshore Nuclear Plant (ONP)
Published 2020“…This paper updates the security strategy in the earlier 2016 paper (ICONE24-61029, Charlotte, NC, Kindfuller et. al.) with the following significant additions: a modification of the plant design for security optimization, changes in the guard force based on simulations, placement of the protective barrier to prevent damage from ship explosions, and establishment of the shore station guard force, response team and key facilities. …”
Get full text
Article -
6
-
7
ASEAN's Next Challenge: Preventing Incidents at Sea
Published 2016Get full text
Get full text
Commentary -
8
Partners in national cyber security strategy? : An analysis of cyber security strategies of Ministry of Defence and police in UK
Published 2018“…Questionnaires and telephone interviews were used to gather information on personnel understanding of cyber security strategy and the nature of the partnership that exists between the two forces – military and police. …”
Get full text
Thesis -
9
Technological interventions to detect, communicate and prevent sexual assault
Published 2017Get full text
Thesis -
10
Cost Estimation Model for Secure Software Development
Published 2011“…Most of the commerce websites are forced to add on security coding to prevent them from web criminal. …”
Get full text
Thesis -
11
Secure algorithm based data aggregation for sensor networks
Published 2016Get full text
Final Year Project (FYP) -
12
The Routledge International Handbook of Universities, Security and Intelligence Studies
Published 2019“…<br/>In an era of intensified international terror, universities have been increasingly drawn into an arena of locating, monitoring and preventing such threats, forcing them into often covert relationships with the security and intelligence agencies. …”
Book -
13
Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization
Published 2021“…While some solutions exist to prevent online brute-force attacks that arise from one single IP address, attacks performed by botnets are more challenging. …”
Get full text
Article -
14
The extent and implications of women's forced migration journeys to escape domestic violence
Published 2013“…Whilst policy makers and practitioners focus on what works in particular local areas to tackle and prevent domestic violence against women, many individual women (often with their children) move away from their local area, either temporarily or permanently. …”
Get full text
Thesis -
15
-
16
Security Enhancement of Route Optimization in Mobile IPv6 Networks
Published 2008“…Several methods were proposed to secure route optimization. Return routability was adopted by Internet Engineering Task Force (IETF) with its security protocol based on RFC 3775. …”
Get full text
Thesis -
17
Efficient and secure mobility support in 6LoWPAN networks
Published 2017“…The formal verification by the verification tools and the performance evaluation results show that the proposed security schemes for 6LoWPAN networks could not only enhance the security functionalities with the ability to prevent various malicious attacks but also be computationally efficient.…”
Get full text
Thesis -
18
A review on structured scheme representation on data security application
Published 2018“…Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. …”
Get full text
Article -
19
ES-SECS/GEM: An Efficient Security Mechanism for SECS/GEM Communications
Published 2023“…Industry 4.0, as a driving force, is making massive achievements, notably in the manufacturing sector, where all key components engaged in the production processes are being digitally interconnected. …”
Get full text
Get full text
Article -
20
Improving security at the system-call boundary in a type-safe operating system
Published 2019Get full text
Thesis