Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("security")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 15360

  • Page / 615
Export

Selection :

  • and

Energy security and co-benefits of energy efficiency improvement in three Asian countriesSELVAKKUMARAN, Sujeetha; LIMMEECHOKCHAI, Bundit.Renewable & sustainable energy review. 2013, Vol 20, pp 491-503, issn 1364-0321, 13 p.Article

Climate protection and China's energy security: Win-win or tradeoffGANG WU; LIU, Lan-Cui; HAN, Zhi-Yong et al.Applied energy. 2012, Vol 97, pp 157-163, issn 0306-2619, 7 p.Conference Paper

Nature and future of IT-security regulationRATAI, Balazs.International journal of technology transfer and commercialisation. 2007, Vol 6, Num 1, pp 64-75, issn 1470-6075, 12 p.Article

Water security and rural household food security: empirical evidence from the Mzinyathi district in South AfricaSINYOLO, Sikhulumile; MUDHARA, Maxwell; WALE, Edilegnaw et al.Food security (Print). 2014, Vol 6, Num 4, pp 483-499, issn 1876-4517, 17 p.Article

Factors influencing information security management in small- and medium-sized enterprises: A case study from TurkeyYILDIRIM, Ebru Yeniman; AKALP, Gizem; AYTAC, Serpil et al.International journal of information management. 2011, Vol 31, Num 4, pp 360-365, issn 0268-4012, 6 p.Article

A situation awareness model for information security risk managementWEBB, Jeb; AHMAD, Atif; MAYNARD, Sean B et al.Computers & security. 2014, Vol 44, pp 1-15, issn 0167-4048, 15 p.Article

Information security management standards: Problems and solutionsSIPONEN, Mikko; WILLISON, Robert.Information & management. 2009, Vol 46, Num 5, pp 267-270, issn 0378-7206, 4 p.Article

Security assessments of IEEE 802.15.4 standard based on X.805 frameworkRICHARD, Afolabi O; AHMAD, Aftab; KISEON, Kim et al.International journal of security and networks (Print). 2010, Vol 5, Num 2-3, pp 188-197, issn 1747-8405, 10 p.Article

China's energy security: The perspective of energy usersMALAVIKA JAIN BAMBAWALE; SOVACOOL, Benjamin K.Applied energy. 2011, Vol 88, Num 5, pp 1949-1956, issn 0306-2619, 8 p.Article

India's energy security: A sample of business, government, civil society, and university perspectivesJAIN BAMBAWALE, Malavika; SOVACOOL, Benjamin K.Energy policy. 2011, Vol 39, Num 3, pp 1254-1264, issn 0301-4215, 11 p.Article

An Architectural Systems Engineering Methodology for Addressing Cyber SecurityBAYUK, Jennifer L; HOROWITZ, Barry M.Systems engineering (Print). 2011, Vol 14, Num 3, pp 294-304, issn 1098-1241, 11 p.Article

Analysis of livelihood security : A case study in the Kali-Khola watershed of NepalBHANDARI, B. S; GRANT, M.Journal of environmental management. 2007, Vol 85, Num 1, pp 17-26, issn 0301-4797, 10 p.Article

A Proof of Security of Yao's Protocol for Two-Party ComputationLINDELL, Yehuda; PINKAS, Benny.Journal of cryptology. 2009, Vol 22, Num 2, pp 161-188, issn 0933-2790, 28 p.Article

Food Sovereignty in the Era of Land Grabbing: An African PerspectiveAMBALAM, Kannan.Journal of sustainable development. 2014, Vol 7, Num 2, pp 121-132, issn 1913-9063, 12 p.Article

Energy security level assessment technologyAUGUTIS, Juozas; KRIKSTOLAITIS, Ricardas; MARTISAUSKAS, Linas et al.Applied energy. 2012, Vol 97, pp 143-149, issn 0306-2619, 7 p.Conference Paper

INFORMATION SECURITY PRACTICE AND EXPERIENCEBAO, Feng; WANG, Guilin.International journal of applied cryptography (Print). 2010, Vol 2, Num 1, issn 1753-0563, 83 p.Serial Issue

Security Analysis and Auditing of IEC61850-Based Automated SubstationsPREMARATNE, Upeka; SAMARABANDU, Jagath; SIDHU, Tarlochan et al.IEEE transactions on power delivery. 2010, Vol 25, Num 4, pp 2346-2355, issn 0885-8977, 10 p.Article

Shocks in economic growth = shocking effects for food security?KAVALLARI, Aikaterini; FELLMANN, Thomas; GAY, S. Hubertus et al.Food security (Print). 2014, Vol 6, Num 4, pp 567-583, issn 1876-4517, 17 p.Article

A multidimensional approach to multilevel securityWINJUM, Eli; MØLMANN, Bjørn Kjetil.Information management & computer security. 2008, Vol 16, Num 5, pp 436-448, issn 0968-5227, 13 p.Article

Can integrated aquaculture-agriculture (IAA) produce more crop per drop?AHMED, Nesar; WARD, James D; SAINT, Christopher P et al.Food security (Print). 2014, Vol 6, Num 6, pp 767-779, issn 1876-4517, 13 p.Article

Viewpoint Why Computer Scientists Should Care About Cyber Conflict and U.S. National Security PolicyLIN, Herbert.Communications of the ACM. 2012, Vol 55, Num 6, pp 41-43, issn 0001-0782, 3 p.Article

Harvest failures, temporary export restrictions and global food security: the example of limited grain exports from Russia, Ukraine and KazakhstanFELLMANN, Thomas; HELAINE, Sophie; NEKHAY, Olexandr et al.Food security (Print). 2014, Vol 6, Num 5, pp 727-742, issn 1876-4517, 16 p.Article

Synergies and tradeoffs between cash crop production and food security: a case study in rural GhanaANDERMAN, Tal Lee; REMANS, Roseline; WOOD, Stephen A et al.Food security (Print). 2014, Vol 6, Num 4, pp 541-554, issn 1876-4517, 14 p.Article

A survey on RFID security and provably secure grouping-proof protocolsDANG NGUYEN DUC; KONIDALA, Divyan M; LEE, Hyunrok et al.International journal of internet technology and secured transactions (Print). 2010, Vol 2, Num 3-4, pp 222-249, issn 1748-569X, 28 p.Article

Leadership Failures in the' National Security ComplexBERGHEL, Hal.Computer (Long Beach, CA). 2014, Vol 47, Num 6, pp 64-67, issn 0018-9162, 4 p.Article

  • Page / 615