kw.\*:("security")
Results 1 to 25 of 15360
Selection :
Energy security and co-benefits of energy efficiency improvement in three Asian countriesSELVAKKUMARAN, Sujeetha; LIMMEECHOKCHAI, Bundit.Renewable & sustainable energy review. 2013, Vol 20, pp 491-503, issn 1364-0321, 13 p.Article
Climate protection and China's energy security: Win-win or tradeoffGANG WU; LIU, Lan-Cui; HAN, Zhi-Yong et al.Applied energy. 2012, Vol 97, pp 157-163, issn 0306-2619, 7 p.Conference Paper
Nature and future of IT-security regulationRATAI, Balazs.International journal of technology transfer and commercialisation. 2007, Vol 6, Num 1, pp 64-75, issn 1470-6075, 12 p.Article
Water security and rural household food security: empirical evidence from the Mzinyathi district in South AfricaSINYOLO, Sikhulumile; MUDHARA, Maxwell; WALE, Edilegnaw et al.Food security (Print). 2014, Vol 6, Num 4, pp 483-499, issn 1876-4517, 17 p.Article
Factors influencing information security management in small- and medium-sized enterprises: A case study from TurkeyYILDIRIM, Ebru Yeniman; AKALP, Gizem; AYTAC, Serpil et al.International journal of information management. 2011, Vol 31, Num 4, pp 360-365, issn 0268-4012, 6 p.Article
A situation awareness model for information security risk managementWEBB, Jeb; AHMAD, Atif; MAYNARD, Sean B et al.Computers & security. 2014, Vol 44, pp 1-15, issn 0167-4048, 15 p.Article
Information security management standards: Problems and solutionsSIPONEN, Mikko; WILLISON, Robert.Information & management. 2009, Vol 46, Num 5, pp 267-270, issn 0378-7206, 4 p.Article
Security assessments of IEEE 802.15.4 standard based on X.805 frameworkRICHARD, Afolabi O; AHMAD, Aftab; KISEON, Kim et al.International journal of security and networks (Print). 2010, Vol 5, Num 2-3, pp 188-197, issn 1747-8405, 10 p.Article
China's energy security: The perspective of energy usersMALAVIKA JAIN BAMBAWALE; SOVACOOL, Benjamin K.Applied energy. 2011, Vol 88, Num 5, pp 1949-1956, issn 0306-2619, 8 p.Article
India's energy security: A sample of business, government, civil society, and university perspectivesJAIN BAMBAWALE, Malavika; SOVACOOL, Benjamin K.Energy policy. 2011, Vol 39, Num 3, pp 1254-1264, issn 0301-4215, 11 p.Article
An Architectural Systems Engineering Methodology for Addressing Cyber SecurityBAYUK, Jennifer L; HOROWITZ, Barry M.Systems engineering (Print). 2011, Vol 14, Num 3, pp 294-304, issn 1098-1241, 11 p.Article
Analysis of livelihood security : A case study in the Kali-Khola watershed of NepalBHANDARI, B. S; GRANT, M.Journal of environmental management. 2007, Vol 85, Num 1, pp 17-26, issn 0301-4797, 10 p.Article
A Proof of Security of Yao's Protocol for Two-Party ComputationLINDELL, Yehuda; PINKAS, Benny.Journal of cryptology. 2009, Vol 22, Num 2, pp 161-188, issn 0933-2790, 28 p.Article
Food Sovereignty in the Era of Land Grabbing: An African PerspectiveAMBALAM, Kannan.Journal of sustainable development. 2014, Vol 7, Num 2, pp 121-132, issn 1913-9063, 12 p.Article
Energy security level assessment technologyAUGUTIS, Juozas; KRIKSTOLAITIS, Ricardas; MARTISAUSKAS, Linas et al.Applied energy. 2012, Vol 97, pp 143-149, issn 0306-2619, 7 p.Conference Paper
INFORMATION SECURITY PRACTICE AND EXPERIENCEBAO, Feng; WANG, Guilin.International journal of applied cryptography (Print). 2010, Vol 2, Num 1, issn 1753-0563, 83 p.Serial Issue
Security Analysis and Auditing of IEC61850-Based Automated SubstationsPREMARATNE, Upeka; SAMARABANDU, Jagath; SIDHU, Tarlochan et al.IEEE transactions on power delivery. 2010, Vol 25, Num 4, pp 2346-2355, issn 0885-8977, 10 p.Article
Shocks in economic growth = shocking effects for food security?KAVALLARI, Aikaterini; FELLMANN, Thomas; GAY, S. Hubertus et al.Food security (Print). 2014, Vol 6, Num 4, pp 567-583, issn 1876-4517, 17 p.Article
A multidimensional approach to multilevel securityWINJUM, Eli; MØLMANN, Bjørn Kjetil.Information management & computer security. 2008, Vol 16, Num 5, pp 436-448, issn 0968-5227, 13 p.Article
Can integrated aquaculture-agriculture (IAA) produce more crop per drop?AHMED, Nesar; WARD, James D; SAINT, Christopher P et al.Food security (Print). 2014, Vol 6, Num 6, pp 767-779, issn 1876-4517, 13 p.Article
Viewpoint Why Computer Scientists Should Care About Cyber Conflict and U.S. National Security PolicyLIN, Herbert.Communications of the ACM. 2012, Vol 55, Num 6, pp 41-43, issn 0001-0782, 3 p.Article
Harvest failures, temporary export restrictions and global food security: the example of limited grain exports from Russia, Ukraine and KazakhstanFELLMANN, Thomas; HELAINE, Sophie; NEKHAY, Olexandr et al.Food security (Print). 2014, Vol 6, Num 5, pp 727-742, issn 1876-4517, 16 p.Article
Synergies and tradeoffs between cash crop production and food security: a case study in rural GhanaANDERMAN, Tal Lee; REMANS, Roseline; WOOD, Stephen A et al.Food security (Print). 2014, Vol 6, Num 4, pp 541-554, issn 1876-4517, 14 p.Article
A survey on RFID security and provably secure grouping-proof protocolsDANG NGUYEN DUC; KONIDALA, Divyan M; LEE, Hyunrok et al.International journal of internet technology and secured transactions (Print). 2010, Vol 2, Num 3-4, pp 222-249, issn 1748-569X, 28 p.Article
Leadership Failures in the' National Security ComplexBERGHEL, Hal.Computer (Long Beach, CA). 2014, Vol 47, Num 6, pp 64-67, issn 0018-9162, 4 p.Article