Academic literature on the topic 'Customize security solutions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Customize security solutions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Customize security solutions"
Manoj, N. "Exclusive Security Authority." Recent Trends in Information Technology and its Application 6, no. 3 (2023): 31–35. https://doi.org/10.5281/zenodo.8210556.
Full textZhou, Huaizhe, Haihe Ba, Yongjun Wang, et al. "Tenant-Oriented Monitoring for Customized Security Services in the Cloud." Symmetry 11, no. 2 (2019): 252. http://dx.doi.org/10.3390/sym11020252.
Full textKe, Yi Kuan, and Pei Hwa Huang. "Strategy for Breaker Failure by Communication Implementation." Advanced Materials Research 732-733 (August 2013): 1334–37. http://dx.doi.org/10.4028/www.scientific.net/amr.732-733.1334.
Full textDangi, Ramraj, Akshay Jadhav, Gaurav Choudhary, Nicola Dragoni, Manas Kumar Mishra, and Praveen Lalwani. "ML-Based 5G Network Slicing Security: A Comprehensive Survey." Future Internet 14, no. 4 (2022): 116. http://dx.doi.org/10.3390/fi14040116.
Full textDamodhar Reddy Ramesh Reddy Mutayalwad. "Low-code solutions: Transforming CRM customization and business agility." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 3713–24. https://doi.org/10.30574/wjarr.2025.26.1.1471.
Full textAbhishek Tangudu, Dr. Arpit Jain, and Er. Om Goel. "Effective Strategies for Managing Multi-Cloud Salesforce Solutions." Universal Research Reports 11, no. 2 (2024): 199–217. http://dx.doi.org/10.36676/urr.v11.i2.1338.
Full textPal, Shantanu, and Zahra Jadidi. "Analysis of Security Issues and Countermeasures for the Industrial Internet of Things." Applied Sciences 11, no. 20 (2021): 9393. http://dx.doi.org/10.3390/app11209393.
Full textUddin, K. M. Salah, Mohammad Rakibul Islam Bhuiyan, and Marufa Hamid. "Perception towards the Acceptance of Digital Health Services among the People of Bangladesh." WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 21 (July 12, 2024): 1557–70. http://dx.doi.org/10.37394/23207.2024.21.127.
Full textGracia, A. "The user's adoption towards chatbot technology - An exploration." i-manager's Journal on Mobile Applications and Technologies 11, no. 2 (2024): 41. https://doi.org/10.26634/jmt.11.2.21272.
Full textPahune, Saurabh, and Zahid Akhtar. "Transitioning from MLOps to LLMOps: Navigating the Unique Challenges of Large Language Models." Information 16, no. 2 (2025): 87. https://doi.org/10.3390/info16020087.
Full textBooks on the topic "Customize security solutions"
Publishing, Tech Security. Don't Panic! I'm a Professional Security Solutions Architect : Customized 100 Page Lined Notebook Journal Gift for a Busy Security Solutions Architect: Far Better Than a Throw Away Greeting Card. Independently Published, 2020.
Find full textBook chapters on the topic "Customize security solutions"
Ul Haq, ohd Naved, Mohit Kumar Sharma, and Mohd Hyder Gouri. "CLOUD SERVICE PROVIDERS AND THE ECOSYSTEM." In EMERGING TRENDS IN CLOUD SECURITY AND INTELLIGENT AGENTS. GRF Books, 2023. http://dx.doi.org/10.52458/9788196869434.2023.eb.grf.ch-05.
Full textTalukder, Mohammad Badruddoza, Md Zubair Rahman, and Musfiqur Rahoman Khan. "Enhancing Guest Experience Through Smart Hotel Technologies." In Advances in Hospitality, Tourism, and the Services Industry. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-7021-6.ch011.
Full textKhalid, Abdullah, Nor Azlina Abdul Rahman, and Khalida Shajaratuddur Harun. "Secure IoT based Home Automation by Identifying Vulnerabilities and Threats." In Digital Innovation Adoption: Architectural Recommendations and Security Solutions. BENTHAM SCIENCE PUBLISHERS, 2024. http://dx.doi.org/10.2174/9789815079661124010007.
Full textRastogi, Ruchika, and Mohammad Irfan. "Exploring Ethical and Cultural Considerations in Metaverse-Based Digital Marketing." In Unveiling Social Dynamics and Community Interaction in the Metaverse. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8628-6.ch014.
Full textAlvarado, Jesus, and Malka N. Halgamuge. "New Era in the Supply Chain Management With Blockchain." In Industry 4.0 and Hyper-Customized Smart Manufacturing Supply Chains. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-9078-1.ch001.
Full textParthiban, K. P., S. Muthu Vijaya Pandian, M. Muthukrishnaveni, and M. Kavibharathi. "The Internet of Things for Healthcare: uses, Particular Cases, and Difficulties." In Advanced Computing Solutions for Healthcare. BENTHAM SCIENCE PUBLISHERS, 2025. https://doi.org/10.2174/9789815274134125010011.
Full textAlenazy, Wael Mohammad. "Blockchain-Enabled Internet of Things for Unsupervised Structural Health Monitoring in Potential Building Structures." In Handbook of Research on Innovations and Applications of AI, IoT, and Cognitive Technologies. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6870-5.ch011.
Full textRiemann, Ute. "Benefits and Challenges for BPM in the Cloud." In Cloud Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch091.
Full textJain, Neha, and Suchita Arora. "Brain-Computer Interface-Controlled Smartphone for Smart Banking Solutions." In Concepts and Applications of Brain-Computer Interfaces. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-7427-6.ch023.
Full textRehak, David, Martin Hromada, Ilias Gkotsis, et al. "Validation Strategy as a Part of the European Gas Network Protection." In Issues on Risk Analysis for Critical Infrastructure Protection [Working Title]. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.94644.
Full textConference papers on the topic "Customize security solutions"
Tayyebi, Yakuta, and D. S. Bhilare. "Security solutions in Cloud through customized IDS configuration at VM level." In 2018 International Conference on Advanced Computation and Telecommunication (ICACAT). IEEE, 2018. http://dx.doi.org/10.1109/icacat.2018.8933581.
Full textYin, Jun, Sihan Li, Guorong Liu, Jie Chen, Jun Shen, and Qingyang Wang. "Customized 5G Private Network Solution of High Flexibility, Security and Controllability." In 2022 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB). IEEE, 2022. http://dx.doi.org/10.1109/bmsb55706.2022.9828641.
Full textRizkalla, Moness, and Jeff Brown. "Security for Pipeline Assets: The State of the Art." In 2002 4th International Pipeline Conference. ASMEDC, 2002. http://dx.doi.org/10.1115/ipc2002-27078.
Full textAl-Habib, Murtadha, and Yasser Al-Ghamdi. "Integrated Cloud Computing Environment for Upstream Geoscience Workflows." In SPE Middle East Oil & Gas Show and Conference. SPE, 2021. http://dx.doi.org/10.2118/204848-ms.
Full textDewmini, M. G. C. N., and S. Samarawickrama. "Customised packaging solutions for fragile edible cutlery: a design and development study." In Awakening the economy through design innovation. Department of Integrated Design, University of Moratuwa, Sri Lanka, 2023. http://dx.doi.org/10.31705/idr.2023.15.
Full textZhang, Linxi, and Di Ma. "Evaluating Network Security Configuration (NSC) Practices in Vehicle-Related Android Applications." In WCX SAE World Congress Experience. SAE International, 2024. http://dx.doi.org/10.4271/2024-01-2881.
Full textBlahova, Marta. "SECURING INFORMATION SYSTEMS USING FRACTAL GEOMETRY." In 22nd SGEM International Multidisciplinary Scientific GeoConference 2022. STEF92 Technology, 2022. http://dx.doi.org/10.5593/sgem2022/2.1/s07.11.
Full textTalib, Noor Nazri, Subba Venkata Ramarao, Kevin McNeily, et al. "Holistic Customized Approach to Address Practical Challenges for the Large Scale Implementation of Limited Entry Liners Completions at ADNOC Onshore Fields." In Abu Dhabi International Petroleum Exhibition & Conference. SPE, 2021. http://dx.doi.org/10.2118/208020-ms.
Full textHenderson, Niklas, Helen Pallett, Sander Van Der Linden, Jake Montanarini, and Oliver Buckley. "The disPHISHinformation Game: Creating a Serious Game to Fight Phishing Using Blended Design Approaches." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004774.
Full textChaturvedi, Dr Pritha, and Prof Sumit Kumar Sinha. "CUSTOMER-CENTRIC MANAGEMENT: INNOVATIONS IN THE BANKING INDUSTRY." In Transforming Knowledge: A Multidisciplinary Research on Integrative Learning Across Disciplines. The Bhopal School of Social Sciences, 2025. https://doi.org/10.51767/ic250103.
Full text