Academic literature on the topic 'Customize security solutions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Customize security solutions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Customize security solutions"

1

Manoj, N. "Exclusive Security Authority." Recent Trends in Information Technology and its Application 6, no. 3 (2023): 31–35. https://doi.org/10.5281/zenodo.8210556.

Full text
Abstract:
<em>Cloud component integrated conceptual approach is provided to the users with the help of the system where multiple types of collateral references can be achieved and even elaborate its security mechanisms can be implemented. The perception working is based on self-setting which will be provided in multiple categories and all types of categories can references are established in a way that recognize patient can be achieved with props for self-service digitalized and usage regulation setup. Multiple reference of the collateral integration is provided which will be identified and will the sav
APA, Harvard, Vancouver, ISO, and other styles
2

Zhou, Huaizhe, Haihe Ba, Yongjun Wang, et al. "Tenant-Oriented Monitoring for Customized Security Services in the Cloud." Symmetry 11, no. 2 (2019): 252. http://dx.doi.org/10.3390/sym11020252.

Full text
Abstract:
The dramatic proliferation of cloud computing makes it an attractive target for malicious attacks. Increasing solutions resort to virtual machine introspection (VMI) to deal with security issues in the cloud environment. However, the existing works are not feasible to support tenants to customize individual security services based on their security requirements flexibly. Additionally, adoption of VMI-based security solutions makes tenants at the risk of exposing sensitive information to attackers. To alleviate the security and privacy anxieties of tenants, we present SECLOUD, a framework for m
APA, Harvard, Vancouver, ISO, and other styles
3

Ke, Yi Kuan, and Pei Hwa Huang. "Strategy for Breaker Failure by Communication Implementation." Advanced Materials Research 732-733 (August 2013): 1334–37. http://dx.doi.org/10.4028/www.scientific.net/amr.732-733.1334.

Full text
Abstract:
This main purpose of this paper is to study the implementation of the strategy for breaker failure under the condition of communication exchange in the power system. The method of breaker failure strategy in case of IEC61850 (Communication Networks and Systems in Substations) GOOSE (Generic Object Oriented Substation Event) aims to fast transmit signal to isolate faulty positions for maintaining safety security. The current strategy for breaker failure in substations is to use hardwire solutions to implement related applications for breaker failure. For integrating protective relays in substat
APA, Harvard, Vancouver, ISO, and other styles
4

Dangi, Ramraj, Akshay Jadhav, Gaurav Choudhary, Nicola Dragoni, Manas Kumar Mishra, and Praveen Lalwani. "ML-Based 5G Network Slicing Security: A Comprehensive Survey." Future Internet 14, no. 4 (2022): 116. http://dx.doi.org/10.3390/fi14040116.

Full text
Abstract:
Fifth-generation networks efficiently support and fulfill the demands of mobile broadband and communication services. There has been a continuing advancement from 4G to 5G networks, with 5G mainly providing the three services of enhanced mobile broadband (eMBB), massive machine type communication (eMTC), and ultra-reliable low-latency services (URLLC). Since it is difficult to provide all of these services on a physical network, the 5G network is partitioned into multiple virtual networks called “slices”. These slices customize these unique services and enable the network to be reliable and fu
APA, Harvard, Vancouver, ISO, and other styles
5

Damodhar Reddy Ramesh Reddy Mutayalwad. "Low-code solutions: Transforming CRM customization and business agility." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 3713–24. https://doi.org/10.30574/wjarr.2025.26.1.1471.

Full text
Abstract:
Low-code development platforms are fundamentally transforming how organizations customize and extend their Customer Relationship Management systems, enabling unprecedented business agility while dramatically reducing technical barriers. These platforms provide visual interfaces, drag-and-drop components, and pre-built templates that enable users with minimal programming expertise to build sophisticated applications and workflows. The architectural foundation of low-code solutions incorporates visual process modeling, declarative development, abstraction layers, and metadata-driven architecture
APA, Harvard, Vancouver, ISO, and other styles
6

Abhishek Tangudu, Dr. Arpit Jain, and Er. Om Goel. "Effective Strategies for Managing Multi-Cloud Salesforce Solutions." Universal Research Reports 11, no. 2 (2024): 199–217. http://dx.doi.org/10.36676/urr.v11.i2.1338.

Full text
Abstract:
Businesses are using multi-cloud solutions to improve flexibility, scalability, and efficiency in today's dynamic environment. Salesforce, a prominent CRM platform, is crucial to many organizations' multi-cloud ecosystems. To achieve seamless integration, maximum performance, and safe operations, administering Salesforce products across numerous cloud environments requires distinct methodologies. This paper discusses best practices, essential concerns, and practical solutions for managing multi-cloud Salesforce applications. The research starts with multi-cloud advantages and difficulties. By
APA, Harvard, Vancouver, ISO, and other styles
7

Pal, Shantanu, and Zahra Jadidi. "Analysis of Security Issues and Countermeasures for the Industrial Internet of Things." Applied Sciences 11, no. 20 (2021): 9393. http://dx.doi.org/10.3390/app11209393.

Full text
Abstract:
Industrial Internet of Things (IIoT) can be seen as an extension of the Internet of Things (IoT) services and applications to industry with the inclusion of Industry 4.0 that provides automation, reliability, and control in production and manufacturing. IIoT has tremendous potential to accelerate industry automation in many areas, including transportation, manufacturing, automobile, marketing, to name a few places. When the benefits of IIoT are visible, the development of large-scale IIoT systems faces various security challenges resulting in many large-scale cyber-attacks, including fraudulen
APA, Harvard, Vancouver, ISO, and other styles
8

Uddin, K. M. Salah, Mohammad Rakibul Islam Bhuiyan, and Marufa Hamid. "Perception towards the Acceptance of Digital Health Services among the People of Bangladesh." WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 21 (July 12, 2024): 1557–70. http://dx.doi.org/10.37394/23207.2024.21.127.

Full text
Abstract:
The research intends to determine the influential factors of individual willingness to use digital health services in Bangladesh. The quantitative research method was conducted to obtain the purposes of this study. To collect primary data, a questionnaire link and direct interaction with a purposive sample of 300 people were used. The sample for this study was made up of people who use digital health services. The study discovered that six factors, totaling 24 items, influence Bangladeshis’ acceptance of digital health services. The reliability test for 24 variables and 6 determinants is relia
APA, Harvard, Vancouver, ISO, and other styles
9

Gracia, A. "The user's adoption towards chatbot technology - An exploration." i-manager's Journal on Mobile Applications and Technologies 11, no. 2 (2024): 41. https://doi.org/10.26634/jmt.11.2.21272.

Full text
Abstract:
This study investigates the integration of chatbot technology in customer service, emphasizing its impact on user experience and satisfaction. Leveraging both quantitative and qualitative research techniques, a survey was conducted with 120 respondents from Nagercoil City to evaluate the benefits, challenges, and overall effectiveness of chatbot systems. The analysis identified four key components, including the benefits of chatbot integration, enhancements in customer support services, user-friendliness, and customer satisfaction. Findings indicate that the primary purpose of chatbot usage is
APA, Harvard, Vancouver, ISO, and other styles
10

Pahune, Saurabh, and Zahid Akhtar. "Transitioning from MLOps to LLMOps: Navigating the Unique Challenges of Large Language Models." Information 16, no. 2 (2025): 87. https://doi.org/10.3390/info16020087.

Full text
Abstract:
Large Language Models (LLMs), such as the GPT series, LLaMA, and BERT, possess incredible capabilities in human-like text generation and understanding across diverse domains, which have revolutionized artificial intelligence applications. However, their operational complexity necessitates a specialized framework known as LLMOps (Large Language Model Operations), which refers to the practices and tools used to manage lifecycle processes, including model fine-tuning, deployment, and LLMs monitoring. LLMOps is a subcategory of the broader concept of MLOps (Machine Learning Operations), which is t
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Customize security solutions"

1

Publishing, Tech Security. Don't Panic! I'm a Professional Security Solutions Architect : Customized 100 Page Lined Notebook Journal Gift for a Busy Security Solutions Architect: Far Better Than a Throw Away Greeting Card. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Customize security solutions"

1

Ul Haq, ohd Naved, Mohit Kumar Sharma, and Mohd Hyder Gouri. "CLOUD SERVICE PROVIDERS AND THE ECOSYSTEM." In EMERGING TRENDS IN CLOUD SECURITY AND INTELLIGENT AGENTS. GRF Books, 2023. http://dx.doi.org/10.52458/9788196869434.2023.eb.grf.ch-05.

Full text
Abstract:
Cloud computing is a transformational force in the dynamic world of contemporary technology, altering how people and organizations can harness the potential of digital innovation. Cloud Service Providers (CSPs), who provide a wide range of resources and services and have shaped the digital era, are at the center of this paradigm change. The crucial part CSPs play in the constantly changing cloud ecosystem is highlighted in this chapter. As the cloud revolution gathers steam, CSPs act as catalysts for digital transformation, promoting quick growth and innovation. Different cloud service deliver
APA, Harvard, Vancouver, ISO, and other styles
2

Talukder, Mohammad Badruddoza, Md Zubair Rahman, and Musfiqur Rahoman Khan. "Enhancing Guest Experience Through Smart Hotel Technologies." In Advances in Hospitality, Tourism, and the Services Industry. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-7021-6.ch011.

Full text
Abstract:
In an era of swift technological advancement, the hotel sector is constantly looking for novel approaches to improve visitor experiences. The integration of cutting-edge hotel technologies to improve visitor satisfaction and optimize operations is examined in this abstract. A variety of solutions are included in innovative hotel technology, such as AI-powered assistants, mobile apps, IoT devices, and automated systems. These technologies provide individualized experiences, effective services, and seamless interactions. Hotels may anticipate visitor preferences and customize services accordingl
APA, Harvard, Vancouver, ISO, and other styles
3

Khalid, Abdullah, Nor Azlina Abdul Rahman, and Khalida Shajaratuddur Harun. "Secure IoT based Home Automation by Identifying Vulnerabilities and Threats." In Digital Innovation Adoption: Architectural Recommendations and Security Solutions. BENTHAM SCIENCE PUBLISHERS, 2024. http://dx.doi.org/10.2174/9789815079661124010007.

Full text
Abstract:
The Internet of Things (IoT) is a mesh network of “electronic things” that are capable of acquiring data using embedded sensors and customized software or technologies, amalgamating and exchanging the information with other devices, as well as executing a customized action. This encompasses everything connected to the internet from the smallest devices such as coffee makers to sophisticated industrial control systems. As the IoT aggressively becomes interwoven in every aspect of our lives, cyber-security has become a necessity. This research aims to highlight the security vulnerabilities in Io
APA, Harvard, Vancouver, ISO, and other styles
4

Rastogi, Ruchika, and Mohammad Irfan. "Exploring Ethical and Cultural Considerations in Metaverse-Based Digital Marketing." In Unveiling Social Dynamics and Community Interaction in the Metaverse. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8628-6.ch014.

Full text
Abstract:
New opportunities for digital marketing have emerged with the emergence of the metaverse, a virtual setting where users can communicate with one another and other digital beings. This article tries to investigate the cultural and ethical issues of metaverse-based digital marketing. It is crucial to consider the ethical ramifications of these behaviours as marketers increasingly use the metaverse as a platform for connecting with and engaging with consumers. This cover concerns including consent, data security, and privacy. The massive collection of personal information in the metaverse raises
APA, Harvard, Vancouver, ISO, and other styles
5

Alvarado, Jesus, and Malka N. Halgamuge. "New Era in the Supply Chain Management With Blockchain." In Industry 4.0 and Hyper-Customized Smart Manufacturing Supply Chains. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-9078-1.ch001.

Full text
Abstract:
The results show that transparency and auditability, security and indelibility, and distribution and sustainability are the key attributes of blockchain-based solutions in 56% of the articles reviewed. These three aspects represent the foundation of blockchain technologies which may contribute positively to improve supply management processes. Moreover, immutability, tracking and tracing, and smart contracts are also included in nearly a third of the cases. Moreover, efficiencies and costs through this technology would reduce the costs in payment of intermediaries, reduce paperwork, and help i
APA, Harvard, Vancouver, ISO, and other styles
6

Parthiban, K. P., S. Muthu Vijaya Pandian, M. Muthukrishnaveni, and M. Kavibharathi. "The Internet of Things for Healthcare: uses, Particular Cases, and Difficulties." In Advanced Computing Solutions for Healthcare. BENTHAM SCIENCE PUBLISHERS, 2025. https://doi.org/10.2174/9789815274134125010011.

Full text
Abstract:
Internet of Things (IoT) integration in healthcare has completely changed patient care and administration. The revolutionary effects of IoT technology on the healthcare industry are examined in this abstract. The Internet of Things (IoT) enables real-time monitoring of patient's vital signs through the seamless connectivity of medical equipment and sensors, guaranteeing prompt intervention and customized treatment programs. Healthcare providers may obtain vital information through remote patient monitoring, which improves diagnostic precision and maximizes resource use. Furthermore, IoT-powere
APA, Harvard, Vancouver, ISO, and other styles
7

Alenazy, Wael Mohammad. "Blockchain-Enabled Internet of Things for Unsupervised Structural Health Monitoring in Potential Building Structures." In Handbook of Research on Innovations and Applications of AI, IoT, and Cognitive Technologies. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6870-5.ch011.

Full text
Abstract:
The integration of internet of things, artificial intelligence, and blockchain enabled the monitoring of structural health with unattended and automated means. Remote monitoring mandates intelligent automated decision-making capability, which is still absent in present solutions. The proposed solution in this chapter contemplates the architecture of smart sensors, customized for individual structures, to regulate the monitoring of structural health through stress, strain, and bolted joints looseness. Long range sensors are deployed for transmitting the messages a longer distance than existing
APA, Harvard, Vancouver, ISO, and other styles
8

Riemann, Ute. "Benefits and Challenges for BPM in the Cloud." In Cloud Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch091.

Full text
Abstract:
Business processes are not only variable, they are dynamic as well. A key benefit of BPM is the ability to adjust processes accordingly in response to changing market requirements. In parallel to BPM, enterprise cloud computing technology has emerged to provide a more cost effective solution to businesses and services while making use of inexpensive computing solutions, which combines pervasive, internet, and virtualization technologies (). Despite the slow start the business benefits of cloud computing are as such that the transition of BPM to the cloud is now underway. Cloud services refer t
APA, Harvard, Vancouver, ISO, and other styles
9

Jain, Neha, and Suchita Arora. "Brain-Computer Interface-Controlled Smartphone for Smart Banking Solutions." In Concepts and Applications of Brain-Computer Interfaces. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-7427-6.ch023.

Full text
Abstract:
Combining smartphone apps with brain-computer interface (BCI) technology offers an innovative way to enhance smart banking solutions. This study aims to explore the usage of brain-computer interfaces (BCIs) to operate mobile phones in banking environments, intending to improve security and user experience. Brain-computer interfaces, or BCIs, offer a more efficient and natural way to do banking tasks like processing business transactions, keeping track of accounts, and performing security checks. The reason for this is that they provide direct communication between the brain and the apparatus.
APA, Harvard, Vancouver, ISO, and other styles
10

Rehak, David, Martin Hromada, Ilias Gkotsis, et al. "Validation Strategy as a Part of the European Gas Network Protection." In Issues on Risk Analysis for Critical Infrastructure Protection [Working Title]. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.94644.

Full text
Abstract:
The European gas network currently includes approximately 200,000 km high pressure transmission and distribution pipelines. The needs and requirements of this network are focused on risk-based security asset management, impacts and cascading effects of cyber-physical attacks on interdependent and interconnected European Gas grids. The European SecureGas project tackles these issues by implementing, updating, and incrementally improving extended components, which are contextualized, customized, deployed, demonstrated and validated in three business cases, according to scenarios defined by the e
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Customize security solutions"

1

Tayyebi, Yakuta, and D. S. Bhilare. "Security solutions in Cloud through customized IDS configuration at VM level." In 2018 International Conference on Advanced Computation and Telecommunication (ICACAT). IEEE, 2018. http://dx.doi.org/10.1109/icacat.2018.8933581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yin, Jun, Sihan Li, Guorong Liu, Jie Chen, Jun Shen, and Qingyang Wang. "Customized 5G Private Network Solution of High Flexibility, Security and Controllability." In 2022 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB). IEEE, 2022. http://dx.doi.org/10.1109/bmsb55706.2022.9828641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rizkalla, Moness, and Jeff Brown. "Security for Pipeline Assets: The State of the Art." In 2002 4th International Pipeline Conference. ASMEDC, 2002. http://dx.doi.org/10.1115/ipc2002-27078.

Full text
Abstract:
The North American energy pipeline system represents a security challenge. Taking a holistic view of the problem allows the operator to construct and implement a strategy systematically. The solution involves a multi-disciplinary approach using a combination of business tools and technology to provide enhanced protection, and rapid restoration and recovery in the event of an attack. • Mapping of “high consequence” areas, including pipeline segments near population centers, water resources, or environmentally sensitive regions, will allow energy companies to more logically allocate security res
APA, Harvard, Vancouver, ISO, and other styles
4

Al-Habib, Murtadha, and Yasser Al-Ghamdi. "Integrated Cloud Computing Environment for Upstream Geoscience Workflows." In SPE Middle East Oil & Gas Show and Conference. SPE, 2021. http://dx.doi.org/10.2118/204848-ms.

Full text
Abstract:
Abstract Extensive computing resources are required to leverage todays advanced geoscience workflows that are used to explore and characterize giant petroleum resources. In these cases, high-performance workstations are often unable to adequately handle the scale of computing required. The workflows typically utilize complex and massive data sets, which require advanced computing resources to store, process, manage, and visualize various forms of the data throughout the various lifecycles. This work describes a large-scale geoscience end-to-end interpretation platform customized to run on a cl
APA, Harvard, Vancouver, ISO, and other styles
5

Dewmini, M. G. C. N., and S. Samarawickrama. "Customised packaging solutions for fragile edible cutlery: a design and development study." In Awakening the economy through design innovation. Department of Integrated Design, University of Moratuwa, Sri Lanka, 2023. http://dx.doi.org/10.31705/idr.2023.15.

Full text
Abstract:
The research delves into the nuanced world of customised packaging design, specifically tailored for fragile edible cutlery, addressing the pressing need for safe and efficient transportation of these uniquely shaped products. Defined as a crucial aspect of ensuring food preservation during transit and storage, customised packaging design revolves around developing outer and inner packaging solutions to safeguard perishable, delicate food items. Highlighting two pivotal components, the study places emphasis on the outer packaging's requirement for pressure and puncture resistance, shielding pr
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Linxi, and Di Ma. "Evaluating Network Security Configuration (NSC) Practices in Vehicle-Related Android Applications." In WCX SAE World Congress Experience. SAE International, 2024. http://dx.doi.org/10.4271/2024-01-2881.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Android applications have historically faced vulnerabilities to man-in-the-middle attacks due to insecure custom SSL/TLS certificate validation implementations. In response, Google introduced the Network Security Configuration (NSC) as a configuration-based solution to improve the security of certificate validation practices. NSC was initially developed to enhance the security of Android applications by providing developers with a framework to customize network security settings. However, recent studies have shown that i
APA, Harvard, Vancouver, ISO, and other styles
7

Blahova, Marta. "SECURING INFORMATION SYSTEMS USING FRACTAL GEOMETRY." In 22nd SGEM International Multidisciplinary Scientific GeoConference 2022. STEF92 Technology, 2022. http://dx.doi.org/10.5593/sgem2022/2.1/s07.11.

Full text
Abstract:
This article deals with the use of the principles of fractal geometry applicable in the field of cryptographic security of communication within information systems. The theory of the proposed solution is based on the field of iterative fractals created using the TEA (Time Escape Algorithm) algorithm. The introductory part deals with the issue of choosing a suitable category of fractals for the purpose of securing information systems. The next part deals with the issue of generation, analysis of fractal structures, which is a prerequisite for the implementation of the proposed encryption proces
APA, Harvard, Vancouver, ISO, and other styles
8

Talib, Noor Nazri, Subba Venkata Ramarao, Kevin McNeily, et al. "Holistic Customized Approach to Address Practical Challenges for the Large Scale Implementation of Limited Entry Liners Completions at ADNOC Onshore Fields." In Abu Dhabi International Petroleum Exhibition & Conference. SPE, 2021. http://dx.doi.org/10.2118/208020-ms.

Full text
Abstract:
Abstract Limited entry liners (LEL) implementation strategy is one of the key solutions to to improve the well productivity by maximizing the reservoir contact and matrix stimulation carbonate reservoirs. This strategy requires conducting high rate and high volume acid stimulation with high pressure pump after the installation of limted entry liner, that poses practical concerns to be addressed for adopting conventional well completions and existing resources. In addition, implementation of the LEL completion and stimulation for a large scale application within the minimum time frame and limit
APA, Harvard, Vancouver, ISO, and other styles
9

Henderson, Niklas, Helen Pallett, Sander Van Der Linden, Jake Montanarini, and Oliver Buckley. "The disPHISHinformation Game: Creating a Serious Game to Fight Phishing Using Blended Design Approaches." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004774.

Full text
Abstract:
In 2022, 39% of all UK businesses reported identifying a cyber security attack against their own organisation, 83% of which were phishing attempts. A large body of research in cyber security focuses on technical solutions, however humans remain one of the most exploitable endpoints in an organisation. Traditional security training within organisations commonly includes point-and-click exercises and simple video media that employees are required to complete. These training exercises are often seen as unengaging and tedious, and employees are commonly pushed to complete training rather than enco
APA, Harvard, Vancouver, ISO, and other styles
10

Chaturvedi, Dr Pritha, and Prof Sumit Kumar Sinha. "CUSTOMER-CENTRIC MANAGEMENT: INNOVATIONS IN THE BANKING INDUSTRY." In Transforming Knowledge: A Multidisciplinary Research on Integrative Learning Across Disciplines. The Bhopal School of Social Sciences, 2025. https://doi.org/10.51767/ic250103.

Full text
Abstract:
Customer-centric management is a vital approach in the banking industry, where customer expectations and technological advancements are constantly evolving. Effective Customer Relationship Management (CRM) systems empower banks to enhance customer engagement, streamline operations, and build long-term loyalty. This article explores innovations in CRM that have revolutionized banking services, focusing on AI-driven chatbots, predictive analytics, hyper-personalization, and omnichannel integration. AI-powered virtual assistants, such as HDFC Bank’s EVA and Bank of America’s Erica, provide 24/7 s
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!