Journal articles on the topic 'Customize security solutions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Customize security solutions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Manoj, N. "Exclusive Security Authority." Recent Trends in Information Technology and its Application 6, no. 3 (2023): 31–35. https://doi.org/10.5281/zenodo.8210556.
Full textZhou, Huaizhe, Haihe Ba, Yongjun Wang, et al. "Tenant-Oriented Monitoring for Customized Security Services in the Cloud." Symmetry 11, no. 2 (2019): 252. http://dx.doi.org/10.3390/sym11020252.
Full textKe, Yi Kuan, and Pei Hwa Huang. "Strategy for Breaker Failure by Communication Implementation." Advanced Materials Research 732-733 (August 2013): 1334–37. http://dx.doi.org/10.4028/www.scientific.net/amr.732-733.1334.
Full textDangi, Ramraj, Akshay Jadhav, Gaurav Choudhary, Nicola Dragoni, Manas Kumar Mishra, and Praveen Lalwani. "ML-Based 5G Network Slicing Security: A Comprehensive Survey." Future Internet 14, no. 4 (2022): 116. http://dx.doi.org/10.3390/fi14040116.
Full textDamodhar Reddy Ramesh Reddy Mutayalwad. "Low-code solutions: Transforming CRM customization and business agility." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 3713–24. https://doi.org/10.30574/wjarr.2025.26.1.1471.
Full textAbhishek Tangudu, Dr. Arpit Jain, and Er. Om Goel. "Effective Strategies for Managing Multi-Cloud Salesforce Solutions." Universal Research Reports 11, no. 2 (2024): 199–217. http://dx.doi.org/10.36676/urr.v11.i2.1338.
Full textPal, Shantanu, and Zahra Jadidi. "Analysis of Security Issues and Countermeasures for the Industrial Internet of Things." Applied Sciences 11, no. 20 (2021): 9393. http://dx.doi.org/10.3390/app11209393.
Full textUddin, K. M. Salah, Mohammad Rakibul Islam Bhuiyan, and Marufa Hamid. "Perception towards the Acceptance of Digital Health Services among the People of Bangladesh." WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 21 (July 12, 2024): 1557–70. http://dx.doi.org/10.37394/23207.2024.21.127.
Full textGracia, A. "The user's adoption towards chatbot technology - An exploration." i-manager's Journal on Mobile Applications and Technologies 11, no. 2 (2024): 41. https://doi.org/10.26634/jmt.11.2.21272.
Full textPahune, Saurabh, and Zahid Akhtar. "Transitioning from MLOps to LLMOps: Navigating the Unique Challenges of Large Language Models." Information 16, no. 2 (2025): 87. https://doi.org/10.3390/info16020087.
Full textBobrenok, V. V., and A. I. Guda. "Analysis of open-source tools for protecting resources in cloud environments." System technologies 1, no. 156 (2025): 32–38. https://doi.org/10.34185/1562-9945-1-156-2025-04.
Full textR T,, Vijayaraghavan. "Intelligent Travel Assistance for Bus Passengers." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem41117.
Full textKayumova, Feruza F., Elena A. Saltanaeva, and Raila I. Eshelioglu. "APPLICATION DEVELOPMENT AS A MEANS OF AUTOMATING BUSINESS PROCESSES IN PROJECT SUPPORT AND TASK ASSESSMENT." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 3/5, no. 144 (2024): 20–25. http://dx.doi.org/10.36871/ek.up.p.r.2024.03.05.003.
Full textAris, Muhammad, Mukhlis Mukhlis, Febrian Permana, Randa Fajar Saputra, Alpizar Alpizar, and Herlinda Herlinda. "Perekonomian pada Masa Khalifah Umar Bin Khattab: Kebijakan Ekonomi dalam Mengelola Baitul Mal." At-Tajdid : Journal of Islamic Studies 4, no. 2 (2024): 67. https://doi.org/10.24014/at-tajdid.v4i2.27422.
Full textClaycomb, William, and Dongwan Shin. "A User Controlled Approach for Securing Sensitive Information in Directory Services." JUCS - Journal of Universal Computer Science 15, no. (15) (2009): 2999–3018. https://doi.org/10.3217/jucs-015-15-2999.
Full textARGHIRESCU, Sebastian-Alexandru, and Gabriel PETRICĂ. "Securing Multimedia Content Using Digital Rights Management." International Journal of Information Security and Cybercrime 13, no. 2 (2024): 46–51. https://doi.org/10.19107/ijisc.2024.02.04.
Full textMittapally, Rakesh. "The secure computation application programming interface using the ARAS Method." International Journal of Cloud Computing and Supply Chain Management 1, no. 1 (2025): 1–12. https://doi.org/10.55124/ijccsm.v1i1.236.
Full textGorre, Tejasvi. "The Secure Computation Application Programming Interface Using The ARAS Method." Journal of Artificial intelligence and Machine Learning 2, no. 1 (2024): 1–12. https://doi.org/10.55124/jaim.v2i2.244.
Full textHwang, Yoonyoung, Sangwook Park, and Nina Shin. "Sustainable Development of a Mobile Payment Security Environment Using Fintech Solutions." Sustainability 13, no. 15 (2021): 8375. http://dx.doi.org/10.3390/su13158375.
Full textAlpesh, Kanubhai Patel. "Transforming Industries: The Impact and Role of Salesforce Across Sectors." Journal of Scientific and Engineering Research 6, no. 11 (2019): 333–37. https://doi.org/10.5281/zenodo.13903117.
Full textNowrozy, Raza, Khandakar Ahmed, and Hua Wang. "GPT, ontology, and CAABAC: A tripartite personalized access control model anchored by compliance, context and attribute." PLOS ONE 20, no. 1 (2025): e0310553. https://doi.org/10.1371/journal.pone.0310553.
Full textRapolu, Upesh Kumar. "Developing Custom Software Solutions for Compliance in Multi-Cloud Environments." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–7. https://doi.org/10.55041/ijsrem28015.
Full textArijit, Ukil, Jana Debasish, and De Sarkar Ajanta. "A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE." International Journal of Network Security & Its Applications (IJNSA) 5, no. 5 (2013): 11–24. https://doi.org/10.5281/zenodo.4801141.
Full textRangu, Sridhar. "Enhancing Dealer Communication in Automotive through Digital Real-time Solutions." International journal of IoT 05, no. 01 (2025): 6–33. https://doi.org/10.55640/ijiot-05-01-02.
Full textBharat Gahlot, Dr. R. Rajagopal, Vineeta Mehta, Dr. Virendra Kumar, and Dr. B. Venu Kumar, Dr. Makarand Upadhyaya. "The Convergence of IoT, Marketing, and Cybersecurity: Opportunities and Risks for Business Strategy." Economic Sciences 21, no. 2 (2025): 157–65. https://doi.org/10.69889/ptcsc058.
Full textAl-Madi, Shaker, Mohammed Al-Owais, Al-Faisal Mohamed, and Fayez Jarad. "The Impact of Using Information Technology Systems on the Development of Security Management in the Security Operations Sector at the Saudi Zakat, Tax and Customs Authority." International Journal for Scientific Research 3, no. 8 (2024): 1225–59. http://dx.doi.org/10.59992/ijsr.2024.v3n8p33.
Full textAyesha Afridi, Sumaiyah Obaid, Neha Raheel, and Farooq Azam Rathore. "Integrating Artificial Intelligence in Stroke Rehabilitation: Current Trends and Future Directions; A mini review." Journal of the Pakistan Medical Association 75, no. 02 (2025): 339–41. https://doi.org/10.47391/jpma.25-16.
Full textMutia, Farina, Eugene Ario Suradilaga, and Raymond Giovadius. "A Security Architecture for Mobile Computing-Based IoT." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7, no. 4 (2023): 782–90. http://dx.doi.org/10.29207/resti.v7i4.4950.
Full textPote, Rajshri, Niraj Shahu, Raju Sahu, Sarojkumar Sahu, Yash Kapoor, and Yash Mude. "Development of Custom-Built Network Attached Storage (NAS) System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43656.
Full textBhatt, Sujal, Gaurav Singh, Shrey Prasad, and Fariha Fariha. "AANGANCONNECT: A SMART COMMUNITY PLATFORM." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–7. https://doi.org/10.55041/ijsrem47645.
Full textSuruchi, Shah. "A REVIEW ON DATABASE SECURITY CHALLENGES IN CLOUD COMPUTING ENVIRONMENT." International Journal of Computer Engineering and Technology (IJCET) 15, no. 5 (2024): 842–52. https://doi.org/10.5281/zenodo.13922361.
Full textResearcher. "ARCHITECTURAL CONSIDERATIONS FOR MASS CUSTOMIZATION IN SAAS PRODUCTS TO MEET ORGANIZATIONAL NEEDS." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 339–48. https://doi.org/10.5281/zenodo.13236815.
Full textResearcher. "CONFIGURATION COMPLIANCE CHALLENGES: IDENTIFYING GAPS IN STANDARD BENCHMARKS AND ADDRESSING DEVIATIONS FROM ESTABLISHED GUIDELINES." International Journal of Information Security (IJIS) 1, no. 1 (2022): 6–10. https://doi.org/10.5281/zenodo.14437453.
Full textTaori, Jatin. "Mental Health and Well-Being, Assessment, and Tracking Solution among Children." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3934–37. https://doi.org/10.22214/ijraset.2025.69171.
Full textKuzminov, Aleksandr, and Aleksandra Voronina. "Model-oriented structure of projects of socio-technical systems from the standpoint of economic security." Russian Journal of Management 13, no. 2 (2025): 108–17. https://doi.org/10.29039/2500-1469-2025-13-2-108-117.
Full textBaladari, Venkata. "AI-Powered Chatbots in Banking: Developer Best Practices for Enhancing Efficiency and Security." International Journal of Advanced Research in Science, Communication and Technology (IJARSCT) 4, no. 2 (2024): 649–56. https://doi.org/10.48175/IJARSCT-15300C.
Full textPereira, Sérgio, Tiago Gomes, Jorge Cabral, and Sandro Pinto. "TREE: Bridging the gap between reconfigurable computing and secure execution." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 3 (2025): 115–38. https://doi.org/10.46586/tches.v2025.i3.115-138.
Full textThummalakunta, Praveen Blessington. "Enhancing Medical Appointment Systems: Improving Accessibility, Operational Efficiency, and Patient-Centered Outcomes." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49706.
Full textAbdulkadir, H. Buhari B. A. &. Umar A. "Evaluation of Software Design Tools on Enhancing Security Measures in Federal College of Education, Gidan Madi, Sokoto State, Nigeria." Zamfara International Journal of Education 4, no. 1 (2024): 187–98. https://doi.org/10.5281/zenodo.11474724.
Full textZia, Najam Ul, Ladislav Burita, Aydan Huseynova, and Victor Kwarteng Owusu. "A Managerial Review and Guidelines for Industry 4.0 Factories on Cybersecurity." European Conference on Cyber Warfare and Security 21, no. 1 (2022): 336–40. http://dx.doi.org/10.34190/eccws.21.1.499.
Full textGolubev, Alexandr, Peter Bogatencov, and Grigore Secrieru. "DICOM data processing optimization in medical information systems." Scalable Computing: Practice and Experience 19, no. 2 (2018): 189–201. http://dx.doi.org/10.12694/scpe.v19i2.1399.
Full textÖzger, Oğuz, and Halit Öztekİn. "Detection of Buffer Overflow Attacks with Memoization-based Rule Set." Journal of Computer Science Research 5, no. 4 (2023): 13–26. http://dx.doi.org/10.30564/jcsr.v5i4.6044.
Full textNascimento, Bruno, Rui Santos, João Henriques, Marco V. Bernardo, and Filipe Caldeira. "Availability, Scalability, and Security in the Migration from Container-Based to Cloud-Native Applications." Computers 13, no. 8 (2024): 192. http://dx.doi.org/10.3390/computers13080192.
Full textAlrashede, Hamad, Fathy Eassa, Abdullah Marish Ali, Hosam Aljihani, and Faisal Albalwy. "Enhancing east-west interface security in heterogeneous SDN via blockchain." PeerJ Computer Science 11 (May 26, 2025): e2914. https://doi.org/10.7717/peerj-cs.2914.
Full textAbosata, Nasr, Saba Al-Rubaye, and Gokhan Inalhan. "Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID." Sensors 23, no. 1 (2022): 321. http://dx.doi.org/10.3390/s23010321.
Full textKolawole Joseph Ajiboye. "The role of Low-Code/No-Code platforms in accelerating digital transformation in regulated industries." International Journal of Science and Research Archive 4, no. 1 (2021): 262–79. https://doi.org/10.30574/ijsra.2021.4.1.0159.
Full textRiza, F., Martiano Martiano, and Farid Akbar Siregar. "Implementation Of The Arnold Catmap On A Combination Of Symmetric And Asymmetric Cryptography." Sinkron 9, no. 1 (2024): 165–73. http://dx.doi.org/10.33395/sinkron.v9i1.13175.
Full textLaw, Mark, Alessandra Russo, Elisa Bertino, Krysia Broda, and Jorge Lobo. "FastLAS: Scalable Inductive Logic Programming Incorporating Domain-Specific Optimisation Criteria." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 03 (2020): 2877–85. http://dx.doi.org/10.1609/aaai.v34i03.5678.
Full textAdelusi, Bamidele Samuel, Favour Uche Ojika, and Abel Chukwuemeke Uzoka. "Advances in Cybersecurity Strategy and Cloud Infrastructure Protection for SMEs in Emerging Markets." Journal of Frontiers in Multidisciplinary Research 3, no. 1 (2022): 467–82. https://doi.org/10.54660/.jfmr.2022.3.1.467-482.
Full textGayathri, Rajakumaran, Shola Usharani, Miroslav Mahdal, et al. "Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques." Sensors 23, no. 3 (2023): 1708. http://dx.doi.org/10.3390/s23031708.
Full text