To see the other types of publications on this topic, follow the link: Customize security solutions.

Journal articles on the topic 'Customize security solutions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Customize security solutions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Manoj, N. "Exclusive Security Authority." Recent Trends in Information Technology and its Application 6, no. 3 (2023): 31–35. https://doi.org/10.5281/zenodo.8210556.

Full text
Abstract:
<em>Cloud component integrated conceptual approach is provided to the users with the help of the system where multiple types of collateral references can be achieved and even elaborate its security mechanisms can be implemented. The perception working is based on self-setting which will be provided in multiple categories and all types of categories can references are established in a way that recognize patient can be achieved with props for self-service digitalized and usage regulation setup. Multiple reference of the collateral integration is provided which will be identified and will the sav
APA, Harvard, Vancouver, ISO, and other styles
2

Zhou, Huaizhe, Haihe Ba, Yongjun Wang, et al. "Tenant-Oriented Monitoring for Customized Security Services in the Cloud." Symmetry 11, no. 2 (2019): 252. http://dx.doi.org/10.3390/sym11020252.

Full text
Abstract:
The dramatic proliferation of cloud computing makes it an attractive target for malicious attacks. Increasing solutions resort to virtual machine introspection (VMI) to deal with security issues in the cloud environment. However, the existing works are not feasible to support tenants to customize individual security services based on their security requirements flexibly. Additionally, adoption of VMI-based security solutions makes tenants at the risk of exposing sensitive information to attackers. To alleviate the security and privacy anxieties of tenants, we present SECLOUD, a framework for m
APA, Harvard, Vancouver, ISO, and other styles
3

Ke, Yi Kuan, and Pei Hwa Huang. "Strategy for Breaker Failure by Communication Implementation." Advanced Materials Research 732-733 (August 2013): 1334–37. http://dx.doi.org/10.4028/www.scientific.net/amr.732-733.1334.

Full text
Abstract:
This main purpose of this paper is to study the implementation of the strategy for breaker failure under the condition of communication exchange in the power system. The method of breaker failure strategy in case of IEC61850 (Communication Networks and Systems in Substations) GOOSE (Generic Object Oriented Substation Event) aims to fast transmit signal to isolate faulty positions for maintaining safety security. The current strategy for breaker failure in substations is to use hardwire solutions to implement related applications for breaker failure. For integrating protective relays in substat
APA, Harvard, Vancouver, ISO, and other styles
4

Dangi, Ramraj, Akshay Jadhav, Gaurav Choudhary, Nicola Dragoni, Manas Kumar Mishra, and Praveen Lalwani. "ML-Based 5G Network Slicing Security: A Comprehensive Survey." Future Internet 14, no. 4 (2022): 116. http://dx.doi.org/10.3390/fi14040116.

Full text
Abstract:
Fifth-generation networks efficiently support and fulfill the demands of mobile broadband and communication services. There has been a continuing advancement from 4G to 5G networks, with 5G mainly providing the three services of enhanced mobile broadband (eMBB), massive machine type communication (eMTC), and ultra-reliable low-latency services (URLLC). Since it is difficult to provide all of these services on a physical network, the 5G network is partitioned into multiple virtual networks called “slices”. These slices customize these unique services and enable the network to be reliable and fu
APA, Harvard, Vancouver, ISO, and other styles
5

Damodhar Reddy Ramesh Reddy Mutayalwad. "Low-code solutions: Transforming CRM customization and business agility." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 3713–24. https://doi.org/10.30574/wjarr.2025.26.1.1471.

Full text
Abstract:
Low-code development platforms are fundamentally transforming how organizations customize and extend their Customer Relationship Management systems, enabling unprecedented business agility while dramatically reducing technical barriers. These platforms provide visual interfaces, drag-and-drop components, and pre-built templates that enable users with minimal programming expertise to build sophisticated applications and workflows. The architectural foundation of low-code solutions incorporates visual process modeling, declarative development, abstraction layers, and metadata-driven architecture
APA, Harvard, Vancouver, ISO, and other styles
6

Abhishek Tangudu, Dr. Arpit Jain, and Er. Om Goel. "Effective Strategies for Managing Multi-Cloud Salesforce Solutions." Universal Research Reports 11, no. 2 (2024): 199–217. http://dx.doi.org/10.36676/urr.v11.i2.1338.

Full text
Abstract:
Businesses are using multi-cloud solutions to improve flexibility, scalability, and efficiency in today's dynamic environment. Salesforce, a prominent CRM platform, is crucial to many organizations' multi-cloud ecosystems. To achieve seamless integration, maximum performance, and safe operations, administering Salesforce products across numerous cloud environments requires distinct methodologies. This paper discusses best practices, essential concerns, and practical solutions for managing multi-cloud Salesforce applications. The research starts with multi-cloud advantages and difficulties. By
APA, Harvard, Vancouver, ISO, and other styles
7

Pal, Shantanu, and Zahra Jadidi. "Analysis of Security Issues and Countermeasures for the Industrial Internet of Things." Applied Sciences 11, no. 20 (2021): 9393. http://dx.doi.org/10.3390/app11209393.

Full text
Abstract:
Industrial Internet of Things (IIoT) can be seen as an extension of the Internet of Things (IoT) services and applications to industry with the inclusion of Industry 4.0 that provides automation, reliability, and control in production and manufacturing. IIoT has tremendous potential to accelerate industry automation in many areas, including transportation, manufacturing, automobile, marketing, to name a few places. When the benefits of IIoT are visible, the development of large-scale IIoT systems faces various security challenges resulting in many large-scale cyber-attacks, including fraudulen
APA, Harvard, Vancouver, ISO, and other styles
8

Uddin, K. M. Salah, Mohammad Rakibul Islam Bhuiyan, and Marufa Hamid. "Perception towards the Acceptance of Digital Health Services among the People of Bangladesh." WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 21 (July 12, 2024): 1557–70. http://dx.doi.org/10.37394/23207.2024.21.127.

Full text
Abstract:
The research intends to determine the influential factors of individual willingness to use digital health services in Bangladesh. The quantitative research method was conducted to obtain the purposes of this study. To collect primary data, a questionnaire link and direct interaction with a purposive sample of 300 people were used. The sample for this study was made up of people who use digital health services. The study discovered that six factors, totaling 24 items, influence Bangladeshis’ acceptance of digital health services. The reliability test for 24 variables and 6 determinants is relia
APA, Harvard, Vancouver, ISO, and other styles
9

Gracia, A. "The user's adoption towards chatbot technology - An exploration." i-manager's Journal on Mobile Applications and Technologies 11, no. 2 (2024): 41. https://doi.org/10.26634/jmt.11.2.21272.

Full text
Abstract:
This study investigates the integration of chatbot technology in customer service, emphasizing its impact on user experience and satisfaction. Leveraging both quantitative and qualitative research techniques, a survey was conducted with 120 respondents from Nagercoil City to evaluate the benefits, challenges, and overall effectiveness of chatbot systems. The analysis identified four key components, including the benefits of chatbot integration, enhancements in customer support services, user-friendliness, and customer satisfaction. Findings indicate that the primary purpose of chatbot usage is
APA, Harvard, Vancouver, ISO, and other styles
10

Pahune, Saurabh, and Zahid Akhtar. "Transitioning from MLOps to LLMOps: Navigating the Unique Challenges of Large Language Models." Information 16, no. 2 (2025): 87. https://doi.org/10.3390/info16020087.

Full text
Abstract:
Large Language Models (LLMs), such as the GPT series, LLaMA, and BERT, possess incredible capabilities in human-like text generation and understanding across diverse domains, which have revolutionized artificial intelligence applications. However, their operational complexity necessitates a specialized framework known as LLMOps (Large Language Model Operations), which refers to the practices and tools used to manage lifecycle processes, including model fine-tuning, deployment, and LLMs monitoring. LLMOps is a subcategory of the broader concept of MLOps (Machine Learning Operations), which is t
APA, Harvard, Vancouver, ISO, and other styles
11

Bobrenok, V. V., and A. I. Guda. "Analysis of open-source tools for protecting resources in cloud environments." System technologies 1, no. 156 (2025): 32–38. https://doi.org/10.34185/1562-9945-1-156-2025-04.

Full text
Abstract:
Cloud environments are becoming an integral part of the infrastructure of many com-panies due to their flexibility, accessibility and efficiency. However, due to their dynamic na-ture, they create new threats to data security, therefore, they require separate tools to combat them. The article compares existing open source tools for protecting cloud environments: Checkov, Falco, Keycloak. According to the article, the main benefits of open source software are: price, stability and community support. For each of the tools some flaws are found which make these tools vulnerable to mali-cious actor
APA, Harvard, Vancouver, ISO, and other styles
12

R T,, Vijayaraghavan. "Intelligent Travel Assistance for Bus Passengers." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem41117.

Full text
Abstract:
The 'Intelligent Travel Assistance for Bus Passengers' introduces an innovative approach by integrating AI capabilities to enhance the notification system as passengers enter a predefined geo-fence. Geo-fence is a virtual border which is defined by GPS, which the user’s destination is at the center point. Users can have the flexibility to customize the notification range, determining how far in advance they receive alerts. This system employs Geo-Fencing and GPS technologies, accessible through the passenger's mobile phone location. The application, developed in Java and utilizing the Google M
APA, Harvard, Vancouver, ISO, and other styles
13

Kayumova, Feruza F., Elena A. Saltanaeva, and Raila I. Eshelioglu. "APPLICATION DEVELOPMENT AS A MEANS OF AUTOMATING BUSINESS PROCESSES IN PROJECT SUPPORT AND TASK ASSESSMENT." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 3/5, no. 144 (2024): 20–25. http://dx.doi.org/10.36871/ek.up.p.r.2024.03.05.003.

Full text
Abstract:
The article discusses the issue of project support and task assessment. Particular attention is paid to the data collection process, the main purpose of which is to collect information-rich data. An important part of this process is understanding the type and sources of data required. The problems of fragmentation of data sources and their inconsistency have been identified. The need to conduct an assessment of the project and tasks is also described. Taken together, this will allow you to avoid risks in terms of budget, project timing and product quality. Project performance assessment is car
APA, Harvard, Vancouver, ISO, and other styles
14

Aris, Muhammad, Mukhlis Mukhlis, Febrian Permana, Randa Fajar Saputra, Alpizar Alpizar, and Herlinda Herlinda. "Perekonomian pada Masa Khalifah Umar Bin Khattab: Kebijakan Ekonomi dalam Mengelola Baitul Mal." At-Tajdid : Journal of Islamic Studies 4, no. 2 (2024): 67. https://doi.org/10.24014/at-tajdid.v4i2.27422.

Full text
Abstract:
The aim of writing this article is to find out and explain the economic policy during the time of Caliph Umar bin Khattab which can be used as a reference for alternative solutions to economic problems in Indonesia. The method used is library research by collecting data regarding the economic policies of Caliph Umar bin Khattab through data searches from the internet and print, in the form of articles and books. The results of the research are; the increase and rapid development of the people's economy during the time of Caliph Umar bin Khattab as it was, 1. Military Service Organisation. This
APA, Harvard, Vancouver, ISO, and other styles
15

Claycomb, William, and Dongwan Shin. "A User Controlled Approach for Securing Sensitive Information in Directory Services." JUCS - Journal of Universal Computer Science 15, no. (15) (2009): 2999–3018. https://doi.org/10.3217/jucs-015-15-2999.

Full text
Abstract:
Enterprise directory services are commonly used in enterprise systems to store object information relating to employees, computers, contacts, etc. These stores can act as information providers or sources for authentication and access control decisions, and could potentially contain sensitive information. An insider attack, particularly if carried out using administrative privileges, could compromise large amounts of directory information. We present two solutions for protecting directory services information from insider attacks. The first is a centralized approach utilizing a customized virtu
APA, Harvard, Vancouver, ISO, and other styles
16

ARGHIRESCU, Sebastian-Alexandru, and Gabriel PETRICĂ. "Securing Multimedia Content Using Digital Rights Management." International Journal of Information Security and Cybercrime 13, no. 2 (2024): 46–51. https://doi.org/10.19107/ijisc.2024.02.04.

Full text
Abstract:
Information stored or transmitted in digital format is the essential element that makes today's society function and evolve. Information security has always been a priority for producers and holders of information, even in analog format. Today, there are several technical solutions for encrypting digital information. This paper reviews these solutions and emphasizes the use of Digital Rights Management (DRM) to restrict access to multimedia files or digital services with customized access.
APA, Harvard, Vancouver, ISO, and other styles
17

Mittapally, Rakesh. "The secure computation application programming interface using the ARAS Method." International Journal of Cloud Computing and Supply Chain Management 1, no. 1 (2025): 1–12. https://doi.org/10.55124/ijccsm.v1i1.236.

Full text
Abstract:
An Application Programming Interface (API) entails guidelines, Principles and an array of utilities, it stands as distinct software Applications interacting with one another communication enables A service tailored for developers, of the library or website Intrinsic operations without the need for comprehension in connection with that correspondence Approaches that can be employed and structures of data APIs establish.service or platform. Abstraction Layer: An API acts as an abstraction layer that separates the implementation details of a software component from its usage. It provides a standa
APA, Harvard, Vancouver, ISO, and other styles
18

Gorre, Tejasvi. "The Secure Computation Application Programming Interface Using The ARAS Method." Journal of Artificial intelligence and Machine Learning 2, no. 1 (2024): 1–12. https://doi.org/10.55124/jaim.v2i2.244.

Full text
Abstract:
An Application Programming Interface (API) entails guidelines, Principles and an array of utilities, it stands as distinct software Applications interacting with one another communication enables A service tailored for developers, of the library or website Intrinsic operations without the need for comprehension in connection with that correspondence Approaches that can be employed and structures of data APIs establish.service or platform. Abstraction Layer: An API acts as an abstraction layer that separates the implementation details of a software component from its usage. It provides a standa
APA, Harvard, Vancouver, ISO, and other styles
19

Hwang, Yoonyoung, Sangwook Park, and Nina Shin. "Sustainable Development of a Mobile Payment Security Environment Using Fintech Solutions." Sustainability 13, no. 15 (2021): 8375. http://dx.doi.org/10.3390/su13158375.

Full text
Abstract:
Financial technology (fintech) services have come to differentiate themselves from traditional financial services by offering unique, niche, and customized services. Mobile payment service (MPS) has emerged as the most crucial fintech service. While many studies have addressed the essential role of security when service providers and users choose to engage in financial transactions, the relationship between users distinct perceptions of security and MPS success determinants are yet to be examined. Thus, this study primarily aims to uncover the distinctive roles of platform and technology secur
APA, Harvard, Vancouver, ISO, and other styles
20

Alpesh, Kanubhai Patel. "Transforming Industries: The Impact and Role of Salesforce Across Sectors." Journal of Scientific and Engineering Research 6, no. 11 (2019): 333–37. https://doi.org/10.5281/zenodo.13903117.

Full text
Abstract:
In today's rapidly evolving business landscape, companies across various industries face unique challenges that demand customized solutions. Salesforce, a leading customer relationship management (CRM) platform, stands out for its ability to provide industry-specific solutions through its customizable features. This article explores how Salesforce is transforming sectors such as healthcare, financial services, retail, and consumer goods by offering tailored tools that enhance customer experiences, improve operational efficiency, and ensure compliance with regulatory standards. The discussion h
APA, Harvard, Vancouver, ISO, and other styles
21

Nowrozy, Raza, Khandakar Ahmed, and Hua Wang. "GPT, ontology, and CAABAC: A tripartite personalized access control model anchored by compliance, context and attribute." PLOS ONE 20, no. 1 (2025): e0310553. https://doi.org/10.1371/journal.pone.0310553.

Full text
Abstract:
As digital healthcare evolves, the security of electronic health records (EHR) becomes increasingly crucial. This study presents the GPT-Onto-CAABAC framework, integrating Generative Pretrained Transformer (GPT), medical-legal ontologies and Context-Aware Attribute-Based Access Control (CAABAC) to enhance EHR access security. Unlike traditional models, GPT-Onto-CAABAC dynamically interprets policies and adapts to changing healthcare and legal environments, offering customized access control solutions. Through empirical evaluation, this framework is shown to be effective in improving EHR securi
APA, Harvard, Vancouver, ISO, and other styles
22

Rapolu, Upesh Kumar. "Developing Custom Software Solutions for Compliance in Multi-Cloud Environments." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–7. https://doi.org/10.55041/ijsrem28015.

Full text
Abstract:
The transition to utilizing different cloud platforms has provided enterprises with unprecedented flexibility and scalability. Nevertheless, it also presents new obstacles for fulfilling compliance obligations and executing audits. Organizations must navigate various regulations, safeguard data across jurisdictions, and rectify vulnerabilities prevalent in cloud systems. Although technologies such as AWS Audit Manager, Microsoft Compliance Manager, and Google Cloud Security Command Center are beneficial, they frequently lack interoperability across various cloud platforms. This study examines
APA, Harvard, Vancouver, ISO, and other styles
23

Arijit, Ukil, Jana Debasish, and De Sarkar Ajanta. "A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE." International Journal of Network Security & Its Applications (IJNSA) 5, no. 5 (2013): 11–24. https://doi.org/10.5281/zenodo.4801141.

Full text
Abstract:
In a typical cloud computing diverse facilitating components like hardware, software, firmware, networking, and services integrate to offer different computational facilities, while Internet or a private network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud system delimit the benefits of cloud computing like &ldquo;on-demand, customized resource availability and performance management&rdquo;. It is understood that current IT and enterprise security solutions are not adequate to address the cloud security issues. This paper explores the challen
APA, Harvard, Vancouver, ISO, and other styles
24

Rangu, Sridhar. "Enhancing Dealer Communication in Automotive through Digital Real-time Solutions." International journal of IoT 05, no. 01 (2025): 6–33. https://doi.org/10.55640/ijiot-05-01-02.

Full text
Abstract:
The contact the dealer faces has been transformed digitally in the automotive industry. Traditional communication methods, such as manual processes, phone calls, and emails, are becoming less and less satisfactory in meeting today’s demands of speed and accuracy for their customers. Artificial intelligence (AI) and cloud-based technologies enforce real-time digital communication solutions, which are helping to bridge the communication gap between automotive manufacturers and the customers / deal room. These advancements enable real-time information such as inventory, pricing, promotions, opera
APA, Harvard, Vancouver, ISO, and other styles
25

Bharat Gahlot, Dr. R. Rajagopal, Vineeta Mehta, Dr. Virendra Kumar, and Dr. B. Venu Kumar, Dr. Makarand Upadhyaya. "The Convergence of IoT, Marketing, and Cybersecurity: Opportunities and Risks for Business Strategy." Economic Sciences 21, no. 2 (2025): 157–65. https://doi.org/10.69889/ptcsc058.

Full text
Abstract:
The intersection of the Internet of Things (IoT), marketing, and cyber security presents unparalleled prospects for evolving business models while simultaneously presenting new threats. This paper presents empirical research on how cyber security influencesIoT, builds digital trust, and powers new, sophisticated marketing solutions while focusing on the economic and operational consequences. By applying quantitative analysis and also the CIA triad and Digital Trust Model to the four domains of data confidentiality, integrity, availability, and accountability across sectors such as healthcare,
APA, Harvard, Vancouver, ISO, and other styles
26

Al-Madi, Shaker, Mohammed Al-Owais, Al-Faisal Mohamed, and Fayez Jarad. "The Impact of Using Information Technology Systems on the Development of Security Management in the Security Operations Sector at the Saudi Zakat, Tax and Customs Authority." International Journal for Scientific Research 3, no. 8 (2024): 1225–59. http://dx.doi.org/10.59992/ijsr.2024.v3n8p33.

Full text
Abstract:
Information technology systems can be used to improve decisions by analyzing big data and providing results that help in making smarter and more effective decisions. This can lead to more innovative and effective solutions to problems and improve the ability to predict future challenges and opportunities. Information technology systems can help improve efficiency and productivity by providing the ability to analyze and direct data and information in more effective and faster ways. Information technology systems can be used to improve operations and improve the overall performance of institutio
APA, Harvard, Vancouver, ISO, and other styles
27

Ayesha Afridi, Sumaiyah Obaid, Neha Raheel, and Farooq Azam Rathore. "Integrating Artificial Intelligence in Stroke Rehabilitation: Current Trends and Future Directions; A mini review." Journal of the Pakistan Medical Association 75, no. 02 (2025): 339–41. https://doi.org/10.47391/jpma.25-16.

Full text
Abstract:
Rehabilitation following a stroke faces challenges inoffering customized treatment and attaining the bestpossible outcomes. The utilization of artificial intelligence(AI) presents transformative solutions that have thepotential to revolutionize existing practices. This minireviewdiscusses the use of AI in rehabilitation afterstroke, in form of customized intervention, task-specifictraining with robotics, real time monitoring by wearabledevices and remote monitoring through telerehabilitation. Despite the recent advances, issues such asalgorithm bias, concerns about data security, and accessdis
APA, Harvard, Vancouver, ISO, and other styles
28

Mutia, Farina, Eugene Ario Suradilaga, and Raymond Giovadius. "A Security Architecture for Mobile Computing-Based IoT." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7, no. 4 (2023): 782–90. http://dx.doi.org/10.29207/resti.v7i4.4950.

Full text
Abstract:
The Internet of Things (IoT) is a complex technology with various applications that have become a vital part of our everyday life. The amount of Internet of Things and linked devices continues to rise. In terms of bandwidth, service availability, security controls, cyber-attacks and privacy problems, transporting the huge data created by these IoT devices to the cloud offers concern and challenges comprising of intermittent connection, service unavailability, data loss at rest, in use and in motion, unhardened device and server, unpatched device and server and exploitation vulnerabilities. Mob
APA, Harvard, Vancouver, ISO, and other styles
29

Pote, Rajshri, Niraj Shahu, Raju Sahu, Sarojkumar Sahu, Yash Kapoor, and Yash Mude. "Development of Custom-Built Network Attached Storage (NAS) System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43656.

Full text
Abstract:
With the rapid expansion of digital data, the need for efficient, secure, and cost-effective storage solutions has increased significantly. Network-Attached Storage (NAS) systems have emerged as a viable alternative to cloud-based storage, offering users full control over their data while ensuring high-speed local access. However, traditional NAS systems face several challenges, including security vulnerabilities, high costs, and complex configurations. This research presents a customized NAS solution that integrates remote access, automated backup, lightweight web hosting, and real-time syste
APA, Harvard, Vancouver, ISO, and other styles
30

Bhatt, Sujal, Gaurav Singh, Shrey Prasad, and Fariha Fariha. "AANGANCONNECT: A SMART COMMUNITY PLATFORM." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–7. https://doi.org/10.55041/ijsrem47645.

Full text
Abstract:
Modern residential communities face significant challenges in efficient management and resident engagement. Many residents find it difficult to handle maintenance requests, community events, security concerns, and neighbour communications without dedicating substantial time and effort. Our project addresses these challenges through a Smart Community Platform designed to simplify community living by personalizing the residential experience. The system analyzes user preferences and needs to deliver customized solutions and recommendations that enhance community interaction and satisfaction [1].
APA, Harvard, Vancouver, ISO, and other styles
31

Suruchi, Shah. "A REVIEW ON DATABASE SECURITY CHALLENGES IN CLOUD COMPUTING ENVIRONMENT." International Journal of Computer Engineering and Technology (IJCET) 15, no. 5 (2024): 842–52. https://doi.org/10.5281/zenodo.13922361.

Full text
Abstract:
Cloud computing is a system that offers many resources that may be customized, allowing for decentralized data management and storage. Cloud technologies have revolutionized concepts of data storage and access in organizations thus offering organizations flexible and efficient solutions. Cloud services such as DBaaS allows user to utilize sophisticated capabilities of databases without the responsibility of conventional databases. But with cloud computing, there is a great concern of security since issues such as data privacy, access control and compliance to regulatory requirements are paramo
APA, Harvard, Vancouver, ISO, and other styles
32

Researcher. "ARCHITECTURAL CONSIDERATIONS FOR MASS CUSTOMIZATION IN SAAS PRODUCTS TO MEET ORGANIZATIONAL NEEDS." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 339–48. https://doi.org/10.5281/zenodo.13236815.

Full text
Abstract:
This article explores the architectural considerations and implementation strategies for enabling mass customization in Software as a Service (SaaS) products. As organizations increasingly demand tailored software solutions, SaaS providers face the challenge of balancing standardized service delivery with customization needs. The study outlines key architectural components, including modular design, scalable infrastructure, integration capabilities, and security measures. It also delves into implementation strategies such as configuration management, extensibility frameworks, dynamic UI compos
APA, Harvard, Vancouver, ISO, and other styles
33

Researcher. "CONFIGURATION COMPLIANCE CHALLENGES: IDENTIFYING GAPS IN STANDARD BENCHMARKS AND ADDRESSING DEVIATIONS FROM ESTABLISHED GUIDELINES." International Journal of Information Security (IJIS) 1, no. 1 (2022): 6–10. https://doi.org/10.5281/zenodo.14437453.

Full text
Abstract:
Ensuring configuration compliance is fundamental for maintaining a secure and resilient IT infrastructure. Despite adopting various industry benchmarks and regulatory standards, many organizations struggle to meet configuration compliance requirements fully, particularly in dynamic, hybrid IT environments. This paper identifies critical gaps within existing configuration benchmarks, explores causes of deviations, and introduces a novel Adaptive Compliance Framework (ACF) to enhance compliance practices. The ACF emphasizes customized, risk-based solutions and continuous, automated monitoring st
APA, Harvard, Vancouver, ISO, and other styles
34

Taori, Jatin. "Mental Health and Well-Being, Assessment, and Tracking Solution among Children." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3934–37. https://doi.org/10.22214/ijraset.2025.69171.

Full text
Abstract:
Our study addresses the increasingly digitized world that children experience, often amidst numerous emotional stressors. Our AI model begins by asking users to log in or register with the platform, ensuring privacy and security. It requests children to answer identity questions while their camera is on. This approach captures facial expressions and body language, ensuring sensitive perceptivity. Machine learning algorithms process video feeds to detect potential mental illness and provide customized interventions and activities for psychological well-being. These activities are fun, creative,
APA, Harvard, Vancouver, ISO, and other styles
35

Kuzminov, Aleksandr, and Aleksandra Voronina. "Model-oriented structure of projects of socio-technical systems from the standpoint of economic security." Russian Journal of Management 13, no. 2 (2025): 108–17. https://doi.org/10.29039/2500-1469-2025-13-2-108-117.

Full text
Abstract:
Designing sustainable economic systems is essential for solving various problems of the modern economy and suggests that in order to maximize the impact of sustainable solutions, it is necessary to effectively integrate people, machinery and technology. There are no methods for conceptually constructing such (eco) systems that integrate the listed elements and evaluate their safety before implementation. In this article, this gap is eliminated by proposing the Intellectual sociotechnical Cenosis (ISTC) framework, which contributes to the design representation of such systems by using the Model
APA, Harvard, Vancouver, ISO, and other styles
36

Baladari, Venkata. "AI-Powered Chatbots in Banking: Developer Best Practices for Enhancing Efficiency and Security." International Journal of Advanced Research in Science, Communication and Technology (IJARSCT) 4, no. 2 (2024): 649–56. https://doi.org/10.48175/IJARSCT-15300C.

Full text
Abstract:
Chatbots powered by AI technology are revolutionizing banking by enhancing customer support, streamlining processes, and increasing digital security measures. These chatbots employ artificial intelligence, natural language processing, and machine learning techniques to offer rapid assistance, execute transactions, and deliver customized financial guidance. Banks can achieve cost reductions, enhanced efficiency, and more effective fraud detection with their assistance. This study examines the primary technologies driving banking chatbots, encompassing AI, blockchain, and predictive analytics. T
APA, Harvard, Vancouver, ISO, and other styles
37

Pereira, Sérgio, Tiago Gomes, Jorge Cabral, and Sandro Pinto. "TREE: Bridging the gap between reconfigurable computing and secure execution." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 3 (2025): 115–38. https://doi.org/10.46586/tches.v2025.i3.115-138.

Full text
Abstract:
Trusted Execution Environments (TEEs) have become a pivotal technology for securing a wide spectrum of security-sensitive applications. With modern computing systems shifting to heterogeneous architectures, integrating TEE support into these systems is paramount. One promising line of research has proposed leveraging FPGA technology to provide promising TEE solutions. Despite their potential, current implementations of FPGA-based TEEs have a set of drawbacks. Some solutions (i.e., MeetGo and ShEF) prioritize the secure loading of reconfigurable modules but lack compatibility with established l
APA, Harvard, Vancouver, ISO, and other styles
38

Thummalakunta, Praveen Blessington. "Enhancing Medical Appointment Systems: Improving Accessibility, Operational Efficiency, and Patient-Centered Outcomes." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49706.

Full text
Abstract:
Abstract - Reducing patient wait times and increasing healthcare accessibility depend on effective medical scheduling. Issues with traditional systems include frequent cancellations, rescheduling, and limited doctor availability. Furthermore, seamless patient care is hampered by the lack of integration between important healthcare services, such as medical stores, AI-driven diagnostics, ambulance dispatch, blood donation tracking, and customized wellness plans. With an emphasis on using Flutter and Firebase to improve productivity, security, and patient engagement, this study examines AI-drive
APA, Harvard, Vancouver, ISO, and other styles
39

Abdulkadir, H. Buhari B. A. &. Umar A. "Evaluation of Software Design Tools on Enhancing Security Measures in Federal College of Education, Gidan Madi, Sokoto State, Nigeria." Zamfara International Journal of Education 4, no. 1 (2024): 187–98. https://doi.org/10.5281/zenodo.11474724.

Full text
Abstract:
Concern over security measures has grown in recent years as a result of tertiary institutions' rising reliance on technology. Academic institutions, especially universities and colleges of education, manage and retain a large volume of sensitive data, including student and faculty members' personal information and academic records.&nbsp;&nbsp; As a result, there is very little standardization in the administration and execution of security measures. Because of this variation, developing customized solutions necessitates an understanding of the unique security requirements of various organizati
APA, Harvard, Vancouver, ISO, and other styles
40

Zia, Najam Ul, Ladislav Burita, Aydan Huseynova, and Victor Kwarteng Owusu. "A Managerial Review and Guidelines for Industry 4.0 Factories on Cybersecurity." European Conference on Cyber Warfare and Security 21, no. 1 (2022): 336–40. http://dx.doi.org/10.34190/eccws.21.1.499.

Full text
Abstract:
The Fourth Industrial Revolution (Industry 4.0) has created a rebellion in traditional factories by introducing the Internet of Things (IoT) and Cyber-Physical Systems (CPS). This revolution has caused increased automation and customized production, which has occurred through a synergy between customer demands, stocks, and supply chains. This synergy has also exposed factories to potential cyber-attack threats. Although there is extensive literature available on the topic of cyber security, however, business owners still assume cyber security as business preservation. This study sheds light on
APA, Harvard, Vancouver, ISO, and other styles
41

Golubev, Alexandr, Peter Bogatencov, and Grigore Secrieru. "DICOM data processing optimization in medical information systems." Scalable Computing: Practice and Experience 19, no. 2 (2018): 189–201. http://dx.doi.org/10.12694/scpe.v19i2.1399.

Full text
Abstract:
The problem of storage and visualization of medical images collected by various medical equipment is actual for latest 10 years for every medical institution. On the other hand, access to the medical investigation datasets and solving the problem of personal patient data security is important for scientific community and institutions that require this data. "DICOM Network" project was developed for solving these problems for different actors in the system based on the various customized roles. This article describes the problems and possible solutions for optimization of medical images storing
APA, Harvard, Vancouver, ISO, and other styles
42

Özger, Oğuz, and Halit Öztekİn. "Detection of Buffer Overflow Attacks with Memoization-based Rule Set." Journal of Computer Science Research 5, no. 4 (2023): 13–26. http://dx.doi.org/10.30564/jcsr.v5i4.6044.

Full text
Abstract:
Different abnormalities are commonly encountered in computer network systems. These types of abnormalities can lead to critical data losses or unauthorized access in the systems. Buffer overflow anomaly is a prominent issue among these abnormalities, posing a serious threat to network security. The primary objective of this study is to identify the potential risks of buffer overflow that can be caused by functions frequently used in the PHP programming language and to provide solutions to minimize these risks. Static code analyzers are used to detect security vulnerabilities, among which Sonar
APA, Harvard, Vancouver, ISO, and other styles
43

Nascimento, Bruno, Rui Santos, João Henriques, Marco V. Bernardo, and Filipe Caldeira. "Availability, Scalability, and Security in the Migration from Container-Based to Cloud-Native Applications." Computers 13, no. 8 (2024): 192. http://dx.doi.org/10.3390/computers13080192.

Full text
Abstract:
The shift from traditional monolithic architectures to container-based solutions has revolutionized application deployment by enabling consistent, isolated environments across various platforms. However, as organizations look for improved efficiency, resilience, security, and scalability, the limitations of container-based applications, such as their manual scaling, resource management challenges, potential single points of failure, and operational complexities, become apparent. These challenges, coupled with the need for sophisticated tools and expertise for monitoring and security, drive the
APA, Harvard, Vancouver, ISO, and other styles
44

Alrashede, Hamad, Fathy Eassa, Abdullah Marish Ali, Hosam Aljihani, and Faisal Albalwy. "Enhancing east-west interface security in heterogeneous SDN via blockchain." PeerJ Computer Science 11 (May 26, 2025): e2914. https://doi.org/10.7717/peerj-cs.2914.

Full text
Abstract:
Software defined networking (SDN) increasingly integrates multiple controllers from diverse vendors to enhance network scalability, flexibility, and reliability. However, such heterogeneous deployments pose significant security threats, especially at the east-west interface which is connecting these controllers. Existing solutions are inadequate for ensuring robust protection across multi-vendor SDN environments as most of them are meant to a specific type of attacks, use centralized solution, or designed for homogeneous SDN environments. This study proposes a blockchain-based security framewo
APA, Harvard, Vancouver, ISO, and other styles
45

Abosata, Nasr, Saba Al-Rubaye, and Gokhan Inalhan. "Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID." Sensors 23, no. 1 (2022): 321. http://dx.doi.org/10.3390/s23010321.

Full text
Abstract:
Technological breakthroughs in the Internet of Things (IoT) easily promote smart lives for humans by connecting everything through the Internet. The de facto standardised IoT routing strategy is the routing protocol for low-power and lossy networks (RPL), which is applied in various heterogeneous IoT applications. Hence, the increase in reliance on the IoT requires focus on the security of the RPL protocol. The top defence layer is an intrusion detection system (IDS), and the heterogeneous characteristics of the IoT and variety of novel intrusions make the design of the RPL IDS significantly c
APA, Harvard, Vancouver, ISO, and other styles
46

Kolawole Joseph Ajiboye. "The role of Low-Code/No-Code platforms in accelerating digital transformation in regulated industries." International Journal of Science and Research Archive 4, no. 1 (2021): 262–79. https://doi.org/10.30574/ijsra.2021.4.1.0159.

Full text
Abstract:
The modern digital age transforms regulated business operations and supports operational efficiency while promoting innovation together with regulatory compliance. The quick changes in regulatory environments pose challenges to traditional development methods because they fail to maintain proper speed. To speed up transformation processes low-code/no-code (LCNC) platforms offer organizations tools that help them create applications without significant coding requirements. The technology enables business personnel to gain control while providing workflow improvement together with less dependenc
APA, Harvard, Vancouver, ISO, and other styles
47

Riza, F., Martiano Martiano, and Farid Akbar Siregar. "Implementation Of The Arnold Catmap On A Combination Of Symmetric And Asymmetric Cryptography." Sinkron 9, no. 1 (2024): 165–73. http://dx.doi.org/10.33395/sinkron.v9i1.13175.

Full text
Abstract:
The escalating need for robust data security has propelled cyber security practitioners into a perpetual quest for innovative solutions. This endeavor involves the strategic amalgamation of cryptographic algorithms with meticulously customized alterations to specific algorithmic processes. In this pursuit of heightened data protection, the Arnold Cat Map emerges as a pivotal tool, a mathematical transformation that gracefully elucidates the intricate movement of points within a two-dimensional plane. This movement occurs in a systematic and repetitive manner, rendering it an indispensable asse
APA, Harvard, Vancouver, ISO, and other styles
48

Law, Mark, Alessandra Russo, Elisa Bertino, Krysia Broda, and Jorge Lobo. "FastLAS: Scalable Inductive Logic Programming Incorporating Domain-Specific Optimisation Criteria." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 03 (2020): 2877–85. http://dx.doi.org/10.1609/aaai.v34i03.5678.

Full text
Abstract:
Inductive Logic Programming (ILP) systems aim to find a set of logical rules, called a hypothesis, that explain a set of examples. In cases where many such hypotheses exist, ILP systems often bias towards shorter solutions, leading to highly general rules being learned. In some application domains like security and access control policies, this bias may not be desirable, as when data is sparse more specific rules that guarantee tighter security should be preferred. This paper presents a new general notion of a scoring function over hypotheses that allows a user to express domain-specific optim
APA, Harvard, Vancouver, ISO, and other styles
49

Adelusi, Bamidele Samuel, Favour Uche Ojika, and Abel Chukwuemeke Uzoka. "Advances in Cybersecurity Strategy and Cloud Infrastructure Protection for SMEs in Emerging Markets." Journal of Frontiers in Multidisciplinary Research 3, no. 1 (2022): 467–82. https://doi.org/10.54660/.jfmr.2022.3.1.467-482.

Full text
Abstract:
The increasing reliance on digital platforms by small and medium-sized enterprises (SMEs) in emerging markets has significantly elevated cybersecurity risks, necessitating the development of advanced and adaptable protection strategies. This paper explores recent advances in cybersecurity strategy and cloud infrastructure protection specifically tailored for SMEs operating in resource-constrained and rapidly evolving environments. SMEs in emerging markets face unique challenges, including limited access to sophisticated security technologies, skills shortages, and growing vulnerability to cybe
APA, Harvard, Vancouver, ISO, and other styles
50

Gayathri, Rajakumaran, Shola Usharani, Miroslav Mahdal, et al. "Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques." Sensors 23, no. 3 (2023): 1708. http://dx.doi.org/10.3390/s23031708.

Full text
Abstract:
This paper proposes a solution for ensuring the security of IoT devices in the cloud environment by protecting against distributed denial-of-service (DDoS) and false data injection attacks. The proposed solution is based on the integration of simple network management protocol (SNMP), Kullback–Leibler distance (KLD), access control rules (ACL), and moving target defense (MTD) techniques. The SNMP and KLD techniques are used to detect DDoS and false data sharing attacks, while the ACL and MTD techniques are applied to mitigate these attacks by hardening the target and reducing the attack surfac
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!