Journal articles on the topic 'Cutting edge security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cutting edge security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gunuganti, Anvesh, and Srikanth Mandru. "Securing Crypto Currency Exchanges: Implementing Cutting - Edge Security Measures for Enhanced Protection." International Journal of Science and Research (IJSR) 12, no. 1 (2023): 1273–77. https://doi.org/10.21275/sr24531140255.
Full textYogesh, Suresh Ingulkar. "Modern Spring Boot - A Cutting-Edge Framework." International Journal of Advance and Applied Research S6, no. 23 (2025): 223–25. https://doi.org/10.5281/zenodo.15195112.
Full textGu, Haikang. "Cutting-Edge Challenges in Communication Technology and Computer Network Security." Journal of Electronic Research and Application 8, no. 5 (2024): 26–31. http://dx.doi.org/10.26689/jera.v8i5.8471.
Full textSantosh, Mutnuru. "New Research Articles 2020 June Issue International Journal on Cryptography and Information Security (IJCIS)." International Journal on Cryptography and Information Security ( IJCIS) 10, no. 2 (2020): 1–7. https://doi.org/10.5281/zenodo.3925261.
Full textAnsar, Nadia, Mohammad Sadique Ansari, Mohammad Sharique, Aamina Khatoon, Md Abdul Malik, and Md Munir Siddiqui. "A Cutting-Edge Deep Learning Method for Enhancing IoT Security." International Journal of Advanced Science Computing and Engineering 6, no. 3 (2024): 98–103. https://doi.org/10.62527/ijasce.6.3.37.
Full textITOH, Akio. "Security Camp, a Human Resource Development Program for Young Cutting Edge Information Security Experts." Journal of JSEE 64, no. 3 (2016): 3_54–3_60. http://dx.doi.org/10.4307/jsee.64.3_54.
Full textALhadi, Fatima Ismail, Nagi Ali AL-Shaibany, and Sharaf Abdulhak AL-Homdyl. "Survey on Cloud Computing Security." مجلة جامعة صنعاء للعلوم التطبيقية والتكنولوجيا 2, no. 4 (2024): 381–90. http://dx.doi.org/10.59628/jast.v2i4.1025.
Full textForte, Dario V. "The role of the Information Security Manager in cutting-edge companies." Network Security 2009, no. 8 (2009): 4–5. http://dx.doi.org/10.1016/s1353-4858(09)70073-x.
Full textAli, Aitizaz, Bander Ali Saleh Al-rimy, Abdulwahab Ali Almazroi, Faisal S. Alsubaei, Abdulaleem Ali Almazroi, and Faisal Saeed. "Securing Secrets in Cyber-Physical Systems: A Cutting-Edge Privacy Approach with Consortium Blockchain." Sensors 23, no. 16 (2023): 7162. http://dx.doi.org/10.3390/s23167162.
Full textKrishna Anumula. "Enhancing Oracle Database Migration with Cutting-Edge Techniques." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1022–34. https://doi.org/10.32628/cseit25112424.
Full textSoofi, Aized Amin, Muhammad Tahir, and Naeem Raza. "Securing the Internet of Things: A Comprehensive Review of Security Challenges and Artificial Intelligence Solutions." Foundation University Journal of Engineering and Applied Sciences <br><i style="color:black;">(HEC Recognized Y Category , ISSN 2706-7351)</i> 4, no. 2 (2024): 1–20. http://dx.doi.org/10.33897/fujeas.v4i2.779.
Full textHassan Zaki, Muhammad Saad, and Muhammad Rehan Rasheed. "A Robust Machine Learning Framework for Fraudulent Mobile App Detection." VFAST Transactions on Software Engineering 12, no. 4 (2024): 27–36. https://doi.org/10.21015/vtse.v12i4.1931.
Full textKavitha Soppari, Bhanu Vangapally, Syed Sameer Sohail, and Harish Dubba. "Survey on: Voice driven email solutions for visually impaired people." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 032–36. https://doi.org/10.30574/wjarr.2025.26.1.0970.
Full textPaul, Lipin. "Dependable Safety and Cutting-Edge Security for Electric Motorcycles, Driven by Artificial Intelligence." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47537.
Full textGudhka, Drashti. "Computer Network." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 78–87. http://dx.doi.org/10.22214/ijraset.2024.57862.
Full textDevi, Odugu Rama, Julian Webber, Abolfazl Mehbodniya, et al. "The Future Development Direction of Cloud-Associated Edge-Computing Security in the Era of 5G as Edge Intelligence." Scientific Programming 2022 (October 11, 2022): 1–13. http://dx.doi.org/10.1155/2022/1473901.
Full textJin, Kai, Zhanji Niu, Jieping Liu, Jinxue Bai, and Lei Zhang. "Research on network security technology of industrial control system." MATEC Web of Conferences 355 (2022): 03067. http://dx.doi.org/10.1051/matecconf/202235503067.
Full textKundu, Subhasis. "Transforming Identity Verification: Cutting-Edge Face Recognition with AI-Powered Computer Vision." International Scientific Journal of Engineering and Management 01, no. 01 (2022): 1–7. https://doi.org/10.55041/isjem00188.
Full textEdim Bassey Edim and Akpan Itoro Udofot. "Biometric Authentication and Algorithm: A review." International Journal of Science and Research Archive 14, no. 3 (2025): 960–86. https://doi.org/10.30574/ijsra.2025.14.3.0473.
Full textT, Somasekhar. "Safeguarding Connections: Machine Learning Powered Intrusion Detection." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (2023): 1113–16. http://dx.doi.org/10.22214/ijraset.2023.56689.
Full textKrishnapatnam, Mahendra. "Cutting-Edge AI Techniques for Securing Healthcare IAM: A Novel Approach to SAML and OAuth Security." International Journal of Computing and Engineering 7, no. 2 (2025): 39–50. https://doi.org/10.47941/ijce.2630.
Full textS. Madhumitha and Ms. N. Vaishnavi. "Banking Security System Using Cyber Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1184–90. https://doi.org/10.32628/cseit25112451.
Full textDr.A.Shaji, George, and Dr.T.Baskar. "Securing the Future: A Review of Cutting-Edge Advances for Cloud and IoT Cybersecurity." Partners Universal Innovative Research Publication (PUIRP) 03, no. 02 (2025): 53–60. https://doi.org/10.5281/zenodo.15288362.
Full textKaur, Sehajpreet, and Baby Monal. "Securing the Future of Wireless Sensor Networks: Challenges, Threats, and Innovative Solutions." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (2023): 719–28. http://dx.doi.org/10.22214/ijraset.2023.56607.
Full textNonami, Kenzo. "Drone Technology, Cutting-Edge Drone Business, and Future Prospects." Journal of Robotics and Mechatronics 28, no. 3 (2016): 262–72. http://dx.doi.org/10.20965/jrm.2016.p0262.
Full textTzanetou, Panagiota. "Cutting-Edge Warfare: The Cases of Russia, China and Israel." Journal of Politics and Ethics in New Technologies and AI 1, no. 1 (2022): e31243. http://dx.doi.org/10.12681/jpentai.31243.
Full textSheikh, Abdul Manan, Md Rafiqul Islam, Mohamed Hadi Habaebi, Suriza Ahmad Zabidi, Athaur Rahman Bin Najeeb, and Adnan Kabbani. "A Survey on Edge Computing (EC) Security Challenges: Classification, Threats, and Mitigation Strategies." Future Internet 17, no. 4 (2025): 175. https://doi.org/10.3390/fi17040175.
Full textAlqura’n, Rabee, Mahmoud AlJamal, Issa AL-Aiash, et al. "Advancing XSS Detection in IoT over 5G: A Cutting-Edge Artificial Neural Network Approach." IoT 5, no. 3 (2024): 478–508. http://dx.doi.org/10.3390/iot5030022.
Full textAhlawat, Umang, Anu Naruka, Walunjkar Babasaheb Changdeo, et al. "A Review of Cutting-edge Biotechnological Solutions for Next-generation Farming." Journal of Experimental Agriculture International 46, no. 7 (2024): 1187–204. http://dx.doi.org/10.9734/jeai/2024/v46i72671.
Full textMa, Wenbo, and Zejun Ni. "An Overview of the Chinese SM9 Algorithm: A Cutting-Edge Cryptographic Breakthrough." Transactions on Computer Science and Intelligent Systems Research 5 (August 12, 2024): 21–25. http://dx.doi.org/10.62051/vqz8a719.
Full textSreenivasa, Rao Sola. "Data Integrity with Oracle ERP Cloud's Product Data Hub: A Guide to Effective Governance." International Journal of Leading Research Publication 4, no. 10 (2023): 1–14. https://doi.org/10.5281/zenodo.15259101.
Full textNair, Sreejith Sreekandan. "Enhancing the Resilience of Cloud-Based Security Solutions: Lessons from CrowdStrike Outage." International Journal for Research in Applied Science and Engineering Technology 12, no. 12 (2024): 915–26. https://doi.org/10.22214/ijraset.2024.65945.
Full textC. Anand. "Design of an Ethereum Security Analysis for Unpredictable State System - An Overview." Journal of Electrical Engineering and Automation 4, no. 3 (2022): 200–208. http://dx.doi.org/10.36548/jeea.2022.3.007.
Full textAvani Nandini. "Advancements in secure data architectures for remote patient monitoring." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 3262–74. https://doi.org/10.30574/wjarr.2025.26.1.1392.
Full textAkter, Fatema, and Sanjeev Kumar. "CRISPR-Cas9: A Cutting-edge Genome-editing Technology with Many Potential Applications." Journal of Advances in Biology & Biotechnology 27, no. 11 (2024): 59–73. http://dx.doi.org/10.9734/jabb/2024/v27i111591.
Full textMithkhal, Huda S., Ahmed H. Y. Al-Noori, and Emad Tariq Al-Shiekhly. "Enhancing Facial Identification Systems with YOLOv8: A Cutting-Edge Approach." Al-Nahrain Journal for Engineering Sciences 27, no. 3 (2024): 351–56. https://doi.org/10.29194/njes.27030351.
Full textLindberg, Brian. "Policy Series: Congressional Update." Innovation in Aging 5, Supplement_1 (2021): 349. http://dx.doi.org/10.1093/geroni/igab046.1355.
Full textDíaz-Santos, Sonia, Óscar Cigala-Álvarez, Ester Gonzalez-Sosa, Pino Caballero-Gil, and Cándido Caballero-Gil. "Driver Identification and Detection of Drowsiness while Driving." Applied Sciences 14, no. 6 (2024): 2603. http://dx.doi.org/10.3390/app14062603.
Full textResearcher. "INNOVATIONS IN HEALTHCARE DATA INTEGRATION: BALANCING SCALABILITY, COMPLIANCE, AND CYBERSECURITY." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 714–25. https://doi.org/10.5281/zenodo.14223193.
Full textSiavvas, Miltiadis, Dimitrios Tsoukalas, Ilias Kalouptsoglou, et al. "Security Monitoring during Software Development: An Industrial Case Study." Applied Sciences 13, no. 12 (2023): 6872. http://dx.doi.org/10.3390/app13126872.
Full textK S, Smrithi, and Jisha K V. "Chaos-based Cryptography for Voice Communication Security." IRO Journal on Sustainable Wireless Systems 6, no. 4 (2024): 292–308. http://dx.doi.org/10.36548/jsws.2024.4.001.
Full textCollins Omondi Ogolla. "Security in the sixth generation cellular networks: A review." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 2305–34. https://doi.org/10.30574/wjarr.2025.25.3.0634.
Full textSeth, Dhruv Kumar, Karan Kumar Ratra, Rangarajan Lakshminarayanachar, Swamy Athamakuri, and Aneeshkumar Sundareswaran. "Pattern Play: Advanced API Integration for Cutting-Edge Applications." International Journal for Research in Applied Science and Engineering Technology 12, no. 7 (2024): 1529–40. http://dx.doi.org/10.22214/ijraset.2024.63786.
Full textLadoja, Oreoluwa, CIarb, Tracey Heywood, et al. "EXAMINING THE LINK BETWEEN JUVENILE IDENTITY THEFT AND THE RISING DEMAND FOR PRIVATE SECURITY SERVICES." International Journal of Education and Social Science Research 08, no. 03 (2025): 481–86. https://doi.org/10.37500/ijessr.2025.8333.
Full textS P, Abinaya, Aanandalakshmi M, and Amy Joanna P. "Motion Activated Smart Mirror – with Real Time Alerts and Notifications." June 2024 6, no. 2 (2024): 148–62. http://dx.doi.org/10.36548/jsws.2024.2.006.
Full textXie, Xiao Zheng, Yun Ping Yao, Rong Zhen Zhao, and Wu Yin Jin. "Cutting Force Prediction of Stainless Steel in High-Speed Milling." Advanced Materials Research 538-541 (June 2012): 1369–72. http://dx.doi.org/10.4028/www.scientific.net/amr.538-541.1369.
Full textYahya Hussien, Amar. "Review on Social Media and Digital Security." Qubahan Academic Journal 2, no. 2 (2022): 1–4. http://dx.doi.org/10.48161/qaj.v2n2a119.
Full textYahya Hussien, Amar. "Review on Social Media and Digital Security." Qubahan Academic Journal 2, no. 2 (2022): 1–4. http://dx.doi.org/10.48161/qaj.v2n2a137.
Full textMatyskevic, Yurii, Zaneta Simanaviciene, Iryna Belova, Kateryna Fen, and Yevheniia Skljar. "Blockhain impact on economic security." Independent Journal of Management & Production 12, no. 3 (2021): s019—s040. http://dx.doi.org/10.14807/ijmp.v12i3.1493.
Full textD’Antonio, Patricia, and Brian Lindberg. "POLICY SERIES: GSA CONGRESSIONAL UPDATE." Innovation in Aging 7, Supplement_1 (2023): 329. http://dx.doi.org/10.1093/geroni/igad104.1095.
Full text