To see the other types of publications on this topic, follow the link: Cutting edge security.

Journal articles on the topic 'Cutting edge security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cutting edge security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Gunuganti, Anvesh, and Srikanth Mandru. "Securing Crypto Currency Exchanges: Implementing Cutting - Edge Security Measures for Enhanced Protection." International Journal of Science and Research (IJSR) 12, no. 1 (2023): 1273–77. https://doi.org/10.21275/sr24531140255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yogesh, Suresh Ingulkar. "Modern Spring Boot - A Cutting-Edge Framework." International Journal of Advance and Applied Research S6, no. 23 (2025): 223–25. https://doi.org/10.5281/zenodo.15195112.

Full text
Abstract:
<em>Spring Boot is a powerful framework that simplifies Java application development, offering pre-configured settings, minimal boilerplate code, and seamless integration with cloud and microservices architectures. It investigates the role of Spring Boot in modern software development, focusing on its ease of use, performance enhancements, and security measures. Additionally, it discusses the advantages and challenges of adopting Spring Boot in business apps. The study aims to provide insights into how Spring Boot accelerates development and ensures scalability in cloud-native environments. Th
APA, Harvard, Vancouver, ISO, and other styles
3

Gu, Haikang. "Cutting-Edge Challenges in Communication Technology and Computer Network Security." Journal of Electronic Research and Application 8, no. 5 (2024): 26–31. http://dx.doi.org/10.26689/jera.v8i5.8471.

Full text
Abstract:
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life, but it also increases the security problem. Information security has become one of the severe challenges faced by people in the digital age. Currently, the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology, the risk of large-scale data transmission, the potential vulnerabilities introduced by emerging technology, and the dilemma of user identity verification. This paper a
APA, Harvard, Vancouver, ISO, and other styles
4

Santosh, Mutnuru. "New Research Articles 2020 June Issue International Journal on Cryptography and Information Security (IJCIS)." International Journal on Cryptography and Information Security ( IJCIS) 10, no. 2 (2020): 1–7. https://doi.org/10.5281/zenodo.3925261.

Full text
Abstract:
<strong>International Journal on Cryptography and Information Security ( IJCIS)</strong>&nbsp;is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.
APA, Harvard, Vancouver, ISO, and other styles
5

Ansar, Nadia, Mohammad Sadique Ansari, Mohammad Sharique, Aamina Khatoon, Md Abdul Malik, and Md Munir Siddiqui. "A Cutting-Edge Deep Learning Method for Enhancing IoT Security." International Journal of Advanced Science Computing and Engineering 6, no. 3 (2024): 98–103. https://doi.org/10.62527/ijasce.6.3.37.

Full text
Abstract:
There have been significant issues given the IoT, with heterogeneity of billions of devices and with a large amount of data. This paper proposed an innovative design of the Internet of Things (IoT) Environment Intrusion Detection System (or IDS) using Deep Learning-integrated Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks. Our model, based on the CICIDS2017 dataset, achieved an accuracy of 99.52% in classifying network traffic as either benign or malicious. The real-time processing capability, scalability, and low false alarm rate in our model surpass some tradi
APA, Harvard, Vancouver, ISO, and other styles
6

ITOH, Akio. "Security Camp, a Human Resource Development Program for Young Cutting Edge Information Security Experts." Journal of JSEE 64, no. 3 (2016): 3_54–3_60. http://dx.doi.org/10.4307/jsee.64.3_54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

ALhadi, Fatima Ismail, Nagi Ali AL-Shaibany, and Sharaf Abdulhak AL-Homdyl. "Survey on Cloud Computing Security." مجلة جامعة صنعاء للعلوم التطبيقية والتكنولوجيا 2, no. 4 (2024): 381–90. http://dx.doi.org/10.59628/jast.v2i4.1025.

Full text
Abstract:
One of the most popular IT subfields today is cloud computing. With a simple Internet connection, it enables users to access cutting-edge information, technology, and infrastructure. Because of the numerous benefits offered, most international organizations have started to move toward cloud computing environments during the last few decades. Companies and organizations find cloud computing appealing because it eliminates the need to plan for provisioning and enables them to start with modest resources and progressively raise them as service demand increases. Cloud computing presents opportunit
APA, Harvard, Vancouver, ISO, and other styles
8

Forte, Dario V. "The role of the Information Security Manager in cutting-edge companies." Network Security 2009, no. 8 (2009): 4–5. http://dx.doi.org/10.1016/s1353-4858(09)70073-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ali, Aitizaz, Bander Ali Saleh Al-rimy, Abdulwahab Ali Almazroi, Faisal S. Alsubaei, Abdulaleem Ali Almazroi, and Faisal Saeed. "Securing Secrets in Cyber-Physical Systems: A Cutting-Edge Privacy Approach with Consortium Blockchain." Sensors 23, no. 16 (2023): 7162. http://dx.doi.org/10.3390/s23167162.

Full text
Abstract:
In the era of interconnected and intelligent cyber-physical systems, preserving privacy has become a paramount concern. This paper aims a groundbreaking proof-of-concept (PoC) design that leverages consortium blockchain technology to address privacy challenges in cyber-physical systems (CPSs). The proposed design introduces a novel approach to safeguarding sensitive information and ensuring data integrity while maintaining a high level of trust among stakeholders. By harnessing the power of consortium blockchain, the design establishes a decentralized and tamper-resistant framework for privacy
APA, Harvard, Vancouver, ISO, and other styles
10

Krishna Anumula. "Enhancing Oracle Database Migration with Cutting-Edge Techniques." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1022–34. https://doi.org/10.32628/cseit25112424.

Full text
Abstract:
This article presents a comprehensive framework for large-scale Oracle database migrations, focusing on enterprise environments with complex requirements exceeding traditional migration approaches. Through examination of advanced techniques, including Oracle Golden Gate real-time replication, optimized RMAN backup strategies, and cascaded standby methodologies for databases exceeding 65TB, we establish practical patterns for successful implementations. The article addresses critical challenges, including SAN to ASM transitions, high availability preservation during migration, and robust data i
APA, Harvard, Vancouver, ISO, and other styles
11

Soofi, Aized Amin, Muhammad Tahir, and Naeem Raza. "Securing the Internet of Things: A Comprehensive Review of Security Challenges and Artificial Intelligence Solutions." Foundation University Journal of Engineering and Applied Sciences <br><i style="color:black;">(HEC Recognized Y Category , ISSN 2706-7351)</i> 4, no. 2 (2024): 1–20. http://dx.doi.org/10.33897/fujeas.v4i2.779.

Full text
Abstract:
One of the major needs and challenges of this century is the use of cutting-edge technology considering the industry 4.0 revolution. The Internet of Things (IoT) falls in the category of a cutting-edge example of such innovation in the computing and information industry. In IoT compared to classical networking methods practically; every device we employ is accessible at any time from any location. Nevertheless, IoT continues to encounter several security challenges, and the magnitude of cyber-physical security risks is escalating alongside the widespread use of IoT technologies considering Moo
APA, Harvard, Vancouver, ISO, and other styles
12

Hassan Zaki, Muhammad Saad, and Muhammad Rehan Rasheed. "A Robust Machine Learning Framework for Fraudulent Mobile App Detection." VFAST Transactions on Software Engineering 12, no. 4 (2024): 27–36. https://doi.org/10.21015/vtse.v12i4.1931.

Full text
Abstract:
The rapid development of mobile applications has led to a significant rise in the number of fraudulent applications. The biggest risk now is financial loss and possible security compromise. Thus, the "Fraud App Detection" framework goal is to develop a reliable system that can recognize and categorize fraudulent apps utilizing cutting-edge machinelearning and artificial intelligence approaches. The process of identifying fraudulent patterns involves gathering data, preprocessing applications, extracting features, and training several machine learning models. The model’s performance will be ass
APA, Harvard, Vancouver, ISO, and other styles
13

Kavitha Soppari, Bhanu Vangapally, Syed Sameer Sohail, and Harish Dubba. "Survey on: Voice driven email solutions for visually impaired people." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 032–36. https://doi.org/10.30574/wjarr.2025.26.1.0970.

Full text
Abstract:
The solution presented in this research is intended to improve email security and accessibility for those with visual impairments. The system enables users to navigate and manage emails with ease using natural language commands by incorporating voice-driven email management capabilities like pagination, sophisticated searching, and effective inbox management. The usage of voice commands and facial recognition as safe authentication techniques for user signup and login procedures is also highlighted in the report. These features, which provide improved usability, independence, and security in e
APA, Harvard, Vancouver, ISO, and other styles
14

Paul, Lipin. "Dependable Safety and Cutting-Edge Security for Electric Motorcycles, Driven by Artificial Intelligence." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47537.

Full text
Abstract:
Abstract - In response to the growing concerns over electric motorcycle theft and the lack of robust security systems, this project introduces a comprehensive software and security solution designed specifically for electric two-wheelers. The system integrates advanced features including intelligent power modes, a throttle lock, a GPS-based tracking system, an audible alarm, and a "Find My Bike" function, all aimed at enhancing security and improving user control. The intelligent power mode dynamically adjusts the motorcycle’s performance based on terrain using an AI-powered control system, en
APA, Harvard, Vancouver, ISO, and other styles
15

Gudhka, Drashti. "Computer Network." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 78–87. http://dx.doi.org/10.22214/ijraset.2024.57862.

Full text
Abstract:
Abstract: This paper presents a comprehensive overview of computer networking, covering fundamental concepts and modern advancements. It explores core networking principles, including models, architectures, and essential layers. Emphasising contemporary trends, it delves into topics like network security (Zero Trust Architecture, AI/ML), Software-Defined Networking (SDN), IoT security challenges, 5G and Mobile Edge Computing (MEC), network performance optimisation, Big Data analytics, and eco-friendly networking strategies. Aimed at students, researchers, and professionals, this overview serve
APA, Harvard, Vancouver, ISO, and other styles
16

Devi, Odugu Rama, Julian Webber, Abolfazl Mehbodniya, et al. "The Future Development Direction of Cloud-Associated Edge-Computing Security in the Era of 5G as Edge Intelligence." Scientific Programming 2022 (October 11, 2022): 1–13. http://dx.doi.org/10.1155/2022/1473901.

Full text
Abstract:
By introducing the Internet-of-Everything, new usage situations such as self-directed movement and vivid competitions constructed upon Virtual Reality or Augmented Reality expertise, besides the Industrial-Internet-of-Thing, accelerates the initial growth of edge-registering improvements. The global versatile correspondence business is now developing toward 5G. Edge processing has gotten a lot of attention around the globe as 5G is one of the major access enhancements to advance the huge scope organization of edge registration. Edge processing security has been a significant area of concern si
APA, Harvard, Vancouver, ISO, and other styles
17

Jin, Kai, Zhanji Niu, Jieping Liu, Jinxue Bai, and Lei Zhang. "Research on network security technology of industrial control system." MATEC Web of Conferences 355 (2022): 03067. http://dx.doi.org/10.1051/matecconf/202235503067.

Full text
Abstract:
The relationship between industrial control system and Internet is becoming closer and closer, and its network security has attracted much attention. Penetration testing is an active network intrusion detection technology, which plays an indispensable role in protecting the security of the system. This paper mainly introduces the principle of penetration testing, summarizes the current cutting-edge penetration testing technology, and looks forward to its development.
APA, Harvard, Vancouver, ISO, and other styles
18

Kundu, Subhasis. "Transforming Identity Verification: Cutting-Edge Face Recognition with AI-Powered Computer Vision." International Scientific Journal of Engineering and Management 01, no. 01 (2022): 1–7. https://doi.org/10.55041/isjem00188.

Full text
Abstract:
This study explored the transformative effects of AI-driven facial recognition technology on identity verification systems. It delves into the recent progress in computer vision and deep learning algorithms, which have greatly improved the accuracy and speed of facial recognition. This study highlights the potential uses of this technology in various fields such as security, finance, and personalized services. It also examines the ethical issues and privacy concerns arising from the widespread adoption of facial recognition. Furthermore, this study addresses the challenges of creating robust s
APA, Harvard, Vancouver, ISO, and other styles
19

Edim Bassey Edim and Akpan Itoro Udofot. "Biometric Authentication and Algorithm: A review." International Journal of Science and Research Archive 14, no. 3 (2025): 960–86. https://doi.org/10.30574/ijsra.2025.14.3.0473.

Full text
Abstract:
Biometric authentication represents a cutting-edge security mechanism that leverages unique physiological and behavioral traits to verify an individual’s identity. In an era where data security and privacy are paramount, biometric technologies play a critical role in fortifying systems against unauthorized access and breaches. Unlike traditional authentication methods such as passwords or physical keys, biometrics offer a blend of reliability, convenience, and near-impossible impersonation positioning them as a cornerstone of modern security frameworks.
APA, Harvard, Vancouver, ISO, and other styles
20

T, Somasekhar. "Safeguarding Connections: Machine Learning Powered Intrusion Detection." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (2023): 1113–16. http://dx.doi.org/10.22214/ijraset.2023.56689.

Full text
Abstract:
Abstract: It's crucial to have reliable intrusion detection systems. a cutting-edge method of machine learning-based intrusion detection. Our solution uses cutting-edge algorithms to detect and eliminate any threats instantly, acting as a preventative measure against a wide range of cyberattacks. Since the model has been trained on a large number of datasets, it can eventually strengthen network security by evolving and adapting to new threats. Naive Bayes (NB) classifiers and correlation-based feature selection (CFS) methods are used to reduce the amount of data. For attack classification, th
APA, Harvard, Vancouver, ISO, and other styles
21

Krishnapatnam, Mahendra. "Cutting-Edge AI Techniques for Securing Healthcare IAM: A Novel Approach to SAML and OAuth Security." International Journal of Computing and Engineering 7, no. 2 (2025): 39–50. https://doi.org/10.47941/ijce.2630.

Full text
Abstract:
Purpose: This study addresses the increasing limitations of traditional Identity and Access Management (IAM) systems based on OAuth and SAML protocols, which are vulnerable to evolving cyber threats such as token hijacking, phishing, replay attacks, and consent fraud. The purpose is to introduce an AI-driven threat detection framework that enhances identity security beyond conventional rule-based mechanisms. Methodology: The proposed framework integrates machine learning (ML), anomaly detection algorithms, and behavioral analytics to monitor and secure OAuth and SAML authentication workflows.
APA, Harvard, Vancouver, ISO, and other styles
22

S. Madhumitha and Ms. N. Vaishnavi. "Banking Security System Using Cyber Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1184–90. https://doi.org/10.32628/cseit25112451.

Full text
Abstract:
The goal of the Intelligent Banking Security System project is to create an advanced security system that protects customer data and banking operations by utilizing cutting-edge technologies. Conventional security systems are insuffici ent since cyber attacks are becoming more complex. To provide a dynamic and efficient security system, the system integrates end-to-end encryption, biometric identification, machine learning, and artificial intelligence (AI). The AI-powered fraud detection engine continuously analyzes transaction patterns to identify unusual activity and stop impending fraud in
APA, Harvard, Vancouver, ISO, and other styles
23

Dr.A.Shaji, George, and Dr.T.Baskar. "Securing the Future: A Review of Cutting-Edge Advances for Cloud and IoT Cybersecurity." Partners Universal Innovative Research Publication (PUIRP) 03, no. 02 (2025): 53–60. https://doi.org/10.5281/zenodo.15288362.

Full text
Abstract:
As cloud computing and Internet of Things (IoT) technologies become ubiquitous, security threats to these systems pose significant risks. This article provides a comprehensive overview of emerging techniques to secure the cloud and IoT landscapes. It examines the objectives behind these emerging technologies, their methodology and functionality, the types of vulnerabilities they address, and their potential future impact. An in-depth discussion covers various access control, authentication, encryption, AI/ML, blockchain, and other innovative protocols that aim to build resilient cloud and IoT
APA, Harvard, Vancouver, ISO, and other styles
24

Kaur, Sehajpreet, and Baby Monal. "Securing the Future of Wireless Sensor Networks: Challenges, Threats, and Innovative Solutions." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (2023): 719–28. http://dx.doi.org/10.22214/ijraset.2023.56607.

Full text
Abstract:
Abstract: This research study underscores the critical significance of securing Wireless Sensor Networks (WSNs) due to their essential role in a broad spectrum of applications. Wireless Sensor Networks comprised of interconnected sensor nodes, have revolutionized data collection and real-time monitoring, but theirsusceptibility to security threats is a significant concern. With the rapid expansion of WSNs, the paper emphasizes the urgency of addressing their security to avert data breaches and cyberattacks. The paper’s objectives encompass in-depth analysis of WSN architecture, comprehensive l
APA, Harvard, Vancouver, ISO, and other styles
25

Nonami, Kenzo. "Drone Technology, Cutting-Edge Drone Business, and Future Prospects." Journal of Robotics and Mechatronics 28, no. 3 (2016): 262–72. http://dx.doi.org/10.20965/jrm.2016.p0262.

Full text
Abstract:
[abstFig src='/00280003/01.jpg' width=""300"" text='Autonomous drone: MIni-surveyor MS-06LA' ] The year 2015 marked the beginning of a new phase in the history of drones in which drones came into use for business purposes in addition to the conventional ones flown for recreational purposes, and the amended Civil Aeronautic Act became effective in the same year. In 2016, full-scale drone businesses including the inspection of infrastructures, measurements, security, and disaster responses are expected to begin. An overview of the rapidly expanding drone business and the attempt to deliver objec
APA, Harvard, Vancouver, ISO, and other styles
26

Tzanetou, Panagiota. "Cutting-Edge Warfare: The Cases of Russia, China and Israel." Journal of Politics and Ethics in New Technologies and AI 1, no. 1 (2022): e31243. http://dx.doi.org/10.12681/jpentai.31243.

Full text
Abstract:
According to political realism, countries are in a constant state of competition with each other. This competition ranges from markets to weapons causing the ones that wish to change the balance of power to opt for innovation in all fields. Although the concept of innovation is not new, current conditions demand that this innovation is connected to technology. The incorporation of new technologies gives states the chance to rise to the top of the power competition, while middle powers have the ability to tackle their state and non-state enemies using them. This paper focuses on what these new
APA, Harvard, Vancouver, ISO, and other styles
27

Sheikh, Abdul Manan, Md Rafiqul Islam, Mohamed Hadi Habaebi, Suriza Ahmad Zabidi, Athaur Rahman Bin Najeeb, and Adnan Kabbani. "A Survey on Edge Computing (EC) Security Challenges: Classification, Threats, and Mitigation Strategies." Future Internet 17, no. 4 (2025): 175. https://doi.org/10.3390/fi17040175.

Full text
Abstract:
Edge computing (EC) is a distributed computing approach to processing data at the network edge, either by the device or a local server, instead of centralized data centers or the cloud. EC proximity to the data source can provide faster insights, response time, and bandwidth utilization. However, the distributed architecture of EC makes it vulnerable to data security breaches and diverse attack vectors. The edge paradigm has limited availability of resources like memory and battery power. Also, the heterogeneous nature of the hardware, diverse communication protocols, and difficulty in timely
APA, Harvard, Vancouver, ISO, and other styles
28

Alqura’n, Rabee, Mahmoud AlJamal, Issa AL-Aiash, et al. "Advancing XSS Detection in IoT over 5G: A Cutting-Edge Artificial Neural Network Approach." IoT 5, no. 3 (2024): 478–508. http://dx.doi.org/10.3390/iot5030022.

Full text
Abstract:
The rapid expansion of the Internet of Things (IoT) and the advancement of 5G technology require strong cybersecurity measures within IoT frameworks. Traditional security methods are insufficient due to the wide variety and large number of IoT devices and their limited computational capabilities. With 5G enabling faster data transmission, security risks have increased, making effective protective measures essential. Cross-Site Scripting (XSS) attacks present a significant threat to IoT security. In response, we have developed a new approach using Artificial Neural Networks (ANNs) to identify a
APA, Harvard, Vancouver, ISO, and other styles
29

Ahlawat, Umang, Anu Naruka, Walunjkar Babasaheb Changdeo, et al. "A Review of Cutting-edge Biotechnological Solutions for Next-generation Farming." Journal of Experimental Agriculture International 46, no. 7 (2024): 1187–204. http://dx.doi.org/10.9734/jeai/2024/v46i72671.

Full text
Abstract:
The emerging trends in agricultural biotechnology focus on synthetic biology, gene drives, advanced breeding techniques, and the integration of AI and machine learning. Synthetic biology offers innovative solutions by designing new biological systems and reengineering existing ones, enhancing traits such as drought tolerance and nutrient biosynthesis in crops. Gene drives and advanced breeding techniques, particularly CRISPR-Cas9, enable precise genetic modifications to control pest populations and improve crop resilience. AI and machine learning revolutionize agriculture through predictive an
APA, Harvard, Vancouver, ISO, and other styles
30

Ma, Wenbo, and Zejun Ni. "An Overview of the Chinese SM9 Algorithm: A Cutting-Edge Cryptographic Breakthrough." Transactions on Computer Science and Intelligent Systems Research 5 (August 12, 2024): 21–25. http://dx.doi.org/10.62051/vqz8a719.

Full text
Abstract:
The SM9 algorithm represents a sophisticated advancement in cryptographic protocols, characterized by its unique implementation of bilinear pairing techniques and identity-based encryption mechanisms. Unlike conventional approaches, SM9 leverages the user's identity directly in the generation of cryptographic keys, streamlining the process and enhancing security. This method stands in contrast to traditional schemes like SM2, which typically rely on external certificate management for public key association. Central to its innovation is the seamless integration of identity information into the
APA, Harvard, Vancouver, ISO, and other styles
31

Sreenivasa, Rao Sola. "Data Integrity with Oracle ERP Cloud's Product Data Hub: A Guide to Effective Governance." International Journal of Leading Research Publication 4, no. 10 (2023): 1–14. https://doi.org/10.5281/zenodo.15259101.

Full text
Abstract:
The ERP solutions have seen great changes with cloud computing, better data analytics, security, and business efficiency. Cloud ERP software incorporates new technologies such as blockchain, AI, and cognitive analytics to improve procurement, data migration, and information security. The essay addresses the product of Oracle ERP Cloud's Product Data Hub (PDH) in data integrity and governance. It details best practices in right product data management, avoiding redundancy, and enabling decision-making through automated data structures. The research further explores security threats, migration o
APA, Harvard, Vancouver, ISO, and other styles
32

Nair, Sreejith Sreekandan. "Enhancing the Resilience of Cloud-Based Security Solutions: Lessons from CrowdStrike Outage." International Journal for Research in Applied Science and Engineering Technology 12, no. 12 (2024): 915–26. https://doi.org/10.22214/ijraset.2024.65945.

Full text
Abstract:
Over the past few years, the usage of security measures and tools that are based in the cloud has increased dramatically. However, the recent CrowdStrike outage which disrupted many organizations shows the increasing need for securing reliability and resilience of cloud based systems. Most of the existing ones are designed as a reactive approach, we suggest a new methodology focusing on proactive measures based on an AI enabled cascade failure prediction which utilizes cutting edge machine learning techniques, bio inspired resilience patterns and quantum aware architecture to address and mitig
APA, Harvard, Vancouver, ISO, and other styles
33

C. Anand. "Design of an Ethereum Security Analysis for Unpredictable State System - An Overview." Journal of Electrical Engineering and Automation 4, no. 3 (2022): 200–208. http://dx.doi.org/10.36548/jeea.2022.3.007.

Full text
Abstract:
As a powerful tool for building framework and autonomous system across various domains, smart contracts are used to maintain security analysis in a better way. However, owing to the decentralised structure of the blockchain on which they are built, a number of concerns have surfaced about weaknesses in their programming, that according to their unique characteristics, might have (and have already had) a very large economic effect. This essay surveys the whole scope of smart contract security issues and the cutting edge of freely accessible security software.
APA, Harvard, Vancouver, ISO, and other styles
34

Avani Nandini. "Advancements in secure data architectures for remote patient monitoring." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 3262–74. https://doi.org/10.30574/wjarr.2025.26.1.1392.

Full text
Abstract:
The proliferation of wearable health sensors and remote patient monitoring (RPM) systems has transformed healthcare delivery by enabling continuous health tracking and proactive care. However, the transmission of sensitive biometric data through intricate edge-to-cloud pipelines introduces critical security and privacy challenges. This article examines cutting-edge advancements in secure data architectures for RPM systems, emphasizing encryption-in-transit protocols, adaptive data masking techniques, and robust audit trail mechanisms designed to meet stringent regulatory standards, including H
APA, Harvard, Vancouver, ISO, and other styles
35

Akter, Fatema, and Sanjeev Kumar. "CRISPR-Cas9: A Cutting-edge Genome-editing Technology with Many Potential Applications." Journal of Advances in Biology & Biotechnology 27, no. 11 (2024): 59–73. http://dx.doi.org/10.9734/jabb/2024/v27i111591.

Full text
Abstract:
Unregulated human activities are responsible for climate change which is a major factor for the emergence of new infectious (bacterial, viral, fungus, and parasitic) and non-infectious diseases (genetic disorders, cancers, etc.). To tackle this situation, we must have better therapeutics, diagnostics, and vaccines for the treatment and prevention of emerging diseases in humans and animals. To address the aforementioned issues, CRISPR-Cas9, a revolutionary genome editing tool, can help us develop better therapeutics, diagnostics, and vaccines in a short time. In addition, it can be used to achi
APA, Harvard, Vancouver, ISO, and other styles
36

Mithkhal, Huda S., Ahmed H. Y. Al-Noori, and Emad Tariq Al-Shiekhly. "Enhancing Facial Identification Systems with YOLOv8: A Cutting-Edge Approach." Al-Nahrain Journal for Engineering Sciences 27, no. 3 (2024): 351–56. https://doi.org/10.29194/njes.27030351.

Full text
Abstract:
Face recognition and identification have recently become the most widely employed biometric authentication technologies, especially for access to persons and other security purposes. It represents one of the most significant pattern recognition technologies that uses characteristics included in facial images or videos to detect the identity of individuals. However, most of the traditional facial algorithms have faced limitations in identification and verification accuracy. As a result, this paper presents a sophisticated system for face identification adopting a novel algorithm of deep learnin
APA, Harvard, Vancouver, ISO, and other styles
37

Lindberg, Brian. "Policy Series: Congressional Update." Innovation in Aging 5, Supplement_1 (2021): 349. http://dx.doi.org/10.1093/geroni/igab046.1355.

Full text
Abstract:
Abstract This popular annual session will provide cutting-edge information on what the 117th Congress has and has not accomplished to date, and what may be left for end of the First Session. Speakers will discuss key issues such as pandemic relief, Social Security, Medicare, Medicaid, and the Older Americans Act.
APA, Harvard, Vancouver, ISO, and other styles
38

Díaz-Santos, Sonia, Óscar Cigala-Álvarez, Ester Gonzalez-Sosa, Pino Caballero-Gil, and Cándido Caballero-Gil. "Driver Identification and Detection of Drowsiness while Driving." Applied Sciences 14, no. 6 (2024): 2603. http://dx.doi.org/10.3390/app14062603.

Full text
Abstract:
This paper introduces a cutting-edge approach that combines facial recognition and drowsiness detection technologies with Internet of Things capabilities, including 5G/6G connectivity, aimed at bolstering vehicle security and driver safety. The delineated two-phase project is tailored to strengthen security measures and address accidents stemming from driver distraction and fatigue. The initial phase is centered on facial recognition for driver authentication before vehicle initiation. Following successful authentication, the subsequent phase harnesses continuous eye monitoring features, lever
APA, Harvard, Vancouver, ISO, and other styles
39

Researcher. "INNOVATIONS IN HEALTHCARE DATA INTEGRATION: BALANCING SCALABILITY, COMPLIANCE, AND CYBERSECURITY." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 714–25. https://doi.org/10.5281/zenodo.14223193.

Full text
Abstract:
The healthcare industry is experiencing a transformative shift in data management and security practices as organizations increasingly adopt cloud-based solutions and advanced technologies. This comprehensive article explores the evolution of healthcare data architecture, from traditional challenges to modern solutions including data lakes and federated learning. The article examines cutting-edge cybersecurity innovations, particularly AI-driven anonymization techniques and zero trust architectures, while addressing regulatory compliance and risk mitigation strategies.&nbsp;Through the lens of
APA, Harvard, Vancouver, ISO, and other styles
40

Siavvas, Miltiadis, Dimitrios Tsoukalas, Ilias Kalouptsoglou, et al. "Security Monitoring during Software Development: An Industrial Case Study." Applied Sciences 13, no. 12 (2023): 6872. http://dx.doi.org/10.3390/app13126872.

Full text
Abstract:
The devastating consequences of successful security breaches that have been observed recently have forced more and more software development enterprises to shift their focus towards building software products that are highly secure (i.e., vulnerability-free) from the ground up. In order to produce secure software applications, appropriate mechanisms are required for enabling project managers and developers to monitor the security level of their products during their development and identify and eliminate vulnerabilities prior to their release. A large number of such mechanisms have been propos
APA, Harvard, Vancouver, ISO, and other styles
41

K S, Smrithi, and Jisha K V. "Chaos-based Cryptography for Voice Communication Security." IRO Journal on Sustainable Wireless Systems 6, no. 4 (2024): 292–308. http://dx.doi.org/10.36548/jsws.2024.4.001.

Full text
Abstract:
Chaos-based cryptography represents a groundbreaking approach to securing voice communications, leveraging chaotic systems to integrate unpredictability and randomness into encryption keys. This innovative methodology protects against eavesdropping, man-in-the-middle (MitM) attacks, and spyware, safeguarding sensitive conversations. By utilizing chaos theory to encrypt voice signals, Chaos- based cryptography strictly limits access to authorized parties, maintaining confidentiality and data integrity. Notably, this chaos-based encryption framework delivers exceptional voice transmission speed
APA, Harvard, Vancouver, ISO, and other styles
42

Collins Omondi Ogolla. "Security in the sixth generation cellular networks: A review." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 2305–34. https://doi.org/10.30574/wjarr.2025.25.3.0634.

Full text
Abstract:
The advent of sixth-generation (6G) wireless networks promises unprecedented advancements in speed, latency, and connectivity, enabling futuristic applications such as holographic communication, intelligent edge computing, and ubiquitous AI-driven automation. However, these innovations introduce complex security challenges that must be addressed to ensure the resilience and reliability of 6G networks. This survey paper provides a comprehensive overview of emerging security threats in 6G, including quantum attacks, AI-driven cyber threats, privacy vulnerabilities, and challenges associated with
APA, Harvard, Vancouver, ISO, and other styles
43

Seth, Dhruv Kumar, Karan Kumar Ratra, Rangarajan Lakshminarayanachar, Swamy Athamakuri, and Aneeshkumar Sundareswaran. "Pattern Play: Advanced API Integration for Cutting-Edge Applications." International Journal for Research in Applied Science and Engineering Technology 12, no. 7 (2024): 1529–40. http://dx.doi.org/10.22214/ijraset.2024.63786.

Full text
Abstract:
Abstract: API integration can be regarded as the foundation of the construction of modern software systems with a high level of interaction. In this article, the author goes further into the specifics of complex and sophisticated API integration while at the same time outlining patterns, architectural models, and methods that allow developers to build new-generation solutions. It starts with the fundamentals of APIs; this will look at RESTful and GraphQL, security measures adopted, and how data is managed. The discourse continues to explain design patterns such as Facade, Adapter, proxy, obser
APA, Harvard, Vancouver, ISO, and other styles
44

Ladoja, Oreoluwa, CIarb, Tracey Heywood, et al. "EXAMINING THE LINK BETWEEN JUVENILE IDENTITY THEFT AND THE RISING DEMAND FOR PRIVATE SECURITY SERVICES." International Journal of Education and Social Science Research 08, no. 03 (2025): 481–86. https://doi.org/10.37500/ijessr.2025.8333.

Full text
Abstract:
This study examines the expanding relationship between the need for private protection services and juvenile identity theft. The investigation uses regular activity theory to explore how motivated criminals take advantage of technological weaknesses without effective guardianship. The study emphasizes how common juvenile cybercrime is, how it affects victims, and how it affects commercial security companies, identity theft committed by juveniles, and private security services. In addition to discussing trends in juvenile cybercrime, variables that influence their participation, and how these c
APA, Harvard, Vancouver, ISO, and other styles
45

S P, Abinaya, Aanandalakshmi M, and Amy Joanna P. "Motion Activated Smart Mirror – with Real Time Alerts and Notifications." June 2024 6, no. 2 (2024): 148–62. http://dx.doi.org/10.36548/jsws.2024.2.006.

Full text
Abstract:
Smart mirrors combine modern technology with traditional home furnishings, creating a harmonious blend of style and function. These cutting-edge gadgets are revitalizing spaces such as restrooms and dressing rooms, transforming them into interactive information hubs. By combining Telegram notifications with motion detection, the newly presented solution improves the functionality of the smart mirror using ESP8266 NodeMCU boards. The integrated solution uses motion sensors and the popular Telegram communication network to instantly notify users on their smartphones whenever motion is detected n
APA, Harvard, Vancouver, ISO, and other styles
46

Xie, Xiao Zheng, Yun Ping Yao, Rong Zhen Zhao, and Wu Yin Jin. "Cutting Force Prediction of Stainless Steel in High-Speed Milling." Advanced Materials Research 538-541 (June 2012): 1369–72. http://dx.doi.org/10.4028/www.scientific.net/amr.538-541.1369.

Full text
Abstract:
According to the components, mechanical properties of difficult-to-process material (26NiCrMoV145)as well as characteristics of high-speed machining, modelling and prediction of cutting force in high-speed milling is studied. Based on geometry model of ball end mill edge line, milling force model of helical ball milling cutter is established by theoretical analysis and empirical coefficient. Then, simulation prediction of cutting forece is conducted under different circumstances. The experimental result shows that the predicted cutting force is consistent with experimental data and the establi
APA, Harvard, Vancouver, ISO, and other styles
47

Yahya Hussien, Amar. "Review on Social Media and Digital Security." Qubahan Academic Journal 2, no. 2 (2022): 1–4. http://dx.doi.org/10.48161/qaj.v2n2a119.

Full text
Abstract:
The emerging social media with inherent capabilities seems to be gaining edge over comprehensiveness, diversity and wisdom, nevertheless its security and trustworthiness issues have also become increasingly serious, which need to be addressed urgently. The available studies mainly aim at both social media content and user security, including model, protocol, mechanism and algorithm. Unfortunately, there is a lack of investigating on effective and efficient evaluations and measurements for security and trustworthiness of various social media tools, platforms and applications, thus has effect on
APA, Harvard, Vancouver, ISO, and other styles
48

Yahya Hussien, Amar. "Review on Social Media and Digital Security." Qubahan Academic Journal 2, no. 2 (2022): 1–4. http://dx.doi.org/10.48161/qaj.v2n2a137.

Full text
Abstract:
The emerging social media with inherent capabilities seems to be gaining edge over comprehensiveness, diversity and wisdom, nevertheless its security and trustworthiness issues have also become increasingly serious, which need to be addressed urgently. The available studies mainly aim at both social media content and user security, including model, protocol, mechanism and algorithm. Unfortunately, there is a lack of investigating on effective and efficient evaluations and measurements for security and trustworthiness of various social media tools, platforms and applications, thus has effect on
APA, Harvard, Vancouver, ISO, and other styles
49

Matyskevic, Yurii, Zaneta Simanaviciene, Iryna Belova, Kateryna Fen, and Yevheniia Skljar. "Blockhain impact on economic security." Independent Journal of Management & Production 12, no. 3 (2021): s019—s040. http://dx.doi.org/10.14807/ijmp.v12i3.1493.

Full text
Abstract:
The aim of this paper is to review impact of the one of the most modern cutting edge technologies‘, namely Blockchain on Economic Security. First of all article describes concept - technological background of Blockchain technology nature, emphasizing main features that have most significant and even disruptive impact on separate industries and even whole Economy including Economic Security. Secondly contemporary challenges of this technology are provided. Thirdly multifaced concept of Economic security is explained, followed by importance of this phenomenon specifically within modern mega tren
APA, Harvard, Vancouver, ISO, and other styles
50

D’Antonio, Patricia, and Brian Lindberg. "POLICY SERIES: GSA CONGRESSIONAL UPDATE." Innovation in Aging 7, Supplement_1 (2023): 329. http://dx.doi.org/10.1093/geroni/igad104.1095.

Full text
Abstract:
Abstract This popular annual session will provide cutting-edge information on what the 118th Congress has and has not accomplished to date, and what may be left for end of the First Session. Speakers will discuss key issues such as ending of public health emergency, Social Security, Medicare, Medicaid, and the Older Americans Act.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!