Academic literature on the topic 'Cyber-defense authentication mechanism'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber-defense authentication mechanism.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber-defense authentication mechanism"
Li, Bo, Xin Jin, Tingjie Ba, Tingzhe Pan, En Wang, and Zhiming Gu. "Deceptive Cyber-Resilience in PV Grids: Digital Twin-Assisted Optimization Against Cyber-Physical Attacks." Energies 18, no. 12 (2025): 3145. https://doi.org/10.3390/en18123145.
Full textShradha Pandule, Akshada Ringe, Jaid Sayyed, and Prof. S. C. Puranik. "Keystroke Tracking-Robust System with Dual-Keypad Security." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 05 (2025): 2098–102. https://doi.org/10.47392/irjaeh.2025.0306.
Full textPandule, Shradha. "Implementation Towards Enhanced Visual Proof of Identity: Keystroke Tracking-Robust System with Dual-Keypad Security." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47627.
Full textSingh, Mrs Priyanka. "Encrypted Chat Application." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35388.
Full textBaek, Youngmi, and Seongjoo Shin. "CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks." Sensors 22, no. 7 (2022): 2636. http://dx.doi.org/10.3390/s22072636.
Full textVijayakumaran, C., B. Muthusenthil, and B. Manickavasagam. "A reliable next generation cyber security architecture for industrial internet of things environment." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (2020): 387. http://dx.doi.org/10.11591/ijece.v10i1.pp387-395.
Full textRajaa Ahmed Ali. "Enhancing Hand Vein Authentication: Gray Wolf Optimization Mitigates Data Poisoning Attacks." Journal of Information Systems Engineering and Management 10, no. 34s (2025): 1101–9. https://doi.org/10.52783/jisem.v10i34s.5914.
Full textC., Vijayakumaran, Muthusenthil B., and Manickavasagam B. "A reliable next generation cyber security architecture for industrial internet of things environment." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (2020): 387–95. https://doi.org/10.11591/ijece.v10i1.pp387-395.
Full textSingh, Manmeet Mahinderjit, Richard Frank, and Wan Mohd Nazmee Wan Zainon. "Cyber-criminology defense in pervasive environment: A study of cybercrimes in Malaysia." Bulletin of Electrical Engineering and Informatics 10, no. 3 (2021): 1658–68. http://dx.doi.org/10.11591/eei.v10i3.3028.
Full textManmeet, Mahinderjit Singh, Frank Richard, and Mohd Nazmee Wan Zainon Wan. "Cyber-criminology defense in pervasive environment: A study of cybercrimes in Malaysia." Bulletin of Electrical Engineering and Informatics 10, no. 3 (2021): pp. 1658~1668. https://doi.org/10.11591/eei.v10i3.3028.
Full textBook chapters on the topic "Cyber-defense authentication mechanism"
Jiang, Shan, and Hengbo Zhang. "Research on Communication Network Security of Unmanned Surface Vehicle Based on Block Chain." In Advances in Transdisciplinary Engineering. IOS Press, 2024. http://dx.doi.org/10.3233/atde240506.
Full textSavita, Pankaj, and Bhupendra Malviya. "IOT PRIVACY AND SECURITY." In Futuristic Trends in IOT Volume 3 Book 8. Iterative International Publishers, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3baio8p2ch2.
Full textVashishth, Tarun Kumar, Vikas Sharma, Kewal Krishan Sharma, Bhupendra Kumar, Sachin Chaudhary, and Rajneesh Panwar. "Enhancing Cloud Security." In Improving Security, Privacy, and Trust in Cloud Computing. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-1431-9.ch004.
Full textSingh, Harmanjot, Sudhakar Kumar, Sunil K. Singh, et al. "Robust and Secure Communication Protocols for Space Missions." In Advanced Cyber Defense for Space Missions and Operations. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-7939-4.ch008.
Full textVadluri, Aditya, and Snehanshu Ayer. "Zero-Trust Architecture and Blockchain-Based Security Models for IoT-Integrated Industrial Power Electronics Systems." In Power Electronics for IoT-Enabled Smart Grids and Industrial Automation. RADemics Research Institute, 2025. https://doi.org/10.71443/9789349552111-13.
Full textKhan, Azeem, Noor Zaman Jhanjhi, Ghassan Ahmed Alı, Sayan Kumar Ray, and Sobia Wassan. "Case Studies and Applications of Generative AI in Real-World Cybersecurity Scenarios." In Advances in Human and Social Aspects of Technology. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-8939-3.ch003.
Full textConference papers on the topic "Cyber-defense authentication mechanism"
Kamila, Gangadhar, Uma Yadav, Satyam Kumar, and Javalkar Dinesh Kumar. "Securing IOT infrastructures: Remote Control Technology as cyber defense Mechanism." In International Conference on Cutting-Edge Developments in Engineering Technology and Science. ICCDETS, 2024. http://dx.doi.org/10.62919/here1331.
Full textJackson, Aldrewvonte, Kofi Kyei, Yasmin Eady, et al. "Biometric Authentication for the Mitigation of Human Risk on a Social Network." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004763.
Full text