Journal articles on the topic 'Cyber-defense authentication mechanism'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber-defense authentication mechanism.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Li, Bo, Xin Jin, Tingjie Ba, Tingzhe Pan, En Wang, and Zhiming Gu. "Deceptive Cyber-Resilience in PV Grids: Digital Twin-Assisted Optimization Against Cyber-Physical Attacks." Energies 18, no. 12 (2025): 3145. https://doi.org/10.3390/en18123145.
Full textShradha Pandule, Akshada Ringe, Jaid Sayyed, and Prof. S. C. Puranik. "Keystroke Tracking-Robust System with Dual-Keypad Security." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 05 (2025): 2098–102. https://doi.org/10.47392/irjaeh.2025.0306.
Full textPandule, Shradha. "Implementation Towards Enhanced Visual Proof of Identity: Keystroke Tracking-Robust System with Dual-Keypad Security." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47627.
Full textSingh, Mrs Priyanka. "Encrypted Chat Application." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35388.
Full textBaek, Youngmi, and Seongjoo Shin. "CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks." Sensors 22, no. 7 (2022): 2636. http://dx.doi.org/10.3390/s22072636.
Full textVijayakumaran, C., B. Muthusenthil, and B. Manickavasagam. "A reliable next generation cyber security architecture for industrial internet of things environment." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (2020): 387. http://dx.doi.org/10.11591/ijece.v10i1.pp387-395.
Full textRajaa Ahmed Ali. "Enhancing Hand Vein Authentication: Gray Wolf Optimization Mitigates Data Poisoning Attacks." Journal of Information Systems Engineering and Management 10, no. 34s (2025): 1101–9. https://doi.org/10.52783/jisem.v10i34s.5914.
Full textC., Vijayakumaran, Muthusenthil B., and Manickavasagam B. "A reliable next generation cyber security architecture for industrial internet of things environment." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (2020): 387–95. https://doi.org/10.11591/ijece.v10i1.pp387-395.
Full textSingh, Manmeet Mahinderjit, Richard Frank, and Wan Mohd Nazmee Wan Zainon. "Cyber-criminology defense in pervasive environment: A study of cybercrimes in Malaysia." Bulletin of Electrical Engineering and Informatics 10, no. 3 (2021): 1658–68. http://dx.doi.org/10.11591/eei.v10i3.3028.
Full textManmeet, Mahinderjit Singh, Frank Richard, and Mohd Nazmee Wan Zainon Wan. "Cyber-criminology defense in pervasive environment: A study of cybercrimes in Malaysia." Bulletin of Electrical Engineering and Informatics 10, no. 3 (2021): pp. 1658~1668. https://doi.org/10.11591/eei.v10i3.3028.
Full textYermoshyn, Valerii. "CONTROL OF CYBER SECURITY PARAMETERS AS A MECHANISM FOR EVALUATING THE EFFECTIVENESS OF PROTECTION AND FORECASTING THE SITUATION." Cybersecurity: Education, Science, Technique 1, no. 25 (2024): 51–58. http://dx.doi.org/10.28925/2663-4023.2024.25.5158.
Full textRanga, Premsai. "Mitigating Cyber Attack With Ai Driven Identity And Access Management In Modern Networks." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 3 (2022): 1–12. https://doi.org/10.5281/zenodo.14281882.
Full textGopalakrishnan Mahadevan. "Cybersecurity in Banking and Financial Software Solutions." Economic Sciences 21, no. 1 (2025): 334–50. https://doi.org/10.69889/0btn6w55.
Full textHarini, Mrs K. "Command and Control Traffic Detection and Mitigation in Botnet Driven Networks." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1038–43. https://doi.org/10.22214/ijraset.2025.67486.
Full textFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense." Journal of Electrical Systems 19, no. 4 (2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Full textPrincess Eloho Odio, Richard Okon, Mary Oyenike Adeyanju, Chikezie Paul-Mikki Ewim, and Obianuju Clement Onwuzulike. "Blockchain and Cybersecurity: A dual approach to securing financial transactions in Fintech." Gulf Journal of Advance Business Research 3, no. 2 (2025): 380–409. https://doi.org/10.51594/gjabr.v3i2.89.
Full textMamidi, Sundeep Reddy. "The Role of AI and Machine Learning in Enhancing Cloud Security." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (2024): 403–17. http://dx.doi.org/10.60087/jaigs.v3i1.161.
Full textBabajide Tolulope Familoni. "CYBERSECURITY CHALLENGES IN THE AGE OF AI: THEORETICAL APPROACHES AND PRACTICAL SOLUTIONS." Computer Science & IT Research Journal 5, no. 3 (2024): 703–24. http://dx.doi.org/10.51594/csitrj.v5i3.930.
Full textYogi, Manas Kumar, and Dr A. S. N. Chakravarthy. "Privacy elasticity: building resilient data protection for cyber physical systems." Journal of Electronics,Computer Networking and Applied Mathematics, no. 51 (June 30, 2025): 1–15. https://doi.org/10.55529/jecnam.51.1.15.
Full textKalyan Manohar, Immadisetti, Dadisetti Vishnu Datta, and Lekshmi S. Raveendran. "Website Vulnerability Scanning System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43079.
Full textSoundararajan, Balaji. "Implementing Payment System Security: A Technical Deep Dive." International Journal of Multidisciplinary Research and Growth Evaluation. 3, no. 5 (2022): 615–21. https://doi.org/10.54660/.ijmrge.2022.3.5.615-621.
Full textSathyananda Kumar Pamarthy. "Implementing Robust Data Privacy and Security in Modern ERP Systems: A Technical Deep Dive." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2360–65. https://doi.org/10.32628/cseit251112258.
Full textBai, Zhaoyue, Hui Miao, Junfeng Miao, Nan Xiao, and Xiaoxue Sun. "Artificial Intelligence-driven Cybersecurity Applications and Challenges." Innovative Applications of AI 2, no. 2 (2025): 26–33. https://doi.org/10.70695/aa1202502a09.
Full textManne, Tirumala Ashish Kumar. "Enhancing Security in Cloud Computing Using Artificial Intelligence (AI) Techniques." International Journal of Computing and Engineering 3, no. 1 (2022): 45–53. https://doi.org/10.47941/ijce.2764.
Full textAl-Omari, Ahmad H., Ahmad Ghazi Alshanty, Ayoub Alsarhan, and Saifullah A. Omari. "OTP security in wallet systems: A vulnerability assessment." International Journal of Innovative Research and Scientific Studies 8, no. 2 (2025): 2356–71. https://doi.org/10.53894/ijirss.v8i2.5691.
Full textLakhani, Rishit. "Cybersecurity Threats in Internet of Things (IoT) Networks: Vulnerabilities and Defense Mechanisms." International Journal of Engineering and Computer Science 12, no. 11 (2023): 25965–80. http://dx.doi.org/10.18535/ijecs/v12i11.4779.
Full textMatey, Preeti. "Combining Disaster Recovery, Backup Security, and Compliance: Best Practices for Encryption, RBAC, and MFA." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41891.
Full textPedreira, Vítor, Daniel Barros, and Pedro Pinto. "A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead." Sensors 21, no. 15 (2021): 5189. http://dx.doi.org/10.3390/s21155189.
Full textTongesai, Machakaire. "Enhancing MANETs for military applications: A comprehensive review of innovations, challenges, and research gaps." i-manager’s Journal on Wireless Communication Networks 13, no. 2 (2025): 46. https://doi.org/10.26634/jwcn.13.2.22063.
Full textSAI VENKATA SATHYA PAVAN SAHIL,, YEKOLLU. "IoT Security: Intrusion Detection and Mitigation." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem03137.
Full textS, Dr Swapna. "Advanced Threat Detection with Active Directory and SIEM." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2799–805. https://doi.org/10.22214/ijraset.2025.68478.
Full textAdetunji Paul Adejumo and Chinonso Peter Ogburie. "The role of cybersecurity in safeguarding finance in a digital era." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 1542–56. https://doi.org/10.30574/wjarr.2025.25.3.0909.
Full textJaiswal, Ishu Anand, and Dr Rajneesh Kumar Singh. "Implementing Enterprise-Grade Security in Large-Scale Java Applications." International Journal of Research in Modern Engineering & Emerging Technology 13, no. 3 (2025): 424–33. https://doi.org/10.63345/ijrmeet.org.v13.i3.28.
Full textMAHIPAL REDDY YALLA. "Zero-trust security architecture in the ai era: a novel framework for enterprise cyber resilience." International Journal of Science and Research Archive 13, no. 2 (2024): 4341–56. https://doi.org/10.30574/ijsra.2024.13.2.0172.
Full textJanaki Sivakumar. "Ai-Driven Cyber Threat Detection: Enhancing Security Through Intelligent Engineering Systems." Journal of Information Systems Engineering and Management 10, no. 19s (2025): 790–98. https://doi.org/10.52783/jisem.v10i19s.3116.
Full textHewa Majeed Zangana, Harman Salih Mohammed, and Mamo Muhamad Husain. "Banking Cybersecurity: Safeguarding Financial Information in the Digital Era." Journal of Computers and Digital Business 4, no. 2 (2025): 56–63. https://doi.org/10.56427/jcbd.v4i2.751.
Full textBhaskar, T., M. N. Narsaiah, and M. Ravikanth. "Central Medical Centre Healthcare Data Security with Lightweight Blockchain Model in IoT Sensor Environment." Journal of Sensors, IoT & Health Sciences 1, no. 1 (2023): 15–26. http://dx.doi.org/10.69996/jsihs.2023002.
Full textTolіupa, Serhii, Oleksandr Pliushch, and Ivan Parkhomenko. "CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 169–83. http://dx.doi.org/10.28925/2663-4023.2020.10.169183.
Full textSrikanth Reddy Vutukuru, Et al. "SecureIoT: Novel Machine Learning Algorithms for Detecting and Preventing Attacks on IoT Devices." Journal of Electrical Systems 19, no. 4 (2024): 315–35. http://dx.doi.org/10.52783/jes.641.
Full textAdetunji Paul Adejumo and Chinonso Peter Ogburie. "Strengthening finance with cybersecurity: Ensuring safer digital transactions." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 1527–41. https://doi.org/10.30574/wjarr.2025.25.3.0908.
Full textAli, Guma, Aziku Samuel, Simon Peter Kabiito, et al. "Integration of Artificial Intelligence, Blockchain, and Quantum Cryptography for Securing the Industrial Internet of Things (IIoT): Recent Advancements and Future Trends." Applied Data Science and Analysis 2025 (March 27, 2025): 19–82. https://doi.org/10.58496/adsa/2025/004.
Full textJohnson Sunday Oliha, Preye Winston Biu, and Ogagua Chimezie Obi. "SECURING THE SMART CITY: A REVIEW OF CYBERSECURITY CHALLENGES AND STRATEGIES." Engineering Science & Technology Journal 5, no. 2 (2024): 496–506. http://dx.doi.org/10.51594/estj.v5i2.827.
Full textJohnson Sunday Oliha, Preye Winston Biu, and Ogagua Chimezie Obi. "Securing the smart city: A review of cybersecurity challenges and strategies." Open Access Research Journal of Multidisciplinary Studies 7, no. 1 (2024): 094–101. http://dx.doi.org/10.53022/oarjms.2024.7.1.0013.
Full textAdelusi, Bamidele Samuel, Favour Uche Ojika, and Abel Chukwuemeke Uzoka. "Advances in Cybersecurity Strategy and Cloud Infrastructure Protection for SMEs in Emerging Markets." Journal of Frontiers in Multidisciplinary Research 3, no. 1 (2022): 467–82. https://doi.org/10.54660/.jfmr.2022.3.1.467-482.
Full textSudhanshu, Sekhar Tripathy, and Behera Bichitrananda. "EVALUATION OF FUTURE PERSPECTIVES ON SNORT AND WIRESHARK AS TOOLS AND TECHNIQUES FOR INTRUSION DETECTION SYSTEM." Industrial Engineering Journal 53, no. 10 (2024): 18–40. https://doi.org/10.5281/zenodo.14213834.
Full textRea Mie A. Omas-as and Jerry I. Teleron. "Enhancing Network Security: A Robust Network Access Control and Authentication Mechanism for Secure Data Transmission." International Journal of Advanced Research in Science, Communication and Technology, December 5, 2023, 182–87. http://dx.doi.org/10.48175/ijarsct-14023.
Full textProf. Aravinda Thejas Chandra, Bommineni Lakshmi Ramya, Dhanunjaya Reddy Sai Lavanya, Bhoomika R, and Chethana S. "A Secure and Optimal Content Validation and Protection Scheme for Information Centric Networks." International Journal of Advanced Research in Science, Communication and Technology, May 3, 2023, 58–66. http://dx.doi.org/10.48175/ijarsct-9717.
Full textJawad Khadim Alsayyad, Mohammed. "Researching Issues in Information Security in Internet of Things (IoT) Systems: Challenge & Solution." Journal of Al-Qadisiyah for Computer Science and Mathematics 16, no. 4 (2024). https://doi.org/10.29304/jqcsm.2024.16.41786.
Full textNagpure, Vaishali. "Case Study: The Next Generation of Network Management - AI, Automation, and Security in a Connected World." International Journal of Automation, Artificial Intelligence and Machine Learning, December 26, 2024, 133–49. https://doi.org/10.61797/ijaaiml.v4i2.379.
Full textDul, Magdalena, Łukasz GUGAŁA, and Kamil ŁABA. "Protecting web applications from authentication attacks." Advances in Web Development Journal 1, no. 1 (2023). https://doi.org/10.5281/zenodo.10049992.
Full text