Academic literature on the topic 'Cybersecurity Solutions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity Solutions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity Solutions"

1

o‘g‘li, Atakulov Bekzod Abduhalil. "Cybersecurity: threats, challenges, solutions." International Journal of Law And Criminology 5, no. 1 (2025): 5–8. https://doi.org/10.37547/ijlc/volume05issue01-02.

Full text
Abstract:
Reliable and secure operation of data networks, computer systems and mobile devices is the most important condition for the functioning of the state and for maintaining economic stability. The safe operation of key information systems in common use is influenced by many factors: cyberattacks, disorders caused by physical impact, failure of hardware and software, humane mistakes. These events demonstrate how modern society depends on stability of information systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Khudhur, Mokhalad Eesee. "Cybersecurity challenges and solutions." International Journal of Cloud Computing and Database Management 6, no. 1 (2025): 01–08. https://doi.org/10.33545/27075907.2025.v6.i1a.76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sarker, Sree Pradip Kumer, and Raza Zahir Khan. "Cybersecurity Considerations for Smart Bangladesh: Challenges and Solutions." Asian Journal of Research in Computer Science 17, no. 6 (2024): 145–56. http://dx.doi.org/10.9734/ajrcos/2024/v17i6464.

Full text
Abstract:
Cybersecurity stands as a cornerstone for safeguarding the integrity, security, and prosperity of a nation in the digital era. It involves a multifaceted approach to protect interconnected digital systems, critical infrastructure, and sensitive data. In the context of a smart nation, where interconnected devices, sensors, and systems are integrated to enhance efficiency and quality of life, cybersecurity becomes even more crucial. As Bangladesh progresses towards its vision of becoming a Smart Nation, characterized by extensive integration of digital technologies into various sectors, cybersec
APA, Harvard, Vancouver, ISO, and other styles
4

Alexander, Cheryl Ann, and Lidong Wang. "Offensive and defensive cybersecurity solutions in healthcare." Computing and Artificial Intelligence 3, no. 2 (2025): 2220. https://doi.org/10.59400/cai2220.

Full text
Abstract:
Healthcare services usually implement defensive data strategies; however, offensive data strategies offer new opportunities because they focus on improving profitability or revenues. Offensive data also helps develop new medicine, diagnosis, and treatment due to the ease of data-sharing rather than data control or other restrictions. Balancing defensive data and offensive data is balancing data control and flexibility. It is a challenge to keep a balance between the two. Sometimes, it is necessary to favor one over the other, depending on the situation. A robust cybersecurity program is contin
APA, Harvard, Vancouver, ISO, and other styles
5

Ms. Reshma Owhal, Viraj Shewale, Aniket Sorate, Mayur Swami, and Dipak Waghmode. "CYBERVIDYA: Rag Infused Cyber Solutions." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 03 (2025): 456–64. https://doi.org/10.47392/irjaeh.2025.0063.

Full text
Abstract:
As cyber threats grow more sophisticated, the need for intelligent, adaptive security solutions has never been greater. CyberVidya: RAG-Infused Cyber Solutions offers a groundbreaking approach by integrating large language models (LLMs) with retrieval-augmented generation (RAG) to provide precise, real-time cybersecurity insights. Unlike traditional models that rely on static knowledge, CyberVidya continuously retrieves and processes information from a dynamic, indexed database of academic papers, ethical books, PDFs, and real-world case studies. What sets CyberVidya apart is its Non-Parametri
APA, Harvard, Vancouver, ISO, and other styles
6

Trim, Peter R. J., and Yang-Im Lee. "Advances in Cybersecurity: Challenges and Solutions." Applied Sciences 14, no. 10 (2024): 4300. http://dx.doi.org/10.3390/app14104300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sadiqzade, Zarifa, and Hasan Alisoy. "Cybersecurity and Online Education – Risks and Solutions." Luminis Applied Science and Engineering 2, no. 1 (2025): 4–12. https://doi.org/10.69760/lumin.20250001001.

Full text
Abstract:
The swift proliferation of online education has transformed learning, providing accessibility, flexibility, and creativity. This transition has also engendered considerable cybersecurity threats, encompassing data breaches, identity theft, phishing schemes, and privacy issues. As educational institutions increasingly depend on digital platforms and cloud-based systems, they become attractive targets for cyber threats. This study examines the principal cybersecurity threats in e-learning settings, including illegal data access, malware infection, and ethical issues related to student surveillan
APA, Harvard, Vancouver, ISO, and other styles
8

Nurwanah, Andi. "Cybersecurity in Accounting Information Systems: Challenges and Solutions." Advances in Applied Accounting Research 2, no. 3 (2024): 157–68. http://dx.doi.org/10.60079/aaar.v2i3.336.

Full text
Abstract:
Purpose: This study explores the challenges and solutions in securing Accounting Information Systems (AIS) amidst increasing cybersecurity threats, emphasizing the integration of technological, human, and organizational factors. Research Design and Methodology: Utilizing a qualitative approach, the study employs case studies and expert interviews across various sectors. The research framework draws on the Technology-Organization-Environment (TOE) and Socio-Technical Systems (STS) theories to provide a comprehensive analysis of AIS security dynamics. Findings and Discussion: The research identi
APA, Harvard, Vancouver, ISO, and other styles
9

RAJ, ANGIRA. "ASSESSING THE IMPLICATIONS OF CYBERSECURITY THREATS ON THE ADOPTION OF FINTECH SOLUTIONS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33381.

Full text
Abstract:
This master's thesis delves into the critical intersection of cybersecurity threats and the adoption of fintech solutions. In an erawhere financial technology is rapidly transforming the landscape offinancial services, understanding the implications of cybersecurity threats is paramount. The study conducts a comprehensive analysisto explore how cybersecurity vulnerabilities impact the adoption of fintech solutions across various sectors. By employing a multidisciplinary approach, the thesis investigates the intricate relationship between cybersecurity threats and fintech adoption. It examines the p
APA, Harvard, Vancouver, ISO, and other styles
10

Ishamuddin Mustapha, Yamounah Vaicondam, Agha Jahanzeb, Burkhanov Aktam Usmanovich, and Siti Hawa Binti Yusof. "Cybersecurity Challenges and Solutions in the Fintech Mobile App Ecosystem." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 22 (2023): 100–116. http://dx.doi.org/10.3991/ijim.v17i22.45261.

Full text
Abstract:
The rapid growth of the fintech industry, driven by the proliferation of mobile applications, has revolutionized financial services, providing unprecedented convenience to users. However, this innovation comes with inherent cybersecurity challenges that demand rigorous attention. This study delves into the complex and ever-evolving landscape of cybersecurity within the fintech mobile app ecosystem, aiming to identify challenges and present viable solutions. Cybersecurity threats in the fintech mobile app ecosystem encompass a broad spectrum, including data breaches, malware attacks, phishing s
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity Solutions"

1

Bheemanathini, Sai Nikhil. "A Systematic Review of Blockchain Technology: Privacy Concerns, Security Challenges, and Solutions." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1563273858006378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gaboriau-Couanau, Clément. "Security of Embedded Software : An Analysis of Embedded Software Vulnerabilities and Related Security Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215703.

Full text
Abstract:
The increased use of computer systems for storing private data or doing critical operations leads to some security issues gathered in the area cybersecurity. This neologism leads people to think about the security of information systems and general-purpose computers. However, with the growth of the Internet of Things, embedded systems are also concerned with these issues. The speed of development of this area often leads to a backwardness in the security features. The thesis investigates the security of embedded systems by focusing on embedded software. After classifying the vulnerabilities wh
APA, Harvard, Vancouver, ISO, and other styles
3

MOKALLED, HASSAN. "The importance to manage data protection in the right way: Problems and solutions." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/997252.

Full text
Abstract:
Information and communication technology (ICT) has made remarkable impact on the society, especially on companies and organizations. The use of computers, databases, servers, and other technologies has made an evolution on the way of storing, processing, and transferring data. However, companies access and share their data on internet or intranet, thus there is a critical need to protect this data from destructive forces and from the unwanted actions of unauthorized users. This thesis groups a set of solutions proposed, from a company point of view, to reach the goal of “Managing data protecti
APA, Harvard, Vancouver, ISO, and other styles
4

Lönnebo, Anton. "Cybersäkerhet - Forskning och industri, en fallstudie : Cybersäkerhetshot och lösningsförslag." Thesis, Uppsala universitet, Institutionen för informatik och media, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-356338.

Full text
Abstract:
Hot mot organisationers cybersäkerhet innebär stora risker för dessa. När organisationer drabbas av incidenter så som dataintrång kan de kostnader som följer av detta vara mycket höga. Tidigare forskning påvisar att forskning inom cybersäkerhet ofta brister i att utforska och förstå de utmaningar verksamheter ställs inför, med detta som motivering utforskar denna studie de lösningsförslag som relaterad forskning respektive cybersäkerhetsindustrin presenterar gällande de hot som omfattas av studien. Utifrån denna kartläggning förväntades studien att kunna bidra med att minska eventuella kunskap
APA, Harvard, Vancouver, ISO, and other styles
5

Leon, Ryan James. "An Event Management Framework to Aid Solution Providers in Cybersecurity." Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10745141.

Full text
Abstract:
<p> Cybersecurity event management is critical to the successful accomplishment of an organization&rsquo;s mission. To put it in perspective, in 2016 Symantec tracked over 700 global adversaries and recorded events from 98 million sensors (Aimoto et al., 2017). Studies show that in 2015, more than 55% of the cyberattacks on government operation centers were due to negligence and the lack of skilled personnel to perform network security duties including the failure to properly identify events (Ponemon, 2015a). Practitioners are charged to perform as first responders to any event that affects th
APA, Harvard, Vancouver, ISO, and other styles
6

Gonçalves, Ricardo Jorge Girante. "Cybersecurity in social networks." Master's thesis, 2022. http://hdl.handle.net/10362/133016.

Full text
Abstract:
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Knowledge Management and Business Intelligence<br>In recent years, the use of social networks has been increasing substantially. As we know, platforms such as Facebook, Twitter, Google +, Pinterest, LinkedIn or Instagram allow millions of individuals to create online profiles and share personal information with several friends through social networks – and, often, it’s possible to do the same with a large amount of strangers. By itself, social networks should not be c
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cybersecurity Solutions"

1

Agrawal, Rashmi, and Neha Gupta, eds. Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Congress. House. Committee on Science, Space, and Technology (2011). Subcommittee on Technology. Cybersecurity research and development: Challenges and solutions : hearing before the Subcommittee on Technology & Subcommittee on Research, Committee on Science, Space, and Technology, House of Representatives, One Hundred Thirteenth Congress, first session, Tuesday, February 26, 2013. U.S. Government Printing Office, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Congress. House. Committee on the Judiciary. Subcommittee on Intellectual Property, Competition, and the Internet. Cybersecurity: Innovative solutions to challenging problems : hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, first session, May 25, 2011. U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shrobe, Howard, David L. Shrier, and Alex Pentland, eds. New Solutions for Cybersecurity. The MIT Press, 2018. http://dx.doi.org/10.7551/mitpress/11636.001.0001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

New Solutions for Cybersecurity. MIT Connection Science & Engineering, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shrobe, Howard, Alex Pentland, and David L. Shrier. New Solutions for Cybersecurity. MIT Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shrobe, Howard, Alex Pentland, and David L. Shrier. New Solutions for Cybersecurity. MIT Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shrobe, Howard, Alex Pentland, and David L. Shrier. New Solutions for Cybersecurity. MIT Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gupta, R. Agrawal; N. Blockchain Applications in Cybersecurity Solutions. Bentham Science Publishers, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, R. Agrawal; N. Blockchain Applications in Cybersecurity Solutions. Bentham Science Publishers, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybersecurity Solutions"

1

Crescenzo, Giovanni Di. "Cryptographic Program Obfuscation: Practical Solutions and Application-Driven Models." In Versatile Cybersecurity. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97643-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ionescu, Octavian, Viorel Dumitru, Emil Pricop, and Stefan Pircalabu. "Innovative Hardware-Based Cybersecurity Solutions." In Recent Developments on Industrial Control Systems Resilience. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31328-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bella, Giampaolo. "Interactional Freedom and Cybersecurity." In Innovative Security Solutions for Information Technology and Communications. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-32636-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Leela Rani, P., A. R. Guru Gokul, and N. Devi. "Blockchain-Based Access Control System." In Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Santosh Kumar, P. K. Manjhi, and R. K. Tiwari. "Cloud Computing Security Using Blockchain Technology." In Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

França, Reinaldo Padilha, Ana Carolina Borges Monteiro, Rangel Arthur, and Yuzo Iano. "An Introduction to Blockchain Technology and Their Applications in the Actuality with a View of Its Security Aspects." In Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Barde, Snehlata. "Blockchain-Based Cyber Security." In Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Aggarwal, Alankrita, Shivani Gaba, and Mamta Mittal. "A Comparative Investigation of Consensus Algorithms in Collaboration with IoT and Blockchain." In Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zalte, Sheetal, and Rajanish Kamat. "Blockchain Technology: Developers Cultivate Novel Applications for Societal Benefits." In Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Karthiga, M., S. S. Nandhini, R. M. Tharsanee, M. Nivaashini, and R. S. Soundariya. "Blockchain for Automotive Security and Privacy with Related Use Cases." In Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity Solutions"

1

Saini, Kapil, Parul Sehrawat, and Neeraj. "Cybersecurity in Digital Transformation: Challenges and Solutions." In 2024 Second International Conference on Advanced Computing & Communication Technologies (ICACCTech). IEEE, 2024. https://doi.org/10.1109/icacctech65084.2024.00079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Degtiareva, Olga, Natalia Shyriaieva, and Tetiana Kuklinova. "Artificial Intelligence Solutions for Cybersecurity in Energy Systems." In 2024 IEEE International Workshop on Technologies for Defense and Security (TechDefense). IEEE, 2024. https://doi.org/10.1109/techdefense63521.2024.10863745.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kavitha, V., S. Malathi, Vishnu Priya P M, Saranya Ekambaram, B. Charith, and M. Deivakani. "Enhancing Cybersecurity with AI: Anomaly Detection in Network Traffic." In 2025 International Conference on Frontier Technologies and Solutions (ICFTS). IEEE, 2025. https://doi.org/10.1109/icfts62006.2025.11031641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

S, Chandravadhana, Narendran M, Banu S, Rahmaan K, Anurag Reddy Ekkati, and Venkateswara Rao Jallepalli. "Cybersecurity in Healthcare: Safeguarding Patient Data in Telemedicine Platforms." In 2025 International Conference on Frontier Technologies and Solutions (ICFTS). IEEE, 2025. https://doi.org/10.1109/icfts62006.2025.11031951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thandayuthapani, S., Pradip Chakraborty, Pritha Mukherjee, G. Pandi Selvi, and Sarfaraz Javed. "Enhancing Cybersecurity in IoT-Based Banking Systems Using Artificial Intelligence." In 2025 International Conference on Frontier Technologies and Solutions (ICFTS). IEEE, 2025. https://doi.org/10.1109/icfts62006.2025.11031870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gadge, Rugved, Atharva Masharkar, Amritansh Singh, Nilesh Shelke, and Amit Pimpalkar. "Managing Cybersecurity Risks in Emerging Technologies: Challenges and Solutions." In 2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA). IEEE, 2024. https://doi.org/10.1109/icaiqsa64000.2024.10882358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

S, Sargunavathi, Talluri Upender, Sowmiya B, Sundar R, Rajasekaran E, and S. Sree Dharinya. "Cybersecurity Challenges and Solutions in the Digital Age: An Analysis." In 2024 International Conference on Communication, Computing and Energy Efficient Technologies (I3CEET). IEEE, 2024. https://doi.org/10.1109/i3ceet61722.2024.10993821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Justin. "Addressing Vulnerabilities in AI-Image Detection: Challenges and Proposed Solutions." In 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC). IEEE, 2025. https://doi.org/10.1109/icaic63015.2025.10849004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lahe, Akshay Dilip, B. Saravanan, Ambrish Kumar Sharma, J. Anvar Shathik, Rashmi K, and Santosh Shivlal Dhamone. "Secure-AI-Shield Model Leveraging Advanced Transformer Networks for Enhancing Cybersecurity in Blockchain Applications." In 2025 International Conference on Frontier Technologies and Solutions (ICFTS). IEEE, 2025. https://doi.org/10.1109/icfts62006.2025.11031817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khan, Annu, and Komal Audichya. "Evaluating Cybersecurity Compliance Through Legal Jurisprudence: A Machine Learning Approach to Predicting Court Decisions." In 2025 International Conference on Frontier Technologies and Solutions (ICFTS). IEEE, 2025. https://doi.org/10.1109/icfts62006.2025.11031803.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity Solutions"

1

Hossain-McKenzie, Shamina, Matthew Reno, Russell Bent, and Adrian Chavez. Cybersecurity of Networked Microgrids: Challenges Potential Solutions and Future Directions. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1738879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pudelek, Jessie, and Kevin Hill. End-User Security: A Cornerstone of Defense-in-Depth Cybersecurity Solutions. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1524811.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

David, Aharon. Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation. SAE International, 2021. http://dx.doi.org/10.4271/epr2021020.

Full text
Abstract:
A large international airport is a microcosm of the entire aviation sector, hosting hundreds of different types of aviation and non-aviation stakeholders: aircraft, passengers, airlines, travel agencies, air traffic management and control, retails shops, runway systems, building management, ground transportation, and much more. Their associated information technology and cyber physical systems—along with an exponentially resultant number of interconnections—present a massive cybersecurity challenge. Unlike the physical security challenge, which was treated in earnest throughout the last decade
APA, Harvard, Vancouver, ISO, and other styles
4

Hariharan, Anand, and Masatake (Masa) Yamamichi. Basic Tool Kit for Cybersecurity in Education Management Information Systems. Asian Development Bank, 2024. http://dx.doi.org/10.22617/wps240301-2.

Full text
Abstract:
The increased reliance on online schooling modalities calls for provision of sufficient security in education management information systems (EMIS). Addressing cybersecurity-related issues is imperative for continuity of education service delivery and resilience of education systems. In case of any cybersecurity threat materializing, an EMIS must recover and be functional within an acceptable period and level of data loss. This tool kit provides guidance for decision-makers and practitioners on how to formulate strategies and implement cybersecurity measures in an EMIS, what cybersecurity issu
APA, Harvard, Vancouver, ISO, and other styles
5

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
6

Pasupuleti, Murali Krishna. AI and Quantum-Nano Frontiers: Innovations in Health, Sustainability, Energy, and Security. National Education Services, 2025. https://doi.org/10.62311/nesx/rr525.

Full text
Abstract:
Abstract: This research report explores transformative advancements at the intersection of Artificial Intelligence (AI), Quantum Computing, and Nanotechnology, focusing on breakthrough innovations in health, sustainability, energy, and global security. By integrating quantum algorithms, AI-driven analytics, and advanced nanomaterials, this report highlights revolutionary solutions in precision medicine, predictive diagnostics, sustainable energy storage, universal water purification, and cybersecurity. Real-world case studies and emerging technologies such as graphene-based nanomaterials, quan
APA, Harvard, Vancouver, ISO, and other styles
7

Bush, Joseph, Eileen Westervelt, Brian Clark, et al. Installation utility monitoring and control system technical guide. Engineer Research and Development Center (U.S.), 2022. http://dx.doi.org/10.21079/11681/45081.

Full text
Abstract:
Army policy calls for each installation to install a building automation system (aka utility monitoring and control system [UMCS]) to provide for centralized monitoring of buildings and utilities to reduce energy and water commodity and maintenance costs. Typically, the UMCS, including building control systems (BCS), is installed and expanded in piecemeal fashion resulting in intersystem incompatibilities. The integration of multivendor BCSs into a single basewide UMCS, and subsequent UMCS operation, can present technical and administrative challenges due to its complexity and cybersecurity re
APA, Harvard, Vancouver, ISO, and other styles
8

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
APA, Harvard, Vancouver, ISO, and other styles
9

Pasupuleti, Murali Krishna. Smart Nanomaterials and AI-Integrated Grids for Sustainable Renewable Energy. National Education Services, 2025. https://doi.org/10.62311/nesx/rr1025.

Full text
Abstract:
Abstract: The transition to sustainable and intelligent renewable energy systems is being driven by advancements in smart nanomaterials and AI-integrated smart grids. Nanotechnology has enabled the development of high-performance energy materials, such as graphene, perovskites, quantum dots, and MXenes, which enhance the efficiency, durability, and scalability of renewable energy solutions. Simultaneously, AI-driven smart grids leverage machine learning, deep learning, and digital twins to optimize energy distribution, predictive maintenance, and real-time load balancing in renewable energy ne
APA, Harvard, Vancouver, ISO, and other styles
10

Guo, Ge, Jiageng Liu, and Guangheng Liu. Multi-sensor Fusion-based Vehicle Localization. SAE International, 2024. http://dx.doi.org/10.4271/epr2024023.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Multi-sensor fusion (MSF) is believed to be a promising tool for vehicular localization in urban environments. Due to the differences in principles and performance of various onboard vehicle sensors, MSF inevitably suffers from heterogeneous sources and vulnerability to cyber-attacks. Therefore, an essential requirement of MSF is the capability of providing a consumer-grade solution that operates in real-time, is accurate, and immune to abnormal conditions with guaranteed performance and quality of service for location-b
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!