Academic literature on the topic 'Cybersecurity Solutions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity Solutions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersecurity Solutions"
o‘g‘li, Atakulov Bekzod Abduhalil. "Cybersecurity: threats, challenges, solutions." International Journal of Law And Criminology 5, no. 1 (2025): 5–8. https://doi.org/10.37547/ijlc/volume05issue01-02.
Full textKhudhur, Mokhalad Eesee. "Cybersecurity challenges and solutions." International Journal of Cloud Computing and Database Management 6, no. 1 (2025): 01–08. https://doi.org/10.33545/27075907.2025.v6.i1a.76.
Full textSarker, Sree Pradip Kumer, and Raza Zahir Khan. "Cybersecurity Considerations for Smart Bangladesh: Challenges and Solutions." Asian Journal of Research in Computer Science 17, no. 6 (2024): 145–56. http://dx.doi.org/10.9734/ajrcos/2024/v17i6464.
Full textAlexander, Cheryl Ann, and Lidong Wang. "Offensive and defensive cybersecurity solutions in healthcare." Computing and Artificial Intelligence 3, no. 2 (2025): 2220. https://doi.org/10.59400/cai2220.
Full textMs. Reshma Owhal, Viraj Shewale, Aniket Sorate, Mayur Swami, and Dipak Waghmode. "CYBERVIDYA: Rag Infused Cyber Solutions." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 03 (2025): 456–64. https://doi.org/10.47392/irjaeh.2025.0063.
Full textTrim, Peter R. J., and Yang-Im Lee. "Advances in Cybersecurity: Challenges and Solutions." Applied Sciences 14, no. 10 (2024): 4300. http://dx.doi.org/10.3390/app14104300.
Full textSadiqzade, Zarifa, and Hasan Alisoy. "Cybersecurity and Online Education – Risks and Solutions." Luminis Applied Science and Engineering 2, no. 1 (2025): 4–12. https://doi.org/10.69760/lumin.20250001001.
Full textNurwanah, Andi. "Cybersecurity in Accounting Information Systems: Challenges and Solutions." Advances in Applied Accounting Research 2, no. 3 (2024): 157–68. http://dx.doi.org/10.60079/aaar.v2i3.336.
Full textRAJ, ANGIRA. "ASSESSING THE IMPLICATIONS OF CYBERSECURITY THREATS ON THE ADOPTION OF FINTECH SOLUTIONS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33381.
Full textIshamuddin Mustapha, Yamounah Vaicondam, Agha Jahanzeb, Burkhanov Aktam Usmanovich, and Siti Hawa Binti Yusof. "Cybersecurity Challenges and Solutions in the Fintech Mobile App Ecosystem." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 22 (2023): 100–116. http://dx.doi.org/10.3991/ijim.v17i22.45261.
Full textDissertations / Theses on the topic "Cybersecurity Solutions"
Bheemanathini, Sai Nikhil. "A Systematic Review of Blockchain Technology: Privacy Concerns, Security Challenges, and Solutions." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1563273858006378.
Full textGaboriau-Couanau, Clément. "Security of Embedded Software : An Analysis of Embedded Software Vulnerabilities and Related Security Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215703.
Full textMOKALLED, HASSAN. "The importance to manage data protection in the right way: Problems and solutions." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/997252.
Full textLönnebo, Anton. "Cybersäkerhet - Forskning och industri, en fallstudie : Cybersäkerhetshot och lösningsförslag." Thesis, Uppsala universitet, Institutionen för informatik och media, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-356338.
Full textLeon, Ryan James. "An Event Management Framework to Aid Solution Providers in Cybersecurity." Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10745141.
Full textGonçalves, Ricardo Jorge Girante. "Cybersecurity in social networks." Master's thesis, 2022. http://hdl.handle.net/10362/133016.
Full textBooks on the topic "Cybersecurity Solutions"
Agrawal, Rashmi, and Neha Gupta, eds. Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3.
Full textUnited States. Congress. House. Committee on Science, Space, and Technology (2011). Subcommittee on Technology. Cybersecurity research and development: Challenges and solutions : hearing before the Subcommittee on Technology & Subcommittee on Research, Committee on Science, Space, and Technology, House of Representatives, One Hundred Thirteenth Congress, first session, Tuesday, February 26, 2013. U.S. Government Printing Office, 2013.
Find full textUnited States. Congress. House. Committee on the Judiciary. Subcommittee on Intellectual Property, Competition, and the Internet. Cybersecurity: Innovative solutions to challenging problems : hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, first session, May 25, 2011. U.S. G.P.O., 2011.
Find full textShrobe, Howard, David L. Shrier, and Alex Pentland, eds. New Solutions for Cybersecurity. The MIT Press, 2018. http://dx.doi.org/10.7551/mitpress/11636.001.0001.
Full textShrobe, Howard, Alex Pentland, and David L. Shrier. New Solutions for Cybersecurity. MIT Press, 2018.
Find full textShrobe, Howard, Alex Pentland, and David L. Shrier. New Solutions for Cybersecurity. MIT Press, 2018.
Find full textShrobe, Howard, Alex Pentland, and David L. Shrier. New Solutions for Cybersecurity. MIT Press, 2018.
Find full textGupta, R. Agrawal; N. Blockchain Applications in Cybersecurity Solutions. Bentham Science Publishers, 2023.
Find full textGupta, R. Agrawal; N. Blockchain Applications in Cybersecurity Solutions. Bentham Science Publishers, 2023.
Find full textBook chapters on the topic "Cybersecurity Solutions"
Crescenzo, Giovanni Di. "Cryptographic Program Obfuscation: Practical Solutions and Application-Driven Models." In Versatile Cybersecurity. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97643-3_5.
Full textIonescu, Octavian, Viorel Dumitru, Emil Pricop, and Stefan Pircalabu. "Innovative Hardware-Based Cybersecurity Solutions." In Recent Developments on Industrial Control Systems Resilience. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31328-9_12.
Full textBella, Giampaolo. "Interactional Freedom and Cybersecurity." In Innovative Security Solutions for Information Technology and Communications. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-32636-3_1.
Full textLeela Rani, P., A. R. Guru Gokul, and N. Devi. "Blockchain-Based Access Control System." In Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_6.
Full textSingh, Santosh Kumar, P. K. Manjhi, and R. K. Tiwari. "Cloud Computing Security Using Blockchain Technology." In Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_2.
Full textFrança, Reinaldo Padilha, Ana Carolina Borges Monteiro, Rangel Arthur, and Yuzo Iano. "An Introduction to Blockchain Technology and Their Applications in the Actuality with a View of Its Security Aspects." In Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_3.
Full textBarde, Snehlata. "Blockchain-Based Cyber Security." In Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_4.
Full textAggarwal, Alankrita, Shivani Gaba, and Mamta Mittal. "A Comparative Investigation of Consensus Algorithms in Collaboration with IoT and Blockchain." In Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_7.
Full textZalte, Sheetal, and Rajanish Kamat. "Blockchain Technology: Developers Cultivate Novel Applications for Societal Benefits." In Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_11.
Full textKarthiga, M., S. S. Nandhini, R. M. Tharsanee, M. Nivaashini, and R. S. Soundariya. "Blockchain for Automotive Security and Privacy with Related Use Cases." In Transforming Cybersecurity Solutions using Blockchain. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_10.
Full textConference papers on the topic "Cybersecurity Solutions"
Saini, Kapil, Parul Sehrawat, and Neeraj. "Cybersecurity in Digital Transformation: Challenges and Solutions." In 2024 Second International Conference on Advanced Computing & Communication Technologies (ICACCTech). IEEE, 2024. https://doi.org/10.1109/icacctech65084.2024.00079.
Full textDegtiareva, Olga, Natalia Shyriaieva, and Tetiana Kuklinova. "Artificial Intelligence Solutions for Cybersecurity in Energy Systems." In 2024 IEEE International Workshop on Technologies for Defense and Security (TechDefense). IEEE, 2024. https://doi.org/10.1109/techdefense63521.2024.10863745.
Full textKavitha, V., S. Malathi, Vishnu Priya P M, Saranya Ekambaram, B. Charith, and M. Deivakani. "Enhancing Cybersecurity with AI: Anomaly Detection in Network Traffic." In 2025 International Conference on Frontier Technologies and Solutions (ICFTS). IEEE, 2025. https://doi.org/10.1109/icfts62006.2025.11031641.
Full textS, Chandravadhana, Narendran M, Banu S, Rahmaan K, Anurag Reddy Ekkati, and Venkateswara Rao Jallepalli. "Cybersecurity in Healthcare: Safeguarding Patient Data in Telemedicine Platforms." In 2025 International Conference on Frontier Technologies and Solutions (ICFTS). IEEE, 2025. https://doi.org/10.1109/icfts62006.2025.11031951.
Full textThandayuthapani, S., Pradip Chakraborty, Pritha Mukherjee, G. Pandi Selvi, and Sarfaraz Javed. "Enhancing Cybersecurity in IoT-Based Banking Systems Using Artificial Intelligence." In 2025 International Conference on Frontier Technologies and Solutions (ICFTS). IEEE, 2025. https://doi.org/10.1109/icfts62006.2025.11031870.
Full textGadge, Rugved, Atharva Masharkar, Amritansh Singh, Nilesh Shelke, and Amit Pimpalkar. "Managing Cybersecurity Risks in Emerging Technologies: Challenges and Solutions." In 2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA). IEEE, 2024. https://doi.org/10.1109/icaiqsa64000.2024.10882358.
Full textS, Sargunavathi, Talluri Upender, Sowmiya B, Sundar R, Rajasekaran E, and S. Sree Dharinya. "Cybersecurity Challenges and Solutions in the Digital Age: An Analysis." In 2024 International Conference on Communication, Computing and Energy Efficient Technologies (I3CEET). IEEE, 2024. https://doi.org/10.1109/i3ceet61722.2024.10993821.
Full textJiang, Justin. "Addressing Vulnerabilities in AI-Image Detection: Challenges and Proposed Solutions." In 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC). IEEE, 2025. https://doi.org/10.1109/icaic63015.2025.10849004.
Full textLahe, Akshay Dilip, B. Saravanan, Ambrish Kumar Sharma, J. Anvar Shathik, Rashmi K, and Santosh Shivlal Dhamone. "Secure-AI-Shield Model Leveraging Advanced Transformer Networks for Enhancing Cybersecurity in Blockchain Applications." In 2025 International Conference on Frontier Technologies and Solutions (ICFTS). IEEE, 2025. https://doi.org/10.1109/icfts62006.2025.11031817.
Full textKhan, Annu, and Komal Audichya. "Evaluating Cybersecurity Compliance Through Legal Jurisprudence: A Machine Learning Approach to Predicting Court Decisions." In 2025 International Conference on Frontier Technologies and Solutions (ICFTS). IEEE, 2025. https://doi.org/10.1109/icfts62006.2025.11031803.
Full textReports on the topic "Cybersecurity Solutions"
Hossain-McKenzie, Shamina, Matthew Reno, Russell Bent, and Adrian Chavez. Cybersecurity of Networked Microgrids: Challenges Potential Solutions and Future Directions. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1738879.
Full textPudelek, Jessie, and Kevin Hill. End-User Security: A Cornerstone of Defense-in-Depth Cybersecurity Solutions. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1524811.
Full textDavid, Aharon. Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation. SAE International, 2021. http://dx.doi.org/10.4271/epr2021020.
Full textHariharan, Anand, and Masatake (Masa) Yamamichi. Basic Tool Kit for Cybersecurity in Education Management Information Systems. Asian Development Bank, 2024. http://dx.doi.org/10.22617/wps240301-2.
Full textPasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textPasupuleti, Murali Krishna. AI and Quantum-Nano Frontiers: Innovations in Health, Sustainability, Energy, and Security. National Education Services, 2025. https://doi.org/10.62311/nesx/rr525.
Full textBush, Joseph, Eileen Westervelt, Brian Clark, et al. Installation utility monitoring and control system technical guide. Engineer Research and Development Center (U.S.), 2022. http://dx.doi.org/10.21079/11681/45081.
Full textPasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Full textPasupuleti, Murali Krishna. Smart Nanomaterials and AI-Integrated Grids for Sustainable Renewable Energy. National Education Services, 2025. https://doi.org/10.62311/nesx/rr1025.
Full textGuo, Ge, Jiageng Liu, and Guangheng Liu. Multi-sensor Fusion-based Vehicle Localization. SAE International, 2024. http://dx.doi.org/10.4271/epr2024023.
Full text