Journal articles on the topic 'Cybersecurity Solutions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity Solutions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
o‘g‘li, Atakulov Bekzod Abduhalil. "Cybersecurity: threats, challenges, solutions." International Journal of Law And Criminology 5, no. 1 (2025): 5–8. https://doi.org/10.37547/ijlc/volume05issue01-02.
Full textKhudhur, Mokhalad Eesee. "Cybersecurity challenges and solutions." International Journal of Cloud Computing and Database Management 6, no. 1 (2025): 01–08. https://doi.org/10.33545/27075907.2025.v6.i1a.76.
Full textSarker, Sree Pradip Kumer, and Raza Zahir Khan. "Cybersecurity Considerations for Smart Bangladesh: Challenges and Solutions." Asian Journal of Research in Computer Science 17, no. 6 (2024): 145–56. http://dx.doi.org/10.9734/ajrcos/2024/v17i6464.
Full textAlexander, Cheryl Ann, and Lidong Wang. "Offensive and defensive cybersecurity solutions in healthcare." Computing and Artificial Intelligence 3, no. 2 (2025): 2220. https://doi.org/10.59400/cai2220.
Full textMs. Reshma Owhal, Viraj Shewale, Aniket Sorate, Mayur Swami, and Dipak Waghmode. "CYBERVIDYA: Rag Infused Cyber Solutions." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 03 (2025): 456–64. https://doi.org/10.47392/irjaeh.2025.0063.
Full textTrim, Peter R. J., and Yang-Im Lee. "Advances in Cybersecurity: Challenges and Solutions." Applied Sciences 14, no. 10 (2024): 4300. http://dx.doi.org/10.3390/app14104300.
Full textHeier, Melanie, Penatiyana W. Chandana Prasad, and Md Shohel Sayeed. "Machine learning approaches to cybersecurity in the industrial internet of things: a review." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 4 (2025): 3851. https://doi.org/10.11591/ijece.v15i4.pp3851-3866.
Full textSadiqzade, Zarifa, and Hasan Alisoy. "Cybersecurity and Online Education – Risks and Solutions." Luminis Applied Science and Engineering 2, no. 1 (2025): 4–12. https://doi.org/10.69760/lumin.20250001001.
Full textNurwanah, Andi. "Cybersecurity in Accounting Information Systems: Challenges and Solutions." Advances in Applied Accounting Research 2, no. 3 (2024): 157–68. http://dx.doi.org/10.60079/aaar.v2i3.336.
Full textRAJ, ANGIRA. "ASSESSING THE IMPLICATIONS OF CYBERSECURITY THREATS ON THE ADOPTION OF FINTECH SOLUTIONS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33381.
Full textIshamuddin Mustapha, Yamounah Vaicondam, Agha Jahanzeb, Burkhanov Aktam Usmanovich, and Siti Hawa Binti Yusof. "Cybersecurity Challenges and Solutions in the Fintech Mobile App Ecosystem." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 22 (2023): 100–116. http://dx.doi.org/10.3991/ijim.v17i22.45261.
Full textLiu, Zihe. "Problems and Solutions in US Stock Market." Advances in Economics, Management and Political Sciences 143, no. 1 (2024): 167–71. https://doi.org/10.54254/2754-1169/2024.ga18969.
Full textShetty, Saiman, and Harsh Jaiswal. "Cybersecurity Threats and Solutions in Autonomous Vehicles." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem37841.
Full textKamuangu, Paulin. "A Review on Cybersecurity in Fintech: Threats, Solutions, and Future Trends." Journal of Economics, Finance and Accounting Studies 6, no. 1 (2024): 47–53. https://doi.org/10.5281/zenodo.10645599.
Full textSweety, Dr. "Exploring the Landscape of Cybersecurity: Challenges, Threats, and Solutions." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 7211–14. https://doi.org/10.22214/ijraset.2025.71744.
Full textMohammed. I. Alghamdi. "Cybersecurity: A Survey of Threats, Technologies, and Solutions." Communications on Applied Nonlinear Analysis 32, no. 8s (2025): 654–63. https://doi.org/10.52783/cana.v32.3752.
Full textOluwabunmi Layode, Henry Nwapali Ndidi Naiho, Gbenga Sheriff Adeleke, Ezekiel Onyekachukwu Udeh, and Talabi Temitope Labake. "The role of cybersecurity in facilitating sustainable healthcare solutions: Overcoming challenges to protect sensitive data." International Medical Science Research Journal 4, no. 6 (2024): 668–93. http://dx.doi.org/10.51594/imsrj.v4i6.1228.
Full textWiratama, Ahmad Doni. "Cyber Security In 2023: The Latest Challenges And Solutions." Jurnal Komputer Indonesia 2, no. 1 (2023): 47–54. http://dx.doi.org/10.37676/jki.v2i1.569.
Full textDarlington Eze Ekechukwu and Peter Simpa. "The future of Cybersecurity in renewable energy systems: A review, identifying challenges and proposing strategic solutions." Computer Science & IT Research Journal 5, no. 6 (2024): 1265–99. http://dx.doi.org/10.51594/csitrj.v5i6.1197.
Full textMaglaras, Leandros, Helge Janicke, and Mohamed Amine Ferrag. "Cybersecurity of Critical Infrastructures: Challenges and Solutions." Sensors 22, no. 14 (2022): 5105. http://dx.doi.org/10.3390/s22145105.
Full textWesterlund, Mika, and Risto Rajala. "Effective Digital Channel Marketing for Cybersecurity Solutions." Technology Innovation Management Review 4, no. 10 (2014): 22–32. http://dx.doi.org/10.22215/timreview/836.
Full textWesterlund, Mika, and Risto Rajala. "Effective Digital Channel Marketing for Cybersecurity Solutions." Technology Innovation Management Review 4, no. 10 (2014): 22–32. http://dx.doi.org/10.22215/timreview836.
Full textKhatoun, Rida, and Sherali Zeadally. "Cybersecurity and Privacy Solutions in Smart Cities." IEEE Communications Magazine 55, no. 3 (2017): 51–59. http://dx.doi.org/10.1109/mcom.2017.1600297cm.
Full textAkana, John, Bushra Marium Islam, Kartik Patel, Ikjot Saini, Gyan Chhipi-Shrestha, and Rajeev Ruparathna. "Comparative eco-efficiency assessment of cybersecurity solutions." Environmental Impact Assessment Review 100 (May 2023): 107096. http://dx.doi.org/10.1016/j.eiar.2023.107096.
Full textGopalakrishnan Mahadevan. "Cybersecurity in Banking and Financial Software Solutions." Economic Sciences 21, no. 1 (2025): 334–50. https://doi.org/10.69889/0btn6w55.
Full textDarlington Eze Ekechukwu and Peter Simpa. "The importance of cybersecurity in protecting renewable energy investment: A strategic analysis of threats and solutions." Engineering Science & Technology Journal 5, no. 6 (2024): 1845–83. http://dx.doi.org/10.51594/estj.v5i6.1186.
Full textpavan G, Dr Swapna. "Social Media Cybersecurity: A Behavioural and Technological Perspective." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48730.
Full textLaxminarayana, Korada, Kartik Sikha Vijay, and Siramgari Dayakar. "Streamlining Enterprise Cybersecurity: Building Real-Time Threat Analytics Solutions." European Journal of Advances in Engineering and Technology 7, no. 12 (2020): 107–11. https://doi.org/10.5281/zenodo.13762555.
Full textPolishchuk, Volodymyr, Nataliia Fedirko, Dymytrii Grytsyshen, Kyrylo Ohdanskyi, and Volodymyr Kotkovskyy. "Analysis of the Impact of Cybersecurity on The Stability of Financial Institutions." International Journal of Religion 5, no. 9 (2024): 302–9. http://dx.doi.org/10.61707/hfrv6059.
Full textPolishchuk, Volodymyr, Nataliia Fedirko, Dymytrii Grytsyshen, Kyrylo Ohdanskyi, and Volodymyr Kotkovskyy. "Stability of financial institutions under the influence of cyber threats." Edelweiss Applied Science and Technology 8, no. 6 (2024): 2501–9. http://dx.doi.org/10.55214/25768484.v8i6.2498.
Full textPolishchuk, Volodymyr, Nataliia Fedirko, Dymytrii Grytsyshen, Kyrylo Ohdanskyi, and Volodymyr Kotkovskyy. "Stability of Financial Institutions Under the Influence of Cyber Threats." Journal of Lifestyle and SDGs Review 5, no. 3 (2025): e04008. https://doi.org/10.47172/2965-730x.sdgsreview.v5.n03.pe04008.
Full textBhanushali, Aastha. "AI-Driven Cybersecurity: A Cornerstone of National Security Amidst Emerging Threats and Innovative Solutions." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1265–69. https://doi.org/10.22214/ijraset.2025.67522.
Full textVrhovec, Simon, and Blaž Markelj. "We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers." PLOS ONE 19, no. 10 (2024): e0312266. http://dx.doi.org/10.1371/journal.pone.0312266.
Full textResearcher. "HEALTHCARE CYBERSECURITY LANDSCAPE: CHALLENGES, SOLUTIONS, AND FUTURE DIRECTIONS." International Journal of Engineering and Technology Research (IJETR) 9, no. 2 (2024): 90–107. https://doi.org/10.5281/zenodo.13692084.
Full textDjurayev, Musurmon Avlakulovich, Oybek Valijonovich Tuyboyov, Sirojiddin Salimov, and Zumrad Zarifova. "CYBERSECURITY CHALLENGES AND SOLUTIONS IN BLOCKCHAIN-BASED IOT SYSTEMS." Innovative Development in Educational Activities 2, no. 23 (2023): 149–58. https://doi.org/10.5281/zenodo.10392082.
Full textKingsley David Onyewuchi Ofoegbu, Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Empowering users through AI-driven cybersecurity solutions: enhancing awareness and response capabilities." Engineering Science & Technology Journal 4, no. 6 (2023): 707–27. http://dx.doi.org/10.51594/estj.v4i6.1528.
Full textMechev, Stoyan, Elisaveta Staneva, and Mariyan Rachev. "Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices." Information & Security: An International Journal 47, no. 3 (2020): 300–305. http://dx.doi.org/10.11610/isij.4721.
Full textUpendra, Priyanka. "Selecting a Passive Network Monitoring Solution for Medical Device Cybersecurity Management." Biomedical Instrumentation & Technology 55, no. 4 (2021): 121–30. http://dx.doi.org/10.2345/0890-8205-55.4.121.
Full textMashrur, Rahman Mahin. "Cybersecurity Threats: State of Bangladeshi Cybersecurity Laws and Institutions." SCLS Law Review 3, no. 3 (2020): 103–10. https://doi.org/10.5281/zenodo.10209101.
Full textJobanpreet Kaur, Syed Nazmul Hasan, Shuchona Malek Orthi, et al. "Advanced Cyber Threats and Cybersecurity Innovation - Strategic Approaches and Emerging Solutions." Journal of Computer Science and Technology Studies 5, no. 3 (2024): 112–21. http://dx.doi.org/10.32996/jcsts.2023.5.3.9.
Full textSandeep Dommari and Prof. (Dr) Sangeet Vashishtha. "Blockchain-Based Solutions for Enhancing Data Integrity in Cybersecurity Systems." International Journal for Research Publication and Seminar 14, no. 5 (2023): 530–45. https://doi.org/10.36676/jrps.v14.i5.1639.
Full textDave, Rushi. "Cybersecurity in Cloud Computing Environments: Challenges and Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40961.
Full textChinwe Chinazo Okoye, Ekene Ezinwa Nwankwo, Favour Oluwadamilare Usman, Noluthando Zamanjomane Mhlongo, Olubusola Odeyemi, and Chinedu Ugochukwu Ike. "Securing financial data storage: A review of cybersecurity challenges and solutions." International Journal of Science and Research Archive 11, no. 1 (2024): 1968–83. http://dx.doi.org/10.30574/ijsra.2024.11.1.0267.
Full textTyler, Neil. "Vehicle Cybersecurity Wins Innovate UK Funding." New Electronics 52, no. 14 (2019): 6. http://dx.doi.org/10.12968/s0047-9624(22)61570-0.
Full textScott, Ben, and Raina Mason. "Cyber as a Second Language? A Challenge to Cybersecurity Education." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (2022): 6. http://dx.doi.org/10.53735/cisse.v9i1.137.
Full textIkechukwu Innocent Umeh. "Enhancing Cybersecurity in the Age of AI: Challenges and Solutions." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1095–105. https://doi.org/10.30574/wjarr.2025.26.1.1157.
Full textLudvigsen, Kaspar Rosager. "The Role of Cybersecurity in Medical Devices Regulation: Future Considerations and Solutions." Law, Technology and Humans 5, no. 2 (2023): 59–77. http://dx.doi.org/10.5204/lthj.3080.
Full textPowell, Grant. "Engaging the Board to Ensure Effective Cybersecurity." ITNOW 65, no. 3 (2023): 46–47. http://dx.doi.org/10.1093/itnow/bwad096.
Full textHussain, Hasnain. "Leveraging AI and Machine Learning to Detect and Prevent Cyber Security Threats." Dialogue Social Science Review (DSSR) 3, no. 1 (2025): 881–95. https://doi.org/10.5281/zenodo.14714679.
Full textChamariya, Yogesh Jaiswal. "Cloud Technologies and AI in Cyber Security: Challenges and Opportunities." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 2 (2023): 351–57. https://doi.org/10.17762/ijritcc.v11i2.11575.
Full text