Journal articles on the topic 'Dynamic Trust Scoring'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 39 journal articles for your research on the topic 'Dynamic Trust Scoring.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Park, Ui Hyun, Jeong-hyeop Hong, Auk Kim, and Kyung Ho Son. "Endpoint Device Risk-Scoring Algorithm Proposal for Zero Trust." Electronics 12, no. 8 (2023): 1906. http://dx.doi.org/10.3390/electronics12081906.
Full textParmar, Digvijay. "Dynamic Trust Score Explanation and Adjustment in Zero Trust Architecture Using Large Language Models." Journal of Artificial Intelligence Research 5, no. 1 (2025): 1–30. https://doi.org/10.5281/zenodo.15524788.
Full textChaoqun Kang, Chaoqun Kang, Erxia Li Chaoqun Kang, Dongxiao Liu Erxia Li, Xinhong You Dongxiao Liu, and Xiaoyong Li Xinhong You. "A Dynamic and Fine-Grained User Trust Evaluation Model for Micro-Segmentation Cloud Computing Environment." 電腦學刊 34, no. 4 (2023): 215–32. http://dx.doi.org/10.53106/199115992023083404019.
Full textVinod, Veeramachaneni. "Integrating Zero Trust Principles into IAM for Enhanced Cloud Security." Recent Trends in Cloud Computing and Web Engineering 7, no. 1 (2024): 78–92. https://doi.org/10.5281/zenodo.14162091.
Full textSynko, Anna. "The method of trust level of publications hosted in virtual communities." Scientific journal of the Ternopil national technical university 105, no. 1 (2022): 68–79. http://dx.doi.org/10.33108/visnyk_tntu2022.01.068.
Full textRani, Jyoti, Rushan Gupta, Sameer Kumar Singh, Manik Sood, and Kuldeep Kumar Chauhan. "Federated Learning-Based Authentication and Trust Scoring System for Cloud IoT Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 412–18. http://dx.doi.org/10.22214/ijraset.2024.65079.
Full textSamuel Amoateng, Omolola A. Akinola, Victor Ogechukwu Anuebunwa, and Jesudunsin O. Olaobaju. "Designing a zero-trust post-quantum encryption framework for adaptive end-to-end network security in dynamic threat environments." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 934–48. https://doi.org/10.30574/wjaets.2024.13.2.0629.
Full textHaridasan, Praveen Kotholliparambil. "The Salesforce Einstein Trust Layer for Retrieval-Augmented Generation (RAG) for Enterprise Applications." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–3. http://dx.doi.org/10.55041/ijsrem28465.
Full textAnitha, 1. and Anirban Basu2. "NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD COMPUTING USING MULTI ATTRIBUTE QOS." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 6, February (2018): 01–14. https://doi.org/10.5281/zenodo.1413283.
Full textDasu, Lalitha Sravanti, Mannav Dhamija, Gurram Dishitha, Ajith Vivekanandan, and V. Sarasvathi. "Defending Against Identity Threats Using Risk-Based Authentication." Cybernetics and Information Technologies 23, no. 2 (2023): 105–23. http://dx.doi.org/10.2478/cait-2023-0016.
Full textSegun Adanigbo, Oluwasanmi, Bolaji Iyanu Adekunle, Ejielo Ogbuefi, Oyejide Timothy Odofin, Oluwademilade Aderemi Agboola, and Denis Kisina. "Implementing Zero Trust Security in Multi-Cloud Microservices Platforms: A Review and Architectural Framework." International Journal of Advanced Multidisciplinary Research and Studies 4, no. 6 (2024): 2402–9. https://doi.org/10.62225/2583049x.2024.4.6.4357.
Full textCrocker-Buque, Tim, Jonathan Myles, Adam Brentnall, et al. "Using ISARIC 4C mortality score to predict dynamic changes in mortality risk in COVID-19 patients during hospital admission." PLOS ONE 17, no. 10 (2022): e0274158. http://dx.doi.org/10.1371/journal.pone.0274158.
Full textBalazon, Marlen W., Joanna Mae B. Iserio, Ralph Michael S. Bembo, and Ruissan A. Ramos. "Flexi: A Comprehensive Event Tabulation System for Pangasinan State University Alaminos City Campus." International Journal of Research and Innovation in Social Science IX, no. II (2025): 3444–48. https://doi.org/10.47772/ijriss.2025.9020268.
Full textOluoha, Oluchukwu Modesta, Abisola Odeshina, Oluwatosin Reis, Friday Okpeke, Verlinda Attipoe, and Omamode Henry Orieno. "AI-Enabled Framework for Zero Trust Architecture and Continuous Access Governance in Security-Sensitive Organizations." International Journal of Social Science Exceptional Research 3, no. 1 (2024): 343–64. https://doi.org/10.54660/ijsser.2024.3.1.343-364.
Full textYadlapalli, Rakesh. "Technical Review: Cloud-Native Payment Processing Platform." European Journal of Computer Science and Information Technology 13, no. 50 (2025): 45–57. https://doi.org/10.37745/ejcsit.2013/vol13n504557.
Full textSri, Keerthi Suggu. "Shadows in the Supply Chain: Assessing Security Gaps in Third‑Party Dependencies." Journal of Scientific and Engineering Research 11, no. 11 (2024): 179–86. https://doi.org/10.5281/zenodo.15606825.
Full textOwoade, Samuel, Denis Kisina, Oluwasanmi Segun Adanigbo, Abel Chukwuemeke Uzoka, Andrew Ifesinachi Daraojimba, and Toluwase Peter Gbenle. "Advances in Access Control Systems Using Policy-Driven and Role-Based Authorization Models." International Journal of Management and Organizational Research 2, no. 2 (2023): 128–34. https://doi.org/10.54660/ijmor.2023.2.2.128-134.
Full textAlmatarneh, Rami, Mohammad Aljaidi, Ayoub Alsarhan, Sami Aziz Alshammari, Fahd Alhamazani, and Ahmed Badi Alshammari. "An integrated AI-blockchain framework for securing web applications, mitigating SQL injection, model poisoning, and IoT spoofing attacks." International Journal of Innovative Research and Scientific Studies 8, no. 3 (2025): 2759–73. https://doi.org/10.53894/ijirss.v8i3.7077.
Full textPetrosoniak, A., A. Gray, M. Fan, et al. "MP036: Trauma Resuscitation Using in-situ Simulation Team Training (TRUST): a novel approach to latent safety threat identification in trauma care." CJEM 18, S1 (2016): S78—S79. http://dx.doi.org/10.1017/cem.2016.177.
Full textEjeofobiri, Chigozie Kingsley, Joy Ezinwanneamaka Ike, Mukhtar Dolapo Salawudeen, David Agyemfra Atakora, Joseph Darko Kessie, and Tolulope Onibokun. "Securing Cloud Databases Using AI and Attribute-Based Encryption." Journal of Frontiers in Multidisciplinary Research 6, no. 1 (2025): 39–47. https://doi.org/10.54660/.ijfmr.2025.6.1.39-47.
Full textCornacchia, Giandomenico, Vito W. Anelli, Fedelucio Narducci, Azzurra Ragone, and Eugenio Di Sciascio. "A General Architecture for a Trustworthy Creditworthiness-Assessment Platform in the Financial Domain." Annals of Emerging Technologies in Computing 7, no. 2 (2023): 56–64. http://dx.doi.org/10.33166/aetic.2023.02.005.
Full textOlawale, Habeeb Olatunji, Adegbola Oluwole Ogedengbe, Maxwell Nana Ameyaw, Temitayo Oluwaseun Jejeniwa, and Solomon Christopher Friday. "Standardizing Compliance Practices across AML, ESG, and Transaction Monitoring for Financial Institutions." Journal of Frontiers in Multidisciplinary Research 5, no. 2 (2024): 75–93. https://doi.org/10.54660/.jfmr.2024.5.2.75-93.
Full textOluwatosin Abdul-Azeez, Alexsandra Ogadimma Ihechere, and Courage Idemudia. "Promoting financial inclusion for SMEs: Leveraging AI and data analytics in the banking sector." International Journal of Multidisciplinary Research Updates 8, no. 1 (2024): 001–14. http://dx.doi.org/10.53430/ijmru.2024.8.1.0037.
Full textUgbaja, Unomah Success, Uloma Stella Nwabekee, Wilfred Oseremen Owobu, and Olumese Anthony Abieba. "Revolutionizing Sales Strategies through AI-Driven Customer Insights, Market Intelligence, and Automated Engagement Tools." International Journal of Social Science Exceptional Research 2, no. 1 (2023): 193–210. https://doi.org/10.54660/ijsser.2023.2.1.193-210.
Full textAnwulika Ogechukwu Scott, Prisca Amajuoyi, and Kudirat Bukola Adeusi. "Advanced risk management solutions for mitigating credit risk in financial operations." Magna Scientia Advanced Research and Reviews 12, no. 1 (2024): 212–23. http://dx.doi.org/10.30574/msarr.2024.11.1.0085.
Full textStrilok, Ivanna, Viktoriia Shkliar, and Mykola Ilinov. "ANALYSIS OF THE COMPETITIVENESS OF INTERNATIONAL COMPANIES BASED ON THE USE OF ANALYTICAL SYSTEMS." Collection of scientific research papers State University of Infrastructure and Technologies Section “Economics and Management”, no. 57 (April 10, 2025): 65–77. https://doi.org/10.32703/2664-2964-2025-57-65-77.
Full textAdesiyan Taiwo Fausiyat. "Assessing digital market access and mobile finance tools in boosting agribusiness growth among rural farming communities." World Journal of Advanced Research and Reviews 27, no. 1 (2025): 659–76. https://doi.org/10.30574/wjarr.2025.27.1.2579.
Full textInggrida, Jedda, Fadli Mulyadi, and Septian Purnama. "Rural Social Capital in Organic Farmer Institutions in Rice Organic Farming." HABITAT 34, no. 2 (2023): 190–202. http://dx.doi.org/10.21776/ub.habitat.2023.034.2.17.
Full textPowers, Jack, James M. McGree, David Grieve, Ratna Aseervatham, Suzanne Ryan, and Paul Corry. "Managing surgical waiting lists through dynamic priority scoring." Health Care Management Science, June 28, 2023. http://dx.doi.org/10.1007/s10729-023-09648-1.
Full textAnitha and Basu Anirban. "Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud Computing Using Multi Attribute QOS." February 29, 2016. https://doi.org/10.5121/ijccsa.2016.6102.
Full textPuppala, Naga Sravanthi. "Mitigating Malicious Activities in Blockchain Mining: The Role of Reputation‐Based Protocol." SECURITY AND PRIVACY 8, no. 4 (2025). https://doi.org/10.1002/spy2.70052.
Full textGonem, Sherif, Adam Taylor, Grazziela Figueredo, et al. "Dynamic early warning scores for predicting clinical deterioration in patients with respiratory disease." Respiratory Research 23, no. 1 (2022). http://dx.doi.org/10.1186/s12931-022-02130-6.
Full textLin, Ying-Jen, Allison Ranusch, F. Jacob Seagull, Jeremy B. Sussman, and Geoffrey D. Barnes. "Dynamic interplay between available resources and implementation climate across phases of implementation: a qualitative study of a VA national population health tool." Implementation Science Communications 4, no. 1 (2023). http://dx.doi.org/10.1186/s43058-023-00460-0.
Full textRajashree, Jadhav, and A. Patil G. "Automated Personal Finance Manager Using Artificial Intelligence and Machine Learning: A Survey." June 7, 2025. https://doi.org/10.5281/zenodo.15201080.
Full text-, Burhan, Nurwidyayanti -, Andi Agusniati -, Baharuddin -, and Andi Irwandi -. "A Case Study of Student Admission Management in Elementary Schools in Makassar: Transparency and Innovation." International Journal For Multidisciplinary Research 6, no. 6 (2024). https://doi.org/10.36948/ijfmr.2024.v06i06.34139.
Full textKateb, Ines, and Mouna Youssef. "Sustainability reporting quality: understanding board characteristics, CSR committees and moderation dynamics in Saudi Arabia." Social Responsibility Journal, March 17, 2025. https://doi.org/10.1108/srj-03-2024-0160.
Full textMr.Ashok, kumar Baldev bhai Prajapati. "Artificially Intelligent in Education: "Redefining Learning in the 21st Century"." Artificially Intelligent in Education: "Redefining Learning in the 21st Century" 7, no. 2 (2024). https://doi.org/10.5281/zenodo.12818287.
Full textFredericks, Bronwyn, and Abraham Bradfield. "‘More than a Thought Bubble…’." M/C Journal 24, no. 1 (2021). http://dx.doi.org/10.5204/mcj.2738.
Full textLohmeier, Christine. "Disclosing the Ethnographic Self." M/C Journal 12, no. 5 (2009). http://dx.doi.org/10.5204/mcj.195.
Full text