Journal articles on the topic 'ENHANCING SECURITY'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'ENHANCING SECURITY.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bellamkonda Sunderajulu, Kishore. "Enhancing Payment Transaction Security." International Journal of Science and Research (IJSR) 13, no. 11 (2024): 680–84. http://dx.doi.org/10.21275/sr241110202744.
Full textJaswal, Vivek. "Enhancing Cryptocurrency Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30683.
Full textJ, Stephen, and Vidyavati Ramteke. "Enhancing Security Issues in Online Games." Journal of Advanced Research in Dynamical and Control Systems 12, no. 8 (2020): 95–103. http://dx.doi.org/10.5373/jardcs/v12i8/20202451.
Full textHaedar Akib,, Lutfi Saefullah, Husain Syam, Hamsu Abdul Gani,. "ENHANCING MARITIME SECURITY COOPERATION." Psychology and Education Journal 58, no. 2 (2021): 4769–75. http://dx.doi.org/10.17762/pae.v58i2.2868.
Full textShonola, Shaibu Adekunle, and Mike Joy. "Enhancing Mobile Learning Security." International Journal on Integrating Technology in Education 5, no. 3 (2016): 01–15. http://dx.doi.org/10.5121/ijite.2016.5301.
Full textHudson, R. B. "Enhancing Elderly Financial Security." Public Policy & Aging Report 19, no. 3 (2009): 2. http://dx.doi.org/10.1093/ppar/19.3.2.
Full textPangalos, G., M. Khair, and L. Bozios. "Enhancing medical database security." Journal of Medical Systems 18, no. 4 (1994): 159–71. http://dx.doi.org/10.1007/bf00996700.
Full textWilkinson, Paul. "Enhancing global aviation security?" Terrorism and Political Violence 10, no. 3 (1998): 147–66. http://dx.doi.org/10.1080/09546559808427475.
Full textArazi, B. "Enhancing Security with Nanotechnology." Computer 39, no. 10 (2006): 106–7. http://dx.doi.org/10.1109/mc.2006.338.
Full textvan der Meer, Sico. "Enhancing International Cyber Security." Security and Human Rights 26, no. 2-4 (2015): 193–205. http://dx.doi.org/10.1163/18750230-02602004.
Full textDuggirala, Jagadeesh. "Enhancing Security with Android's SafetyNet API." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 09 (2023): 1–9. https://doi.org/10.55041/ijsrem25816.
Full textRiddhi Patel. "Custom ROMs: Enhancing Enterprise-Grade Android Security." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 1298–307. https://doi.org/10.30574/wjaets.2025.15.3.1063.
Full textModares, Hero, Amirhossein Moravejosharieh, Rosli Bin Salleh, and Jaime Lloret. "Enhancing Security in Mobile IPv6." ETRI Journal 36, no. 1 (2014): 51–61. http://dx.doi.org/10.4218/etrij.14.0113.0177.
Full textT.Deshmukh, Ashvini, and Parikshit N . Mahalle. "Enhancing Security in Linux OS." International Journal of Computer Applications 117, no. 12 (2015): 34–37. http://dx.doi.org/10.5120/20609-3239.
Full textCanfield, Jonathan, and Mary Alice Haddad. "Japan's Alliance-Enhancing Security Developments." Asia Policy 28, no. 4 (2021): 167–93. http://dx.doi.org/10.1353/asp.2021.0048.
Full text., Preetha S., Suhas Kini K. ., and Shailesh A. Patil . "ENHANCING SECURITY USING KEYSTROKE DYNAMICS." International Journal of Engineering Applied Sciences and Technology 4, no. 3 (2019): 213–25. http://dx.doi.org/10.33564/ijeast.2019.v04i03.037.
Full textAjit Pratap Singh, Rahul Kumar,. "Enhancing Security using Image Processing." International Journal of Innovative Research in Science, Engineering and Technology 04, no. 04 (2015): 2435–42. http://dx.doi.org/10.15680/ijirset.2015.0404045.
Full textAlmuqrin, Abdullah. "How About Enhancing Organizational Security." Journal of Global Information Management 32, no. 1 (2024): 1–18. http://dx.doi.org/10.4018/jgim.358745.
Full textDy-Liacco, T. E. "Enhancing power system security control." IEEE Computer Applications in Power 10, no. 3 (1997): 38–41. http://dx.doi.org/10.1109/67.595291.
Full textMcGinty, John. "Enhancing Building Security: Design Considerations." Library & Archival Security 21, no. 2 (2008): 115–27. http://dx.doi.org/10.1080/01960070802201474.
Full textRanjan, Nikhil. "Enhancing Voting Security and Efficiency." Journal of Computers, Mechanical and Management 2, no. 3 (2023): 9–15. http://dx.doi.org/10.57159/gadl.jcmm.2.3.23065.
Full textDube, Tomson, Nevel Tshuma, Gracsious Ncube, Zenzo L. Dube, and Mandlenkosi Maphosa. "Enhancing food security through microirrigation." International Journal of Development and Sustainability 3, no. 5 (2014): 1043–59. https://doi.org/10.5281/zenodo.2548667.
Full textSathishkumar, J. "Enhancing Network Security through DIPS." International Journal of Scientific Research and Engineering Trends 10, no. 2 (2024): 272–74. https://doi.org/10.61137/ijsret.vol.10.issue2.302.
Full textRathod, Sachin Dashrath. "AI In Enhancing Cyber Security." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04063.
Full textHnamte, Vanlalruata, Jamal Hussain, Samuel Lalmuanawma, Chhakchhuak Lalrinawma, and Lalchhanhima Hmar. "Enhancing Secured Network Slicer for Cloud Security Systems." Indian Journal Of Science And Technology 16, sp1 (2023): 179–91. http://dx.doi.org/10.17485/ijst/v16sp1.msc25.
Full textSingh, Dr Sachin, Piyush Rastogi, Prabal Bhatnagar, RavishKr Dubey, Salman Siddique, and Mansi Pathak. "Enhancing Blockchain Security and Efficiency with Machine Learning." International Journal of Research Publication and Reviews 6, sp5 (2025): 224–30. https://doi.org/10.55248/gengpi.6.sp525.1930.
Full textAbudalou, Mohammad Ali. "Security DevOps: Enhancing Application Delivery with Speed and Security." International Journal of Computer Science and Mobile Computing 13, no. 5 (2024): 100–104. http://dx.doi.org/10.47760/ijcsmc.2024.v13i05.009.
Full textGill, Sumeet, and Renu Devi. "Enhancing Cloud Data Security using Artificial Neural Networks for Users’ Account Hijacking Security Threats." Indian Journal Of Science And Technology 17, no. 34 (2024): 3538–52. http://dx.doi.org/10.17485/ijst/v17i34.2339.
Full textMuhammad, Faisal Nawaz, and Nawaz Yasir. "Enhancing cryptographic robustness with dual key chaining." Trends in Computer Science and Information Technology 9, no. 1 (2024): 026–33. http://dx.doi.org/10.17352/tcsit.000077.
Full textMiddae, Vijaya lakshmi. "Enhancing Cloud Security with AI-Driven Big Data Analytics." American Journal of Engineering and Technology 07, no. 05 (2025): 185–91. https://doi.org/10.37547/tajet/volume07issue05-18.
Full textRao Sangarsu, Raghavendr. "Enhancing Cyber Security Using Artificial Intelligence: A Comprehensive Approach." International Journal of Science and Research (IJSR) 12, no. 11 (2023): 8–13. http://dx.doi.org/10.21275/sr231029092527.
Full textResearcher. "BLOCKCHAIN TECHNOLOGY IN IOT: ENHANCING SECURITY AND TRUST." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 1519–30. https://doi.org/10.5281/zenodo.14221400.
Full textPandya, Darshana, Abhijeetsinh Jadeja, Madhavi Bhuptani, Vandana Patel, Kinjal Mehta, and Dipal Brahmbhatt. "Machine Learning: Enhancing Cybersecurity through Attack Detection and Identification." ITM Web of Conferences 65 (2024): 03010. http://dx.doi.org/10.1051/itmconf/20246503010.
Full textBhumeka, Narra. "Applications of Blockchain in Software Engineering: Enhancing Security, Traceability, and Transparency." International Journal of Innovative Computer Science and IT Research 01, no. 02 (2025): 1–8. https://doi.org/10.5281/zenodo.15147526.
Full textChen, Qiang, Daoming Li, and Lun Wang. "Blockchain Technology for Enhancing Network Security." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 22–28. https://doi.org/10.5281/zenodo.12786723.
Full textMolina Zarca, Alejandro, Jorge Bernal Bernabe, Ivan Farris, Yacine Khettab, Tarik Taleb, and Antonio Skarmeta. "Enhancing IoT security through network softwarization and virtual security appliances." International Journal of Network Management 28, no. 5 (2018): e2038. http://dx.doi.org/10.1002/nem.2038.
Full textKyle Dees and Syed Shawon Rahman. "Enhancing Infrastructure Security in Real Estate." International Journal of Network Security & Its Applications 3, no. 6 (2011): 59–80. http://dx.doi.org/10.5121/ijnsa.2011.3604.
Full textMahajan, Jagruti, Harshada Rathod, Parul Mankar, Monika Korde, Vaishnavi Rathod, and Professor Kalyani Pendke. "Enhancing the Cloud Security via Cryptography." International Journal of Innovations in Engineering and Science 7, no. 9 (2022): 92–96. http://dx.doi.org/10.46335/ijies.2022.7.9.18.
Full textKushwaha, Dilip Kumar, KM Priyanka, and Harleen Kaur. "Enhancing Web-Security with Stronger Captchas." International Journal of Computer Applications Technology and Research 2, no. 3 (2013): 297–301. http://dx.doi.org/10.7753/ijcatr0203.1017.
Full textKadam, Akshita D. "Enhancing Software Security for Salesforce Applications." International Journal for Research in Applied Science and Engineering Technology 7, no. 3 (2019): 2176–85. http://dx.doi.org/10.22214/ijraset.2019.3401.
Full textJafari, Said. "Enhancing Security Culture through User-Engagement." International Journal of ICT Research in Africa and the Middle East 6, no. 1 (2017): 31–39. http://dx.doi.org/10.4018/ijictrame.2017010103.
Full textFisher, Madeline. "Enhancing food security in the Northeast." CSA News 59, no. 7 (2014): 4–9. http://dx.doi.org/10.2134/csa2014-59-7-1.
Full textJose, M. Victor, and V. Seenivasagam. "Enhancing security in secure resource sharing." International Journal of Enterprise Network Management 7, no. 4 (2016): 298. http://dx.doi.org/10.1504/ijenm.2016.080457.
Full textSeenivasagam, V., and M. Victor Jose. "Enhancing security in secure resource sharing." International Journal of Enterprise Network Management 7, no. 4 (2016): 298. http://dx.doi.org/10.1504/ijenm.2016.10001386.
Full textAlzhrani, Reem, and Mohammed Alliheedi. "Enhancing IoT Security in 5G Networks." Journal of Information Security and Cybercrimes Research 7, no. 2 (2024): 156–66. https://doi.org/10.26735/mvmp8068.
Full textBohli, J.-M., N. Gruschka, M. Jensen, L. L. Iacono, and N. Marnau. "Security and Privacy-Enhancing Multicloud Architectures." IEEE Transactions on Dependable and Secure Computing 10, no. 4 (2013): 212–24. http://dx.doi.org/10.1109/tdsc.2013.6.
Full textMcKerchar, Christina, Sharron Bowers, Craig Heta, Louise Signal, and Leonie Matoe. "Enhancing Māori food security using traditionalkai." Global Health Promotion 22, no. 3 (2014): 15–24. http://dx.doi.org/10.1177/1757975914543573.
Full textEskandarpour, Rozhin, Pranav Gokhale, Amin Khodaei, Frederic T. Chong, Aleksi Passo, and Shay Bahramirad. "Quantum Computing for Enhancing Grid Security." IEEE Transactions on Power Systems 35, no. 5 (2020): 4135–37. http://dx.doi.org/10.1109/tpwrs.2020.3004073.
Full textGothawal, Deepali Bankatsingh, and S. V. Nagaraj. "Intrusion Detection for Enhancing RPL Security." Procedia Computer Science 165 (2019): 565–72. http://dx.doi.org/10.1016/j.procs.2020.01.051.
Full textValentine, J. Andrew. "Enhancing the employee security awareness model." Computer Fraud & Security 2006, no. 6 (2006): 17–19. http://dx.doi.org/10.1016/s1361-3723(06)70370-0.
Full text