Academic literature on the topic 'Mitigation strategies security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mitigation strategies security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mitigation strategies security"
Alqurashi, Fahad, Mohammed AL-Hashimi, Mostafa Saleh, and Osama Abulnaja. "Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction." Computers 14, no. 2 (2025): 71. https://doi.org/10.3390/computers14020071.
Full textLavanya, A. "Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies." International Journal of Science and Research (IJSR) 13, no. 12 (2024): 448–53. https://doi.org/10.21275/sr241205115818.
Full textAnam Amin, Laiba Tanveer, Emmania Abid, Mahnoor Absar, and Mahnoor Tariq. "Mitigation strategies for greenhouse gases to ensure food security." NUST Journal of Natural Sciences 9, no. 3 (2024): 12–30. http://dx.doi.org/10.53992/njns.v9i3.192.
Full textR, Sai Shreya, and Kavitha R. "Securing SaaS: Key Challenges and Effective Mitigation Strategies." International Journal of Multidisciplinary Research in Science, Engineering and Technology 7, no. 05 (2024): 10170–78. http://dx.doi.org/10.15680/ijmrset.2024.0705096.
Full textParuchuri, B. V. N. Prasad, and Anoop Sharma. "Developing Effective Mitigation Strategies for Data Privacy in the Metaverse." Journal of Advances and Scholarly Researches in Allied Education 21, no. 7 (2024): 346–54. https://doi.org/10.29070/9zdvqv35.
Full textA, Aarthy Devi, Ashok Kumar Mohan, and Sethumadhavan M. "Wireless Security Auditing: Attack Vectors and Mitigation Strategies." Procedia Computer Science 115 (2017): 674–82. http://dx.doi.org/10.1016/j.procs.2017.09.153.
Full textPalanisamy, Rathika, Azah Anir Norman, and Laiha Mat Kiah. "BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts." Journal of Organizational Computing and Electronic Commerce 31, no. 4 (2021): 320–42. http://dx.doi.org/10.1080/10919392.2022.2028530.
Full textSutanto, Yulius. "Cybersecurity Challenges and AI-Powered Mitigation Strategies in CCTV Surveillance Systems." International Journal of Information System and Innovative Technology 3, no. 2 (2024): 17–24. https://doi.org/10.63322/fsk65573.
Full textKumar, Akash. "Risk Mitigation and Strategies in Aviation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32352.
Full textReddy, Raghu Chaitanya Vasi. "Security Challenges and Mitigation Strategies in AI-Enhanced Integration Platforms." European Journal of Computer Science and Information Technology 13, no. 10 (2025): 46–56. https://doi.org/10.37745/ejcsit.2013/vol13n104656.
Full textDissertations / Theses on the topic "Mitigation strategies security"
Jenkins, Jeffrey Lyne. "Alleviating Insider Threats: Mitigation Strategies and Detection Techniques." Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/297023.
Full textJoelsson, Jonas. "On Swedish bioenergy strategies to reduce CO2 emissions and oil use." Doctoral thesis, Mittuniversitetet, Institutionen för teknik och hållbar utveckling, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-13868.
Full textJohansen, Johan. "Maritime political risk conceptualisation and mapping of maritime political risk in order to improve management and mitigation strategies for the offshore oil and gas industry in the Gulf of Guinea." Thesis, Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/17802.
Full textBooks on the topic "Mitigation strategies security"
Philippines) APEC Symposium on Climate Change (2012 Manila. Adaptation strategies with mitigation potential for food and water security. Asia Pacific Economic Cooperation, 2012.
Find full textAfrican Technology Policy Studies Network, ed. Tracking effective indigenous adaptation strategies on impacts of climate variability on food security and health of subsistence farmers in Tanzania. African Technology Policy Studies Network, 2011.
Find full textL, Perry Walt, ed. Withdrawing from Iraq: Alternative schedules, associated risks, and mitigating strategies. RAND, 2009.
Find full textGardiner, Drew. Balancing Act. ILO, 2024. http://dx.doi.org/10.54394/jduj2404.
Full textCISSP, Timothy Youngblood. Cybersecurity Threats, Malware Trends, and Strategies: Discover Risk Mitigation Strategies for Modern Threats to Your Organization. Packt Publishing, Limited, 2023.
Find full textYoungblood, Timothy. Cybersecurity Threats, Malware Trends, and Strategies: Discover Risk Mitigation Strategies for Modern Threats to Your Organization. de Gruyter GmbH, Walter, 2023.
Find full textCatak, Ferhat Ozgur. Cyber Security and Adversarial Machine Learning: Emerging Attacks and Mitigation Strategies. IGI Global, 2021.
Find full textTracking effective indigenous adaptation strategies on impacts of climate variability on food security and health of subsistence farmers in Tanzania. African Technology Policy Studies Network, 2011.
Find full textHuntjens, Patrick, Ting Zhang, and Katharina Nachbar. Climate Change and Implications for Security and Justice. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198805373.003.0007.
Full textWithdrawing from Iraq: Alternative schedules, associated risks, and mitigating strategies. RAND/National Defense Research Institute, 2009.
Find full textBook chapters on the topic "Mitigation strategies security"
McElreath, David Hughes, Daniel Adrian Doss, Barbara Russo, et al. "Disaster Preparedness and Mitigation Strategies." In Introduction to Homeland Security, 3rd ed. CRC Press, 2021. http://dx.doi.org/10.4324/9780429491962-7.
Full textTan, Lisa J. Y. "Economic Exploits and Risk Mitigation Strategies." In A Comprehensive Guide for Web3 Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-39288-7_6.
Full textKesavamoorthy, R., and P. Karthikeyan. "Cyberspace and Outer Space Security and Mitigation Strategies." In Cyber Space and Outer Space Security. River Publishers, 2024. http://dx.doi.org/10.1201/9781003558118-1.
Full textRajkumar, K., S. Karthikeyan, V. Kavitha, and U. Hariharan. "Ransomware Attacks in Cyber Space and Mitigation Strategies." In Cyber Space and Outer Space Security. River Publishers, 2024. http://dx.doi.org/10.1201/9781003558118-4.
Full textNisha, T. N., and Vansh Makhija. "Chatbot Security: Unveiling Vulnerabilities and Crafting Mitigation Strategies." In Algorithms for Intelligent Systems. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-3333-3_7.
Full textDwivedi, Surabhi, R. Balaji, Praveen Ampatt, and S. D. Sudarsan. "A Survey on Security Threats and Mitigation Strategies for NoSQL Databases." In Information Systems Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-49099-6_4.
Full textSingh, Swarnima, and R. B. Singh. "Systems Approach in Sustainable Livelihood Adaptation and Mitigation Strategies." In Simulating Climate Change and Livelihood Security. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4648-5_8.
Full textLiu, Jingyuan, and Pirathayini Srikantha. "Distributed Attack and Mitigation Strategies for Active Power Distribution Networks." In Security of Cyber-Physical Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45541-5_13.
Full textPatra, Subhashree, Amit Kumar, and Purabi Saikia. "Deforestation and Forests Degradation Impacts on Livelihood Security and Climate Change: Indian Initiatives Towards Its Mitigation." In Environmental Degradation: Challenges and Strategies for Mitigation. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95542-7_18.
Full textKalapodis, Nikolaos, Georgios Sakkas, Alexandre Lazarou, et al. "EU-Integrated Multifunctional Forest and Fire Management, Policies, and Practices: Challenges Between “As-Is” and “To-Be” State." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_6.
Full textConference papers on the topic "Mitigation strategies security"
Sharma, Chetna, and Chandani Sharma. "Cloud Computing Security: Threats and Mitigation Strategies." In 2024 International Conference on Signal Processing and Advance Research in Computing (SPARC). IEEE, 2024. https://doi.org/10.1109/sparc61891.2024.10829335.
Full textSheggam, Harshith, and Xiaowen Zhang. "Exploring Security Risks and Mitigation Strategies in AI Code Helpers." In 2024 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2024. https://doi.org/10.1109/lisat63094.2024.10807934.
Full textGupta, Prashant K., Bireshwar Dass Mazumdar, and Divolika Bajpai. "Information Superhighway for Neurological Disorders: Security Vulnerabilities and their mitigation strategies." In 2025 International Conference on Computer, Electrical & Communication Engineering (ICCECE). IEEE, 2025. https://doi.org/10.1109/iccece61355.2025.10940286.
Full textTawffaq, Maher Rafi, Mohammed Ahmed Jasim, Basim Ghalib Mejbel, et al. "IoT Security in a Connected World: Analyzing Threats, Vulnerabilities, and Mitigation Strategies." In 2024 36th Conference of Open Innovations Association (FRUCT). IEEE, 2024. http://dx.doi.org/10.23919/fruct64283.2024.10749944.
Full textPopic, Srdjan, Bojan Ramic, and Sasa Bojanic. "Security Challenges and Mitigation Strategies for CAN-Based Protocols: A Comprehensive Survey." In 2025 24th International Symposium INFOTEH-JAHORINA (INFOTEH). IEEE, 2025. https://doi.org/10.1109/infoteh64129.2025.10959305.
Full textAhmed, Huzaifah Tariq, Syed Asghar Abbas Zaidi, and Tariq Mumtaz. "Enhancing Security in Smart Home IoT Networks: Vulnerability Analysis and Mitigation Strategies." In 2024 26th International Multitopic Conference (INMIC). IEEE, 2024. https://doi.org/10.1109/inmic64792.2024.11004309.
Full textThummala, Venkata Reddy, Phanindra Kumar Kankanampati, Pratik Agarwal, Swethasri Kavuri, Ravi Mandliya, and Arpit Goel. "Network Security Threats and Mitigation Strategies in Mobile Networks: A Machine Learning Perspective." In 2025 International Conference on Pervasive Computational Technologies (ICPCT). IEEE, 2025. https://doi.org/10.1109/icpct64145.2025.10940458.
Full textYasani, Rajashekar Reddy, Putalpattu Muni Prasad, Pattlola Srinivas, N. V. Raja Sekhar Reddy, Parag Jawarkar, and Vedaprada Raghunath. "AI-Driven Solutions for Cloud Security Implementing Intelligent Threat Detection and Mitigation Strategies." In 2024 International Conference on Intelligent Computing and Emerging Communication Technologies (ICEC). IEEE, 2024. https://doi.org/10.1109/icec59683.2024.10837032.
Full textKarki, Ajit, and Raktim Deb. "Comprehensive Security Analysis and Threat Mitigation Strategies for Software-Defined Networking (SDN) Environments." In 2025 3rd International Conference on Intelligent Systems, Advanced Computing and Communication (ISACC). IEEE, 2025. https://doi.org/10.1109/isacc65211.2025.10969300.
Full textDavis, Brittany D., Yang Liu, and Mohd Anwar. "Repository of Metadata-Related Threats and Mitigation Strategies to Enhance Security in Smart Homes." In 2024 Conference on AI, Science, Engineering, and Technology (AIxSET). IEEE, 2024. https://doi.org/10.1109/aixset62544.2024.00035.
Full textReports on the topic "Mitigation strategies security"
Rahman, Habibur, and Wahid bin Ahsan. Fraud Mitigation, Usability Challenges, and Financial Literacy in Mobile Financial Services for Rural Bangladesh. Userhub, 2024. http://dx.doi.org/10.58947/journal.wpgr45.
Full textEise, Jessica, Natalie Lambert, Tiwaladeoluwa Adekunle, and Laura Eise. More Inclusive, More Practical: Climate Change Communication Research to Serve the Future. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317278.
Full textGonzalez Diez, Verónica M., John Redwood, and Lourdes Alvarez Prado. IDB-9: IDB Integrated Strategy for Climate Change Adaptation and Mitigation, and Sustainable and Renewable Energy. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0010531.
Full textMutyasira, Vine. A Multi-Phase Assessment of the Effects of COVID-19 on Food Systems and Rural Livelihoods in Zimbabwe. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/apra.2021.034.
Full textCenacchi, Nicola, and Timothy B. Sulser. Strategic Modeling for Future Agriculture in Asia. Asian Productivity Organization, 2025. https://doi.org/10.61145/qprg4794.
Full textAryal, Jeetendra Prakash. Contribution of Agriculture to Climate Change and Low-Emission Agricultural Development in Asia and the Pacific. Asian Development Bank Institute, 2022. http://dx.doi.org/10.56506/vaoy9373.
Full textAryal, Jeetendra P. Contribution of Agriculture to Climate Change and Low-Emission Agricultural Development in Asia and the Pacific. Asian Development Bank Institute, 2022. http://dx.doi.org/10.56506/wdbc4659.
Full textAgarwal, Smisha, Madhu Jalan, Holly C. Wilcox, et al. Evaluation of Mental Health Mobile Applications. Agency for Healthcare Research and Quality (AHRQ), 2022. http://dx.doi.org/10.23970/ahrqepctb41.
Full textErästö, Tytti, Fei Su, and Wilfred Wan. Navigating Security Dilemmas in Indo-Pacific Waters. Stockholm International Peace Research Institute, 2024. http://dx.doi.org/10.55163/dkwb3559.
Full textMosello, Beatrice, Christian König, Emily Wright, and Gareth Price. Rethinking human mobility in the face of global changes. Adelphi research gemeinnützige GmbH, 2021. http://dx.doi.org/10.55317/casc010.
Full text