To see the other types of publications on this topic, follow the link: Multi-layered security.

Journal articles on the topic 'Multi-layered security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Multi-layered security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

N, Mahima, Noor Siddiqa, and Tanvir Habib Sardar. "Multi-Layered Security System Using Cryptography and Steganography." International Journal of Innovative Research in Computer Science & Technology 7, no. 2 (2019): 8–11. http://dx.doi.org/10.21276/ijircst.2019.7.2.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vinnarasi, J., and D. I. George Amalarethinam. "Advancing Data Security in Cloud Computing: Introducing Secured Layered Technique for Data Security Approach (SLT-DSA), A Multi-Layered Security Framework." Indian Journal Of Science And Technology 18, no. 11 (2025): 848–60. https://doi.org/10.17485/ijst/v18i11.273.

Full text
Abstract:
Objective: The aim of this study is to introduce the Secured Layered Technique for Data Security Approach (SLT-DSA), a multi-layered framework designed to enrich data protection in cloud computing environments. This research aims to evaluate the effectiveness of SLT-DSA in addressing security challenges, improving data privacy, and ensuring scalability and performance in cloud-based systems. Methods: This paper has introduced the Secured Layered Technique for Data Security Approach (SLT-DSA), aimed at ensuring data security and integrity when outsourcing data in cloud environments. The enhancement of cloud data security has been demonstrated by employing a composite encryption algorithm and hash functions. The proposed SLT-DSA contains three layered techniques and secure hash algorithms, including scrambling with binary operation, dynamic key and secret key generation with encryption, and signature generation. Keys and encrypted data are kept in the AWS cloud. Findings: Three layered techniques are introduced in this work to provide secure data storage in the cloud environment. The scrambling and binary operation-based encryption technique is suggested to improve data confidence. The secure hash-based signature is used to check the integrity of data. This work presents the security analysis and experimental findings of SLT-DSA to demonstrate its superiority over existing methods. The suggested algorithm's experimental findings confirm its effectiveness with state-of-the-art encryption methods. Novelty: The results of the experiment has been improved through SLT-DSA framework. Compared to alternative encryption methods, the experimental outcomes of the suggested algorithm displayed a high degree of security, reducing cipher text size and decreasing encryption and decryption time. Keywords: Hybrid Encryption, Secure Hash, Dynamic Key, Secret Key, Layered Technique, Matrix Scrambling
APA, Harvard, Vancouver, ISO, and other styles
3

Anderson, David. "Optimising multi-layered security screening." Journal of Transportation Security 14, no. 3-4 (2021): 249–73. http://dx.doi.org/10.1007/s12198-021-00237-3.

Full text
Abstract:
Abstract Screening for prohibited items at airports is an example of a multi-layered screening process. Multiple layers of screening – often comprising different technologies with complementary strengths and weaknesses – are combined to create a single screening process. The detection performance of the overall system depends on multiple factors, including the performance of individual layers, the complementarity of different layers, and the decision rule(s) for determining how outputs from individual layers are combined. The aim of this work is to understand and optimise the overall system performance of a multi-layered screening process. Novel aspects include the use of realistic profiles of alarm distributions based on experimental observations and a focus on the influence of correlation/orthogonality amongst the layers of screening. The results show that a cumulative screening architecture can outperform a cascading one, yielding a significant increase in system-level true positive rate for only a modest increase in false positive rate. A cumulative screening process is also more resilient to weaknesses in the individual layers. The performance of a multi-layered screening process using a cascading approach is maximised when the false positives are orthogonal across the different layers and the true positives are correlated. The system-level performance of a cumulative screening process, on the other hand, is maximised when both false positives and true positives are as orthogonal as possible. The cost of ignoring orthogonality between screening layers is explored with some numerical examples. The underlying software model is provided in a Jupyter Notebook as supplementary material.
APA, Harvard, Vancouver, ISO, and other styles
4

Hong, Jin B., and Dong Seong Kim. "Towards scalable security analysis using multi-layered security models." Journal of Network and Computer Applications 75 (November 2016): 156–68. http://dx.doi.org/10.1016/j.jnca.2016.08.024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Song-Kyoo (Amang). "Multi-Layered Blockchain Governance Game." Axioms 11, no. 1 (2022): 27. http://dx.doi.org/10.3390/axioms11010027.

Full text
Abstract:
The research designs a new integrated system for the security enhancement of a decentralized network by preventing damages from attackers, particularly for the 51 percent attack. The concept of multiple layered design based on Blockchain Governance Games frameworks could handle multiple number of networks analytically. The Multi-Layered Blockchain Governance Game is an innovative analytical model to find the best strategies for executing a safety operation to protect whole multiple layered network systems from attackers. This research fully analyzes a complex network with the compact mathematical forms and theoretically tractable results for predicting the moment of a safety operation execution are fully obtained. Additionally, simulation results are demonstrated to obtain the optimal values of configuring parameters of a blockchain-based security network. The Matlab codes for the simulations are publicly available to help those whom are constructing an enhanced decentralized security network architecture through this proposed integrated theoretical framework.
APA, Harvard, Vancouver, ISO, and other styles
6

Paul, P. Victer, and D. Veeraiah. "Multi-Layered Security Model for Hadoop Environment." International Journal of Handheld Computing Research 8, no. 4 (2017): 58–71. http://dx.doi.org/10.4018/ijhcr.2017100106.

Full text
Abstract:
In this article, a novel security model for the Hadoop environment has been developed to enhance security credentials of handheld systems. The proposed system deals with enabling Hadoop security in terms of a dataset and a user which is willing to access the content inside the Hadoop system. It deals with security in terms of three different features: encryption, confidentiality and authentication. The significance of the proposed model is it provides protection against malicious intent which allows only valid content into the Big data system; it enables authenticated users and people to enter into the system and make the dataset more secure; and if authentication is enhanced, then authorization can be easily gained in the Hadoop system which provides access control and access rights to resource which the user is willing to perform its function or operation. This model is implemented, and the performance has been validated using existing security variants.
APA, Harvard, Vancouver, ISO, and other styles
7

Yadaiah, Dr K. "Multi Layered Security System and Alert System." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 1856–61. https://doi.org/10.22214/ijraset.2025.71956.

Full text
Abstract:
This paper proposes a robust security system for a safe, integrating fingerprint recognition, movement recognition, and vibration detection. The system uses an Arduino microcontroller to process input from a fingerprint sensor and a keypad. A predetermined key is established, and if an incorrect key is entered 3 times or fingerprint verification fails, an alert message is sent, and a phone call is initiated to the user or client. Additionally, the Sensors constantly monitor the safe. If the safe is forcibly opened or moved from the original place, it triggers an immediate alert, notifying the user of the breach. This integrated approach provides a comprehensive security solution that effectively protects the contents of the safe from unauthorized access and physical tampering. This system is more efficient than the regular safe and can be used to avoid tampering with evidence in criminal cases, where the evidence collected needs to be stored. It can be used to protect or preserve precious and important things like jewellery, money, antiques, etc.
APA, Harvard, Vancouver, ISO, and other styles
8

J, Vinnarasi, and I. George Amalarethinam2 D. "Advancing Data Security in Cloud Computing: Introducing Secured Layered Technique for Data Security Approach (SLT-DSA), A Multi-Layered Security Framework." Indian Journal of Science and Technology 18, no. 11 (2025): 848–60. https://doi.org/10.17485/IJST/v18i11.273.

Full text
Abstract:
Abstract <strong>Objective:</strong>&nbsp;The aim of this study is to introduce the Secured Layered Technique for Data Security Approach (SLT-DSA), a multi-layered framework designed to enrich data protection in cloud computing environments. This research aims to evaluate the effectiveness of SLT-DSA in addressing security challenges, improving data privacy, and ensuring scalability and performance in cloud-based systems.&nbsp;<strong>Methods:</strong>&nbsp;This paper has introduced the Secured Layered Technique for Data Security Approach (SLT-DSA), aimed at ensuring data security and integrity when outsourcing data in cloud environments. The enhancement of cloud data security has been demonstrated by employing a composite encryption algorithm and hash functions. The proposed SLT-DSA contains three layered techniques and secure hash algorithms, including scrambling with binary operation, dynamic key and secret key generation with encryption, and signature generation. Keys and encrypted data are kept in the AWS cloud.&nbsp;<strong>Findings:</strong>&nbsp;Three layered techniques are introduced in this work to provide secure data storage in the cloud environment. The scrambling and binary operation-based encryption technique is suggested to improve data confidence. The secure hash-based signature is used to check the integrity of data. This work presents the security analysis and experimental findings of SLT-DSA to demonstrate its superiority over existing methods. The suggested algorithm's experimental findings confirm its effectiveness with state-of-the-art encryption methods.&nbsp;<strong>Novelty:</strong>&nbsp;The results of the experiment has been improved through SLT-DSA framework. Compared to alternative encryption methods, the experimental outcomes of the suggested algorithm displayed a high degree of security, reducing cipher text size and decreasing encryption and decryption time. <strong>Keywords:</strong> Hybrid Encryption, Secure Hash, Dynamic Key, Secret Key, Layered Technique, Matrix Scrambling
APA, Harvard, Vancouver, ISO, and other styles
9

Rodriguez, Stephen, and Paolina Centonze. "Multi-Layered Dynamic Encryption Security Scheme for Cloud Data Storage." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 3 (2017): 6233–39. http://dx.doi.org/10.24297/ijct.v16i3.6150.

Full text
Abstract:
This journal article discusses our Dynamic Encryption Key Security Scheme (DEKSS) and the purpose it serves in providing a new security architecture for protecting databases used in technology stacks involving Mobile and Cloud based devices. Our security scheme is a novel architectural strategy that implements a full-stack architecture for the dispatching and management of data between several Cloud Service Providers (CSP) and any number of mobile devices. This strategy can promise data security needs for both mobile devices and cloud service providers without impacting the security requirements of the other party. While there are limitations in being truly secure, such as those recognized by WhiteHat security in their annual report[1], we believe that our security scheme can effectively circumvent potential threats and secure data through folding data using any number of encryption layers for every table and column of data to be stored. Through this approach, we have found our work to be applicable to a variety of different audiences within the cloud security space.
APA, Harvard, Vancouver, ISO, and other styles
10

Kallapu, Bhavya, Avinash Nanda Janardhan, Rama Moorthy Hejamadi, et al. "Multi-Layered Security Framework Combining Steganography and DNA Coding." Systems 13, no. 5 (2025): 341. https://doi.org/10.3390/systems13050341.

Full text
Abstract:
With the rapid expansion of digital communication and data sharing, ensuring robust security for sensitive information has become increasingly critical, particularly when data are transmitted over public networks. Traditional encryption techniques are increasingly vulnerable to evolving cyber threats, making single-layer security mechanisms less effective. This study proposes a multi-layered security approach that integrates cryptographic and steganographic techniques to enhance data protection. The framework leverages advanced methods such as encrypted data embedding in images, DNA sequence coding, QR codes, and least significant bit (LSB) steganography. To evaluate its effectiveness, experiments were conducted using text messages, text files, and images, with security assessments based on PSNR, MSE, SNR, and encryption–decryption times for text data. Image security was analyzed through visual inspection, correlation, entropy, standard deviation, key space analysis, randomness, and differential analysis. The proposed method demonstrated strong resilience against differential cryptanalysis, achieving high NPCR values (99.5784%, 99.4292%, and 99.5784%) and UACI values (33.5873%, 33.5149%, and 33.3745%), indicating robust diffusion and confusion properties. These results highlight the reliability and effectiveness of the proposed framework in safeguarding data integrity and confidentiality, providing a promising direction for future cryptographic research.
APA, Harvard, Vancouver, ISO, and other styles
11

Denman, Simon. "Why multi-layered security is still the best defence." Network Security 2012, no. 3 (2012): 5–7. http://dx.doi.org/10.1016/s1353-4858(12)70043-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Gurdeep Kaur Gill. "Multi-Layered NGFW Protection Shield for AI Infrastructure." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 2863–74. https://doi.org/10.30574/wjarr.2025.26.1.1354.

Full text
Abstract:
Next-Generation Firewalls (NGFWs) have emerged as critical safeguards for artificial intelligence systems in an era of rapid AI adoption across sectors. This article gives the multifaceted role of NGFWs in protecting AI infrastructure, analyzing their advanced architectural features, threat mitigation capabilities, and contributions to regulatory compliance. By integrating application awareness, SSL/TLS inspection, identity management, and AI-specific security mechanisms, NGFWs provide layered protection against sophisticated threats such as data poisoning, model extraction, and adversarial attacks. The article explores implementation case studies across healthcare, finance, manufacturing, and public sectors, revealing sector-specific security challenges and effective mitigation strategies. The article analysis further shows how NGFWs support ethical AI deployment and compliance with evolving data protection regulations. Looking forward, the convergence of AI and security technologies promises enhanced detection accuracy and automated response capabilities, ultimately fostering public trust in AI systems. This article demonstrates that implementing robust NGFW protection represents not merely a technological safeguard but an essential foundation for responsible and trustworthy AI integration across society and economies.
APA, Harvard, Vancouver, ISO, and other styles
13

Chu, Xiao Jie, Fei Yu, Shan Xiong Chen, and Zhang Jun Dai. "Study on Characteristics of Additional Stress and Bearing Capacity of Multi-Layered Foundation in Northern Anhui." Applied Mechanics and Materials 513-517 (February 2014): 2651–54. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2651.

Full text
Abstract:
The shortage of foundation bearing capacity would pose damage to miniature structures on highway, threatening the security of highway. Layered foundations are widely distributed in Northern Anhui, the traditional methods of computing the bearing capacity and additional stress disagree with the situation of complexity and uncertainty multi-layered foundation. To study the characteristics of additional stress and bearing capacity of multi-layered foundation in Northern Anhui using numerical method of FLAC3D and analyze the influencing factors of soil structure, soil thickness and basis width on the diffusion laws and bearing capacity. The results can be references in the site survey and engineering design of multi-layered foundation.
APA, Harvard, Vancouver, ISO, and other styles
14

Princess Eloho Odio, Richard Okon, Mary Oyenike Adeyanju, Chikezie Paul-Mikki Ewim, and Obianuju Clement Onwuzulike. "Blockchain and Cybersecurity: A dual approach to securing financial transactions in Fintech." Gulf Journal of Advance Business Research 3, no. 2 (2025): 380–409. https://doi.org/10.51594/gjabr.v3i2.89.

Full text
Abstract:
The rapid growth of the fintech industry has led to an increased reliance on digital financial transactions, which simultaneously presents significant cybersecurity risks. This abstract explores the potential of combining blockchain technology with advanced cybersecurity protocols to create a dual-layered approach to securing financial transactions and protecting customer data in fintech applications. Blockchain, with its decentralized and immutable nature, offers inherent security benefits, making it an ideal foundation for enhancing the integrity of financial transactions. Each transaction recorded on a blockchain is cryptographically secured, ensuring that data cannot be altered retroactively, thus preventing fraud and unauthorized access. However, while blockchain technology provides a robust mechanism for securing transaction data, it is not immune to all forms of cyber threats, particularly those targeting the endpoints or vulnerabilities in smart contracts. Advanced cybersecurity protocols, such as encryption, multi-factor authentication, and intrusion detection systems, complement blockchain’s capabilities by safeguarding the broader fintech ecosystem. These protocols can be used to secure access points, ensure data privacy, and enhance the detection of malicious activities that might bypass blockchain’s security features. The integration of blockchain with cybersecurity measures creates a multi-layered defense system that not only protects transaction integrity but also mitigates risks associated with data breaches, phishing attacks, and insider threats. For example, encryption techniques can ensure that sensitive customer data remains confidential, while blockchain ensures the immutability of transaction records. Furthermore, smart contract security protocols can prevent vulnerabilities in decentralized finance (DeFi) applications from being exploited by malicious actors. By combining these two technologies, fintech companies can significantly enhance the security of financial transactions, improve customer trust, and ensure compliance with regulatory standards. This dual approach strengthens the resilience of fintech platforms against evolving cyber threats and enhances the overall security posture of the industry. Keywords: Blockchain, Cybersecurity, Fintech, Financial Transactions, Data Integrity, Encryption, Smart Contracts, Decentralized Finance, Multi-Layered Security, Fraud Prevention.
APA, Harvard, Vancouver, ISO, and other styles
15

Memon, Qurban A. "Multi-Layered Multimodal Biometric Authentication for Smartphone Devices." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 15 (2020): 222. http://dx.doi.org/10.3991/ijim.v14i15.15825.

Full text
Abstract:
As technological advances in smartphone domain increase, so are the issues that pertain to security and privacy. In current literature, multimodal biometric approach is addressed at length for purpose of improving secured access into personal devices. Moreover, most of the financial institutions such as banks, etc. enforce two or three step access into their corporate data to enforce security. However, personal devices currently do not support similar applications or way of enforcing multilayered access to its different domains/regions of data. In this paper, a multilayered multimodal biometric approach using three biometric methods (such as finger print, face and voice) is proposed for smartphones. It is shown that fusion of biometric methods can be layered to enforce secured access to private data on smartphone. The experimental results are presented.
APA, Harvard, Vancouver, ISO, and other styles
16

Deepika, M., and Md Abdul Gulzar Begum. "Authorizing the Communication between Pacemaker and Controller." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44309.

Full text
Abstract:
The traditional pacemaker devices lack security measures. To enhance security between devices &amp; the controller that addresses the unauthorized action, it can be done by integrating a multi-layered authentication system, which contains additional security layers to protect the sensitive data. The pacemaker system is designed to maintain the heartbeat of the patient and track pulse rate, temperature &amp; blood pressure. The data collected from the patient is processed and transmitted to the application for data analysis. The system verifies the authorized check, if it fails then the alert message will be forwarded to the doctor and the admin by notifying that unauthorized access attempt. Only the authorized person like the doctor and the admin can interact with the application. This multi-layered security helps to reduce the risk of malicious occurrence which can lead to pacemaker malfunctioning. This project deals with the importance of prioritizing both patients safety and the data integrity Keywords multi factor authentication, role-based access control, jeopardize, inadequate, anomaly detection, pacemaker.
APA, Harvard, Vancouver, ISO, and other styles
17

MD, Shahnawaz Sakib, Danyaal Muhammad, and Bo Lili. "Hardware System Security: A Comprehensive Approach." International Journal of Computer Science and Information Technology Research 13, no. 1 (2025): 1–3. https://doi.org/10.5281/zenodo.14631605.

Full text
Abstract:
<strong>Abstract:</strong> In today&rsquo;s digital landscape, safeguarding sensitive data and critical systems from hardware-based threats is crucial. This research proposes a multi-layered security framework to defend against physical attacks, supply chain vulnerabilities, and side-channel attacks. The framework integrates hardware-based security mechanisms, software countermeasures, and rigorous security management practices to provide comprehensive protection. <strong>Keywords:</strong> Hardware System Security, digital landscape, critical systems, multi-layered security. Framework. <strong>Title:</strong> Hardware System Security: A Comprehensive Approach <strong>Author:</strong> MD Shahnawaz Sakib, Muhammad Danyaal, Lili Bo <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 13, Issue 1, January 2025 - March 2025</strong> <strong>Page No: 1-3</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 11-January-2025</strong> <strong>DOI: https://doi.org/10.5281/zenodo.14631605</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/hardware-system-security-a-comprehensive-approach</strong>
APA, Harvard, Vancouver, ISO, and other styles
18

Swaroop, B. Satya, Keerthipati Sowmya, Kurmapu Nitish Rao, Mohammad Zeeshanuddin Shah, and Kola Nithin. "Advanced Cloud-Integrated Multi-Layered Security for E-Health Records Protection." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1671–79. https://doi.org/10.22214/ijraset.2025.67630.

Full text
Abstract:
Abstract: As cloud technology becomes more prevalent in healthcare, protecting electronic health records (EHRs) from unauthorized access, data breaches, and cyber threats has emerged as a crucial issue. This study introduces an Advanced CloudIntegrated Multi-Layer Security Framework that employs multi-factor authentication (MFA), sophisticated encryption techniques, role-based access control (RBAC), and continuous security monitoring to guarantee the confidentiality, integrity, and accessibility of patient information. The proposed system utilizes AES-256 encryption and SHA-256 hashing to protect data, while a Security Information and Event Management (SIEM)-based monitoring system improves threat identification and response. Experimental findings show that the framework delivers robust authentication accuracy, low encryption overhead, and scalable cloud deployment, making it appropriate for large-scale healthcare applications. By incorporating strong security measures, this framework ensures adherence to regulatory standards like HIPAA and GDPR while maintaining efficiency and usability in cloud-based healthcare settings. Future research will explore AI-powered anomaly detection and blockchain integration to further enhance security.
APA, Harvard, Vancouver, ISO, and other styles
19

Issaka Hassane, Abdoul Aziz, Ali Hamadou, Kadri Chaibou, and Lanciné Camara. "CYBERSECURITY ON IOT SYSTEMS BASED MULTI-LAYERED SECURITY RISK ASSESSMENT." International Journal of Engineering Applied Sciences and Technology 09, no. 03 (2024): 105–14. http://dx.doi.org/10.33564/ijeast.2024.v09i03.009.

Full text
Abstract:
IoT systems contribute to digital transformation through the development of smart concepts. However, the IoT has also generated new security challenges that require security tools to be adapted, such as risk analysis methodologies. Many organizations use a variety of methods and frameworks to assess cybersecurity risks. However, most current risk assessment methods are for generic software systems, so there is no holistic approach to risk assessment for IoT technologies, especially due to the diversity of IoT systems The purpose of our study is based on the following question: What IoT device factors should be considered in cybersecurity risk assessment methods? In this study we first propose a cybersecurity risk assessment model based on vectors such as vulnerabilities and attacks, which evaluates the security risk from different dimensions of physical layer, network layer and application layer. Secondly, we design the mathematical assessment model for computing risk value of IoT system and then establish the mapping relationship table that the risk value is transformed into risk level.
APA, Harvard, Vancouver, ISO, and other styles
20

Meruga, Jeevan M., Carly Fountain, Jon Kellar, et al. "Multi-layered covert QR codes for increased capacity and security." International Journal of Computers and Applications 37, no. 1 (2015): 17–27. http://dx.doi.org/10.1080/1206212x.2015.1061254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Gandotra, Vandana, Archana Archana Singhal, and Punam Bedi. "Layered security architecture for threat management using multi-agent system." ACM SIGSOFT Software Engineering Notes 36, no. 5 (2011): 1–11. http://dx.doi.org/10.1145/2020976.2020984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Jenifar, Khan Subham Sengupta Sudipta Sahana*. "MULTI-LAYERED RGB BASED SECURE TECHNIQUE FOR DATA TRANSFER." Global Journal of Engineering Science and Research Management 4, no. 3 (2017): 77–84. https://doi.org/10.5281/zenodo.439256.

Full text
Abstract:
Network Security has become very important in today’s world, as a result of which various methods are adopted to bypass it. Network administrators need to keep up with the recent advancements in both the hardware and software fields to prevent their as well as the user’s data. The paper briefly introduces the concept of data security i.e. a manually generated shift key based cryptographic technique which (de)ciphers the fragmented plain text. Here both encryption and decryption methodologies are proposed. The paperwork outlines a cryptographic algorithm based on a user defined shift key modus operandi engendering ciphers at bay. First, it creates an IDT (Induced Dynamic Table) to refer the position of the plain text characters. Then the next cipher is fabricated by setting the ART (Axis Rotation Table) according to the shift key. Subsequently, the further cipher is induced by a FFC (Four Face Cube). Later, the new partial cipher text characters are put into a definite sequence to get the standard color palette in RGB format. Hence, our final cipher with the shift key characters at the additional first and last color respectively in RGB format is generated. During decryption methodology, the color is selected and is opened in the standard color palette. The RGB values of the special characters has their own signature to what makes them different from the other plain characters in the time of decryption. The proposed methodology ensures significant use in both, data transfer and network security.
APA, Harvard, Vancouver, ISO, and other styles
23

Батталова, Alina Battalova, Кундакчян, and Rezeda Kundakchyan. "PROBLEMS OF FOOD SAFETY OF RUSSIA IN THE GLOBALIZED ECONOMY." Vestnik of Kazan State Agrarian University 10, no. 2 (2015): 5–9. http://dx.doi.org/10.12737/12041.

Full text
Abstract:
Food safety takes an increasingly prominent place in the study of social and economic, political, environmental and other scientific fields. This means, that food security problem is not only relevant, but also a complex and multi-faceted and multi-layered.
APA, Harvard, Vancouver, ISO, and other styles
24

Researcher. "ADVANCED MULTI-LAYERED CLOUD SECURITY: A NOVEL FRAMEWORK FOR THREAT DETECTION AND PREVENTION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 823–35. https://doi.org/10.5281/zenodo.14243429.

Full text
Abstract:
In the rapidly evolving landscape of cloud computing, security is the most critical non-functional requirement, with any breach or vulnerability posing significant threats to organizational integrity and trust. This article presents a groundbreaking multi-layered security framework that fortifies cloud applications through innovative controls and advanced detection mechanisms across Network Security, Authentication, Authorization, and API Security layers. The framework introduces novel methodologies for intercepting and neutralizing threats proactively, incorporating zero-trust principles, sophisticated authentication mechanisms, least privilege access controls, and comprehensive API security measures. Our implementation demonstrates remarkable improvements in threat detection, incident response times, and overall system resilience, setting new industry standards for cloud security while maintaining operational efficiency and user productivity. The results validate the effectiveness of integrating artificial intelligence, machine learning, and automated response mechanisms in modern cloud security architectures, providing organizations with a robust foundation for protecting their cloud infrastructure against evolving cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
25

Guman Singh Chauhan and Rahul Jadon. "AI and ML-Powered CAPTCHA and advanced graphical passwords: Integrating the DROP methodology, AES encryption and neural network-based authentication for enhanced security." World Journal of Advanced Engineering Technology and Sciences 1, no. 1 (2020): 121–32. https://doi.org/10.30574/wjaets.2020.1.1.0027.

Full text
Abstract:
Background Information: Advanced automated attacks and unauthorized access are frequently not prevented by traditional CAPTCHA and password procedures. Combining encryption, graphical passwords, AI, and ML provides a strong solution to today's cybersecurity issues, improving security and usability. Objective: To create a thorough multi-layered authentication system that efficiently combats advanced cyberthreats by integrating AI-powered CAPTCHA, graphical passwords using the DROP approach, AES encryption, and neural network-based authentication. Methods: The solution incorporates neural networks for behavioral analysis and real-time threat detection, graphical passwords based on DROP for dynamic engagement, AES encryption for safe data transport, and AI-driven CAPTCHA for human verification. Results: The suggested approach outperforms conventional techniques in terms of speed, accuracy, and resistance to automated and brute-force attacks, achieving 96.8% accuracy, a false positive rate of 0.01%, and a security level of 9.5. Conclusion The multi-layered strategy greatly improves authentication security, effectively thwarting sophisticated cyberthreats while maintaining a flawless user experience, which qualifies it for high-security settings.
APA, Harvard, Vancouver, ISO, and other styles
26

Soundararajan, Balaji. "Implementing Payment System Security: A Technical Deep Dive." International Journal of Multidisciplinary Research and Growth Evaluation. 3, no. 5 (2022): 615–21. https://doi.org/10.54660/.ijmrge.2022.3.5.615-621.

Full text
Abstract:
The rapid transition from cash-based to digital payment systems underscores the critical need for robust security frameworks to safeguard sensitive financial data and maintain public trust. This paper explores the foundational principles of payment system security that includes data integrity, confidentiality, and availability and examines key technologies and methodologies designed to mitigate risks, including encryption, tokenization, and authentication mechanisms. Symmetric and asymmetric encryption techniques are analyzed for their roles in securing transactional data, while tokenization is highlighted as a method to reduce exposure of sensitive information. Secure communication protocols such as TLS and multi-factor authentication (MFA), including biometric verification, are discussed as essential layers of defense against evolving cyber threats. The challenges of securing mobile payment systems and compliance with regulations like PCI DSS are also addressed. The study concludes that a multi-layered security approach, coupled with adherence to evolving standards and user education, is vital to sustaining trust in digital payment ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
27

Swati Yadav. "Enhancing Security in Multi-Tenant Cloud Environments: Threat Detection, Prevention, and Data Breach Mitigation." Journal of Information Systems Engineering and Management 10, no. 22s (2025): 61–72. https://doi.org/10.52783/jisem.v10i22s.3472.

Full text
Abstract:
Although multi-tenant cloud infrastructures are more cost-effective and scalable, they also raise serious security issues, especially with regard to insider threats and data breaches. The security and integrity of data are seriously threatened by these dangers, which come from authorised users. By examining potential insider threats, risk factors, and mitigation techniques, this study investigates the vulnerabilities present in multi-tenant cloud infrastructures. To improve cloud security, a multi-layered security architecture is suggested, incorporating enhanced access control mechanisms, behavioral analytics, and Zero Trust Architecture. Moreover, encryption, continuous monitoring, and employee awareness programs are also discussed as mandatory elements for risk mitigation. With the implementation of proactive security measures, organizations can solidify their defenses against new cyber threats and maintain safe cloud operations.
APA, Harvard, Vancouver, ISO, and other styles
28

Alhusayni, Ahmed, Vijey Thayananthan, Aiiad Albeshri, and Saleh Alghamdi. "Decentralized Multi-Layered Architecture to Strengthen the Security in the Internet of Things Environment Using Blockchain Technology." Electronics 12, no. 20 (2023): 4314. http://dx.doi.org/10.3390/electronics12204314.

Full text
Abstract:
Smart devices are connected to IoT networks and the security risks are substantial. Using blockchain technology, which is decentralized and distributed, 5G-enabled IoT networks might be able to tackle security issues. In order to simplify the implementation and security of IoT networks, we propose a multi-level blockchain security model. As part of the multi-level architecture, the communication between levels is facilitated by clustering. IoT networks define unknown clusters with applications that utilize the evolutionary computation method coupled with anatomy simulation and genetic methodologies. Authentication and authorization are performed locally by the super node. The super node and relevant base stations can communicate using local private blockchain implementations. A blockchain improves security and enhances trustworthiness by providing network authentication and credibility assurance. The proposed model is developed using the open-source Hyperledger Fabric blockchain platform. Stations communicate securely using a global blockchain. Compared to the earlier reported clustering algorithms, simulations demonstrate the efficacy of the proposed algorithm. In comparison with the global blockchain, the lightweight blockchain is more suitable for balancing network throughput and latency.
APA, Harvard, Vancouver, ISO, and other styles
29

Raghavendra Kurva. "Real-Time Data Integrity Validation Using Blockchain for Autonomous Vehicles." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1275–82. https://doi.org/10.32628/cseit25112455.

Full text
Abstract:
This article presents a comprehensive framework for implementing blockchain-based data integrity validation in autonomous vehicles. The proposed system addresses critical challenges in securing real-time sensor data through a hybrid architecture combining Hyperledger Fabric with Apache Kafka. By integrating distributed ledger technology with optimized data processing mechanisms, the system achieves both security and performance requirements essential for autonomous vehicle operations. The architecture incorporates smart contracts for data validation, multi-layered security protocols, and efficient data streaming capabilities. Results demonstrate that the proposed solution successfully balances the competing demands of data security and real-time processing, making it suitable for deployment in production autonomous vehicle environments.
APA, Harvard, Vancouver, ISO, and other styles
30

B. Angel Rubavathy. "Adaptive Multi-Layered Elgamal Cryptosystem with Machine Learning-Based Security for Cloud Data Allocation and Access Control." Journal of Information Systems Engineering and Management 10, no. 22s (2025): 573–80. https://doi.org/10.52783/jisem.v10i22s.3603.

Full text
Abstract:
The advancements in cloud computing have been happening at a high pace, where there has been an ever-growing need to offer data security. This work proposes an Adaptive Multi-Layered ElGamal Cryptosystem (AMLEC), a new security model incorporating heterogeneous cryptographic methods along with optimal cloud data distribution and access management. AMLEC is stabilized beyond standard ElGamal cryptosystem by supporting different input-output channels of encryption, metadata-oriented binary translation and attribute-based key derivation to protect safe encryption. Adaptive security guard employs machine learning for one-time three-key encryption policy with fuzzy-level security choice selection. To provide secure cloud storage and use, the system uses an Optimized Allocation Strategy (OAS) to dynamically make decisions regarding appropriate storage providers based on security and performance needs. In a multi-layered security framework is suggested with a Cloud Service Provider (CSP) having a sophisticated job scheduler, a Sensitive Document Analyzer for encrypted access control and classification and User/Tenant Tracker for integrity and transparency. The proposed AMLEC framework offers privacy, high-quality cryptography and intelligent resource management and hence forms a robust solution to secure cloud computing environments.
APA, Harvard, Vancouver, ISO, and other styles
31

Urciuoli, Luca. "Supply chain security—mitigation measures and a logistics multi-layered framework." Journal of Transportation Security 3, no. 1 (2009): 1–28. http://dx.doi.org/10.1007/s12198-009-0034-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Abu, Juha Ahmed Muid, Kumar Das Sudipta, Sydur Rahman MD, and Md. Mahbubur Rahman Dr. "Enhancing Image Encryption with Quadrant-Based Layered Multi-Key Systems." International Journal of Mathematics and Computer Research 12, no. 12 (2024): 4633–40. https://doi.org/10.5281/zenodo.14265604.

Full text
Abstract:
The exponential growth of technology poses significant challenges to the robustness of currentencryption methods, such as AES and DES, which may become vulnerable soon. This researchintroduces a novel approach, the Layered Multi-Key Encryption and Decryption System,designed to enhance the security and efficiency of image encryption. The proposed systememploys Quadrant-Based Keys, a unique technique that divides an image into quadrants andapplies distinct keys to each section, creating an additional layer of complexity. By focusing oncolor channels, this method ensures granular encryption, making unauthorized accessexceedingly difficult. Experimental results demonstrate that this system outperforms traditionalalgorithms in terms of speed and security. However, the requirement to save keys in a .mat fileposes a slight limitation, as these keys are essential for decryption. This research paves the wayfor next-generation encryption systems, offering a robust solution for secure image datatransmission and storage.
APA, Harvard, Vancouver, ISO, and other styles
33

Sykot, Arman, Md Shawmoon Azad, Wahida Rahman Tanha, B. M. Monjur Morshed, Syed Emad Uddin Shubha, and M. R. C. Mahdy. "Multi-layered security system: Integrating quantum key distribution with classical cryptography to enhance steganographic security." Alexandria Engineering Journal 121 (May 2025): 167–82. https://doi.org/10.1016/j.aej.2025.02.056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Naga Krishna Mahesh Pulikonda. "Multi-Layered AI-enhanced compliance architecture for financial data engineering." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 3666–73. https://doi.org/10.30574/wjarr.2025.26.2.1935.

Full text
Abstract:
This article presents a comprehensive framework for regulatory intelligence and compliance automation in the financial services sector using large language models and cloud technologies. The article addresses the exponential growth in financial data volumes and the increasing complexity of regulatory frameworks by proposing a multi-layered security architecture that embeds AI capabilities throughout the compliance lifecycle. The framework integrates advanced identity and access intelligence, predictive data sensitivity tagging, intelligent monitoring with complete lineage tracking, and automated governance mechanisms to create a cohesive compliance ecosystem. Implementation on AWS demonstrates significant improvements in processing capacity, scalability, availability, and security while reducing operational costs. A case study of a tier-one financial institution highlights substantial efficiency gains in transaction processing and regulatory reporting accuracy. The article contributes valuable insights into the integration of AI and cloud technologies for next-generation financial compliance management while identifying future research directions and implications for compliance engineering practice.
APA, Harvard, Vancouver, ISO, and other styles
35

Mahmood, Zeba, and Vacius Jusas. "Blockchain-Enabled: Multi-Layered Security Federated Learning Platform for Preserving Data Privacy." Electronics 11, no. 10 (2022): 1624. http://dx.doi.org/10.3390/electronics11101624.

Full text
Abstract:
Privacy and data security have become the new hot topic for regulators in recent years. As a result, Federated Learning (FL) (also called collaborative learning) has emerged as a new training paradigm that allows multiple, geographically distributed nodes to learn a Deep Learning (DL) model together without sharing their data. Blockchain is becoming a new trend as data protection and privacy are concerns in many sectors. Technology is leading the world and transforming into a global village where everything is accessible and transparent. We have presented a blockchain enabled security model using FL that can generate an enhanced DL model without sharing data and improve privacy through higher security and access rights to data. However, existing FL approaches also have unique security vulnerabilities that malicious actors can exploit and compromise the trained model. The FL method is compared to the other known approaches. Users are more likely to choose the latter option, i.e., providing local but private data to the server and using ML apps, performing ML operations on the devices without benefiting from other users’ data, and preventing direct access to raw data and local training of ML models. FL protects data privacy and reduces data transfer overhead by storing raw data on devices and combining locally computed model updates. We have investigated the feasibility of data and model poisoning attacks under a blockchain-enabled FL system built alongside the Ethereum network and the traditional FL system (without blockchain). This work fills a knowledge gap by proposing a transparent incentive mechanism that can encourage good behavior among participating decentralized nodes and avoid common problems and provides knowledge for the FL security literature by investigating current FL systems.
APA, Harvard, Vancouver, ISO, and other styles
36

Walters, Robert. "Cross-Border Data Flows: An Evolving Multi-Layered Regulatory Approach Required!" Global Privacy Law Review 3, Issue 1 (2022): 29–45. http://dx.doi.org/10.54648/gplr2022004.

Full text
Abstract:
This article will discuss the increasing importance of the multi-layered approach that personal data is taking in transnational cross-border data flows. It examines the role personal data plays in the evolving digital economy. The article will address a further accentuating question as to how far, if at all, the cross-border data flows are being considered in the area of national security. Throughout the outbreak of coronavirus, technology has been used by nation states to trace and collect health data of its citizens, in the interest of the broader national interest/security of individual states. Some states in developing the technology to track and trace their citizens went one step further and established bilateral agreements to share some of the data, such as Australia and Singapore. What emerged, was the evolving complex layers regulating while enabling data flows. The dichotomy facing governments and regulators is to allow for the free flow of personal data, while ensuring data subjects do not relinquish their privacy. To achieve this, I propose a Theory Of Action (TOA). Such an approach is widely accepted in other industry sectors where governments regulated a minimum standard, such as primary, human health and food production. Cross-Border Data Flows, Data Transfers, Digital Economy, National Security, Trade in Data
APA, Harvard, Vancouver, ISO, and other styles
37

Matey, Preeti. "Strengthening Database Security: RBAC, Encryption, Backup, and 2FA Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–8. https://doi.org/10.55041/ijsrem39950.

Full text
Abstract:
Securing databases in modern IT environments is critical to ensuring the integrity, confidentiality, and availability of sensitive organizational data. This paper explores a multi-layered approach to database protection using Role-Based Access Control (RBAC), encryption, comprehensive backup strategies, disaster recovery planning, and Two-Factor Authentication (2FA). Each of these components addresses specific aspects of database security and collectively forms a robust framework to safeguard against unauthorized access, data breaches, and system failures. Practical recommendations for implementing these strategies in on-premises and production environments are provided, alongside discussions on emerging challenges and future trends in database security. Keywords: Database Security, RBAC, Encryption, Backup Strategies, Disaster Recovery, 2FA, Data Protection, Cybersecurity, Access Control, On-Premises, Production Environments.
APA, Harvard, Vancouver, ISO, and other styles
38

KUMAR, T. RAVI KIRAN, A. KAMAL NAYAN, B. UDAY KIRAN, S. PRANEETH REDDY, and K. SHIVA KUMAR. "A MULTI-LAYERED DEFENCE STRATEGY AGAINST DDOS ATTACKS." Journal of Nonlinear Analysis and Optimization 15, no. 02 (2024): 665–73. https://doi.org/10.36893/jnao.2024.v15i2.116.

Full text
Abstract:
The absence of standards and the diverse nature of the Internet of Things (IoT) have made security and privacy concerns more acute. Attacks such as distributed denial of service (DDoS) are becoming increasingly widespread in IoT, and the need for ways to stop them is growing. The use of newly formed Software-Defined Networking (SDN) significantly lowers the computational burden on IoT network nodes and makes it possible to perform more security measurements. This paper proposes an SDN-based, four module DDoS attack detection and mitigation framework for IoT networks called FMDADM. The proposed FMDADM framework comprises four main modules and five-tier architecture. The first module implements an early detection process based on the average drop rate (ADR) principle using a 32-packet window size. The second module uses a novel double-check mapping function (DCMF), that aids in earlier attack detection at the data plane level. The third module is an ML-based detection application comprising four phases: data preprocessing, feature extraction, training and testing, and classification. This module detects DDoS attacks using only seven features: two selected and five newly computed features. The last module introduces an attack mitigation process.We applied the proposed framework to three test cases: one single-node attack test case and two multi-node attack test cases, all with real IoT traffic generated and deployed in Mininet-IoT. The proposed FMDADM framework efficiently detects DDoS attacks at high and low rates, can discriminate between attack traffic and flash crowds, and protects both local and remote IoT nodes by preventing infection from propagating to the ISP level. The FMDADM outperformed most existing cuttingedge approaches across ten different evaluation criteria. According to the experimental results, FMDADM achieved the following accuracy, precision, F-measure, recall, specificity, negative predictive value, false positive rate, false detection rate, false negative rate, and average detection time benchmarks:- 99.79%, 99.43%, 99.77%, 99.79%, 99.95%, 00.21%, 00.91%, 00.23%, and 2.64 μs, respectively.
APA, Harvard, Vancouver, ISO, and other styles
39

Owobu, Wilfred Oseremen, Olumese Anthony Abieba, Peter Gbenle, et al. "Conceptual Framework for Deploying Data Loss Prevention and Cloud Access Controls in Multi-Layered Security Environments." International Journal of Multidisciplinary Research and Growth Evaluation 3, no. 1 (2022): 850–60. https://doi.org/10.54660/.ijmrge.2022.3.1.850-860.

Full text
Abstract:
The rapid adoption of cloud computing and digital transformation has introduced new security challenges, particularly in protecting sensitive data from unauthorized access, data breaches, and insider threats. Organizations must implement robust security frameworks to safeguard data integrity and confidentiality while ensuring compliance with regulatory requirements such as GDPR, HIPAA, and NIST standards. This presents a conceptual framework for deploying Data Loss Prevention (DLP) and Cloud Access Controls in a multi-layered security environment, addressing the evolving cybersecurity landscape. The framework integrates key security components, including network security, endpoint protection, encryption, and identity-based access controls, to create a comprehensive defense strategy. DLP solutions comprising network, endpoint, and cloud-based implementations are essential in monitoring, classifying, and restricting data movement across enterprise systems. Additionally, Cloud Access Security Brokers (CASB) play a crucial role in enforcing security policies, visibility, and risk mitigation within cloud applications. The integration of Zero Trust Architecture (ZTA), AI-driven automation, and Secure Access Service Edge (SASE) further enhances security posture by minimizing attack surfaces and reducing unauthorized access risks. Key challenges in implementing DLP and cloud security controls include balancing security with operational efficiency, mitigating insider threats, managing complex hybrid-cloud environments, and ensuring scalability. This study outlines best practices such as data classification, AI-based threat detection, policy-driven enforcement, and continuous security audits to create a resilient security framework. As cyber threats continue to evolve, emerging technologies such as quantum-safe encryption, AI-enhanced adaptive security, and blockchain-based identity management will shape the future of cloud security and data protection. Organizations must adopt a proactive, multi-layered security approach to safeguard sensitive data and maintain a robust cybersecurity posture in dynamic IT ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
40

Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar, and Supriya N. Deshpande. "Database Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.

Full text
Abstract:
Abstract: Database security is a crucial factor in safeguarding sensitive data in today's information-centric world. As organizations increasingly rely on databases for storing and managing vast volumes of data, ensuring the security of databases has become a top priority. This paper proposes a methodology for enhancing database security by addressing identified challenges and attacks. The methodology involves various steps, including identifying and assessing potential threats, evaluating existing security measures, implementing multi-layered defense, enforcing the principle of least privilege, regularly updating and patching DBMS, conducting regular security audits, providing user awareness training, implementing data encryption, monitoring and logging database activities, developing an incident response plan, staying updated with the latest research and best practices, and continuously improving security measures. By following this methodology, organizations can effectively enhance the security of their databases and safeguard critical data from potential attacks and breaches. Emphasis is placed on regular review and updates to security measures to proactively address evolving threats and ensure continuous protection of sensitive data.
APA, Harvard, Vancouver, ISO, and other styles
41

Pelayo, F., and M. López-Aenlle. "Natural frequencies and damping ratios of multi-layered laminated glass beams using a dynamic effective thickness." Journal of Sandwich Structures & Materials 21, no. 2 (2017): 439–63. http://dx.doi.org/10.1177/1099636217695479.

Full text
Abstract:
Multi-layered laminated glass panels are those with at least three monolithic glass layers and two viscoelastic interlayers. Multi-layered laminated glass panels are commonly used in floors, roofs and other horizontal glazing accessible to the public where a high level of security is required. Although the glass can be consider as a linear-elastic material, the viscoelastic interlayers determine a non-linear behavior of the laminated structure that must be taken into consideration. In this paper, a dynamic effective thickness is proposed to predict the natural frequencies and damping ratios of multi-layered laminated glass beam-like structures with different boundary conditions and at different temperatures. Furthermore, the presented dynamic effective thickness can be also used to any frequency domain calculations such as displacements and stresses. To validate the proposed model, operational modal analysis was carried out on a multi-layered laminated glass beam to obtain the experimental natural frequencies and damping ratios at 20, 25, 30 and 35℃. Moreover, a finite element model of the beam was also assembly for the sake of comparison. The proposed model predicts the natural frequencies with errors less than 5%, whereas the discrepancies in damping ratios are less than 50%.
APA, Harvard, Vancouver, ISO, and other styles
42

Afzal, Zeeshan, Mathias Ekstedt, Nils Müller, and Preetam Mukherjee. "Security Challenges in Energy Flexibility Markets: A Threat Modelling-Based Cyber-Security Analysis." Electronics 13, no. 22 (2024): 4522. http://dx.doi.org/10.3390/electronics13224522.

Full text
Abstract:
Flexibility markets are crucial for balancing the decentralised and renewable-driven energy landscape. This paper presents a security evaluation of a flexibility market system using a threat modelling approach. A reference architecture for a typical flexibility market system is proposed, and attack graph-driven simulations are performed to analyse potential attack pathways where malicious actors might infiltrate the system and the vulnerabilities they might exploit. Key findings include the identification of high-risk areas, such as the Internet links between market actors. To mitigate these risks, the paper proposes and evaluates multiple protection scenarios in reducing the identified attack vectors. The findings underline the importance of multi-layered security strategies to safeguard flexibility markets from increasingly sophisticated cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
43

Crossler, Robert E., France Bélanger, and Dustin Ormond. "The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats." Information Systems Frontiers 21, no. 2 (2017): 343–57. http://dx.doi.org/10.1007/s10796-017-9755-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Baker, Bruce, and Eric Scheye. "Multi-layered justice and security delivery in post-conflict and fragile states." Conflict, Security & Development 7, no. 4 (2007): 503–28. http://dx.doi.org/10.1080/14678800701692944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Joseph, P., and S. Britto. "An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services." International Journal of Computer Applications 146, no. 15 (2016): 1–4. http://dx.doi.org/10.5120/ijca2016910862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Naresh, Vankamamidi S., Moustafa M. Nasralla, Sivaranjani Reddi, and Iván García-Magariño. "Quantum Diffie–Hellman Extended to Dynamic Quantum Group Key Agreement for e-Healthcare Multi-Agent Systems in Smart Cities." Sensors 20, no. 14 (2020): 3940. http://dx.doi.org/10.3390/s20143940.

Full text
Abstract:
Multi-Agent Systems can support e-Healthcare applications for improving quality of life of citizens. In this direction, we propose a healthcare system architecture named smart healthcare city. First, we divide a given city into various zones and then we propose a zonal level three-layered system architecture. Further, for effectiveness we introduce a Multi-Agent System (MAS) in this three-layered architecture. Protecting sensitive health information of citizens is a major security concern. Group key agreement (GKA) is the corner stone for securely sharing the healthcare data among the healthcare stakeholders of the city. For establishing GKA, many efficient cryptosystems are available in the classical field. However, they are yet dependent on the supposition that some computational problems are infeasible. In light of quantum mechanics, a new field emerges to share a secret key among two or more members. The unbreakable and highly secure features of key agreement based on fundamental laws of physics allow us to propose a Quantum GKA (QGKA) technique based on renowned Quantum Diffie–Hellman (QDH). In this, a node acts as a Group Controller (GC) and forms 2-party groups with remaining nodes, establishing a QDH-style shared key per each two-party. It then joins these keys into a single group key by means of a XOR-operation, acting as a usual group node. Furthermore, we extend the QGKA to Dynamic QGKA (DQGKA) by adding join and leave protocol. Our protocol performance was compared with existing QGKA protocols in terms of Qubit efficiency (QE), unitary operation (UO), unitary operation efficiency (UOE), key consistency check (KCC), security against participants attack (SAP) and satisfactory results were obtained. The security analysis of the proposed technique is based on unconditional security of QDH. Moreover, it is secured against internal and external attack. In this way, e-healthcare Multi-Agent System can be robust against future quantum-based attacks.
APA, Harvard, Vancouver, ISO, and other styles
47

Roopesh, Ms. "CYBERSECURITY SOLUTIONS AND PRACTICES: FIREWALLS, INTRUSION DETECTION/PREVENTION, ENCRYPTION, MULTI-FACTOR AUTHENTICATION." ACADEMIC JOURNAL ON BUSINESS ADMINISTRATION, INNOVATION & SUSTAINABILITY 4, no. 3 (2024): 37–52. http://dx.doi.org/10.69593/ajbais.v4i3.90.

Full text
Abstract:
In today's digitally interconnected world, cybersecurity is paramount for protecting sensitive information from sophisticated threats. This literature review examines four key cybersecurity solutions—firewalls, intrusion detection and prevention systems (IDPS), encryption, and multi-factor authentication (MFA)—highlighting their roles, advancements, and challenges based on 105 articles. Firewalls (n=35), including packet-filtering, stateful inspection, proxy, and next-generation firewalls (NGFWs), act as barriers controlling network traffic. NGFWs integrate deep packet inspection and application awareness, enhancing security despite complex maintenance issues. IDPS technologies (n=30) have evolved from anomaly detection to AI-integrated systems, improving threat detection while facing false-positive rates and zero-day exploit challenges. Encryption (n=25) ensures data confidentiality, progressing from basic ciphers to algorithms like AES and post-quantum cryptography, though it grapples with computational and key management complexities. MFA (n=15) enhances security through multiple verification factors, evolving from passwords to biometrics and behavioral analytics, yet faces user inconvenience and potential bypass methods. A comparative analysis reveals that firewalls and IDPS effectively prevent and detect threats but require meticulous management; encryption demands efficient key management; and MFA strengthens authentication but may encounter user resistance. Integrating these solutions within a layered security framework provides comprehensive protection, leveraging their strengths for a resilient security posture. Case studies affirm that multi-layered security approaches reduce breaches, underscoring the effectiveness of integrated cybersecurity practices. Continuous innovation, user education, and adaptive management are vital for addressing dynamic cyber threats, reinforcing the need for a robust, multi-faceted cybersecurity strategy.
APA, Harvard, Vancouver, ISO, and other styles
48

Vakilinia, Shahin, Mohammadhossein Alvandi, Mohammadreza Khalili Shoja, and Iman Vakilinia. "Cross-Layered Secure and QoS Aware Design of VOIP over Wireless Ad-Hoc Networks." International Journal of Business Data Communications and Networking 9, no. 4 (2013): 23–45. http://dx.doi.org/10.4018/ijbdcn.2013100102.

Full text
Abstract:
In this paper, Cross-layer design has been used to provide quality of service (QoS) and security at the same time for VOIP over the wireless ad-hoc network. In this paper the authors extend their previous work (i.e. Multi-path Multi-Channel Protocol Design for Secure QoS-Aware VOIP in Wireless Ad-Hoc Networks) by adding transport and application layers considerations. The goal of this paper is to support QoS and security of VOIP simultaneously. Simulation results shows that the proposed cross-layered protocol stack design significantly improve QoS parameters of the VOIP calls under the jamming or Denial-of-service attacks.
APA, Harvard, Vancouver, ISO, and other styles
49

Thakur, Mr Sanjeev, and Ms Isha Birlay. "Data Security in Banks: Preventing Breaches and Ensuring Customer Trust." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43135.

Full text
Abstract:
Banks handle sensitive financial and personal data , making them potential targets for fraudsters. Successful data security tactics are essential for preserving client confidence and averting financial damages. The concepts of data security – confidentiality, accessibility and integrity -are examined in this paper , which also lists the elements and methods that are essential to preserving strong security. Example of vulnerabilities and their effects include the 2014 JPMorgan Chase hack and the 2019 SBI data leak. Best practices offer a multi layered defense against data breaches, including strong access restrictions, encryption, staff training and frequent vulnerability assessments. Keywords : Data Security in Banks, Financial Data protection , Banking cybersecurity strategies, Multi-Factor Authentication (MFA), Intrusion Detection Systems (IDS), Secure Backups in Banking, Customer Data Protection, Financial Institutions Cybersecurity .
APA, Harvard, Vancouver, ISO, and other styles
50

Tang, Jian Gang. "Wireless Network Security Problems and Coping Strategies." Applied Mechanics and Materials 475-476 (December 2013): 925–29. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.925.

Full text
Abstract:
Wireless network makes up the wired network shortcomings. With the popularity of the WiFi terminal, wireless network brings convenience, at the same time, the security threats are constantly upgrading, and the security issues have been plaguing the legitimate user. Wireless network security is not only with authentication, encryption, integrity testing and other technology-related, but also need intrusion detection systems, firewalls and other technology cooperation, so its a multi-layered problem. Not only the network administrator needs to take security measures to protect the network and comprehensive safety inspection, but also requires the users to enhance their network security awareness.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography