Journal articles on the topic 'Multi-layered security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Multi-layered security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
N, Mahima, Noor Siddiqa, and Tanvir Habib Sardar. "Multi-Layered Security System Using Cryptography and Steganography." International Journal of Innovative Research in Computer Science & Technology 7, no. 2 (2019): 8–11. http://dx.doi.org/10.21276/ijircst.2019.7.2.1.
Full textVinnarasi, J., and D. I. George Amalarethinam. "Advancing Data Security in Cloud Computing: Introducing Secured Layered Technique for Data Security Approach (SLT-DSA), A Multi-Layered Security Framework." Indian Journal Of Science And Technology 18, no. 11 (2025): 848–60. https://doi.org/10.17485/ijst/v18i11.273.
Full textAnderson, David. "Optimising multi-layered security screening." Journal of Transportation Security 14, no. 3-4 (2021): 249–73. http://dx.doi.org/10.1007/s12198-021-00237-3.
Full textHong, Jin B., and Dong Seong Kim. "Towards scalable security analysis using multi-layered security models." Journal of Network and Computer Applications 75 (November 2016): 156–68. http://dx.doi.org/10.1016/j.jnca.2016.08.024.
Full textKim, Song-Kyoo (Amang). "Multi-Layered Blockchain Governance Game." Axioms 11, no. 1 (2022): 27. http://dx.doi.org/10.3390/axioms11010027.
Full textPaul, P. Victer, and D. Veeraiah. "Multi-Layered Security Model for Hadoop Environment." International Journal of Handheld Computing Research 8, no. 4 (2017): 58–71. http://dx.doi.org/10.4018/ijhcr.2017100106.
Full textYadaiah, Dr K. "Multi Layered Security System and Alert System." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 1856–61. https://doi.org/10.22214/ijraset.2025.71956.
Full textJ, Vinnarasi, and I. George Amalarethinam2 D. "Advancing Data Security in Cloud Computing: Introducing Secured Layered Technique for Data Security Approach (SLT-DSA), A Multi-Layered Security Framework." Indian Journal of Science and Technology 18, no. 11 (2025): 848–60. https://doi.org/10.17485/IJST/v18i11.273.
Full textRodriguez, Stephen, and Paolina Centonze. "Multi-Layered Dynamic Encryption Security Scheme for Cloud Data Storage." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 3 (2017): 6233–39. http://dx.doi.org/10.24297/ijct.v16i3.6150.
Full textKallapu, Bhavya, Avinash Nanda Janardhan, Rama Moorthy Hejamadi, et al. "Multi-Layered Security Framework Combining Steganography and DNA Coding." Systems 13, no. 5 (2025): 341. https://doi.org/10.3390/systems13050341.
Full textDenman, Simon. "Why multi-layered security is still the best defence." Network Security 2012, no. 3 (2012): 5–7. http://dx.doi.org/10.1016/s1353-4858(12)70043-0.
Full textGurdeep Kaur Gill. "Multi-Layered NGFW Protection Shield for AI Infrastructure." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 2863–74. https://doi.org/10.30574/wjarr.2025.26.1.1354.
Full textChu, Xiao Jie, Fei Yu, Shan Xiong Chen, and Zhang Jun Dai. "Study on Characteristics of Additional Stress and Bearing Capacity of Multi-Layered Foundation in Northern Anhui." Applied Mechanics and Materials 513-517 (February 2014): 2651–54. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2651.
Full textPrincess Eloho Odio, Richard Okon, Mary Oyenike Adeyanju, Chikezie Paul-Mikki Ewim, and Obianuju Clement Onwuzulike. "Blockchain and Cybersecurity: A dual approach to securing financial transactions in Fintech." Gulf Journal of Advance Business Research 3, no. 2 (2025): 380–409. https://doi.org/10.51594/gjabr.v3i2.89.
Full textMemon, Qurban A. "Multi-Layered Multimodal Biometric Authentication for Smartphone Devices." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 15 (2020): 222. http://dx.doi.org/10.3991/ijim.v14i15.15825.
Full textDeepika, M., and Md Abdul Gulzar Begum. "Authorizing the Communication between Pacemaker and Controller." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44309.
Full textMD, Shahnawaz Sakib, Danyaal Muhammad, and Bo Lili. "Hardware System Security: A Comprehensive Approach." International Journal of Computer Science and Information Technology Research 13, no. 1 (2025): 1–3. https://doi.org/10.5281/zenodo.14631605.
Full textSwaroop, B. Satya, Keerthipati Sowmya, Kurmapu Nitish Rao, Mohammad Zeeshanuddin Shah, and Kola Nithin. "Advanced Cloud-Integrated Multi-Layered Security for E-Health Records Protection." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1671–79. https://doi.org/10.22214/ijraset.2025.67630.
Full textIssaka Hassane, Abdoul Aziz, Ali Hamadou, Kadri Chaibou, and Lanciné Camara. "CYBERSECURITY ON IOT SYSTEMS BASED MULTI-LAYERED SECURITY RISK ASSESSMENT." International Journal of Engineering Applied Sciences and Technology 09, no. 03 (2024): 105–14. http://dx.doi.org/10.33564/ijeast.2024.v09i03.009.
Full textMeruga, Jeevan M., Carly Fountain, Jon Kellar, et al. "Multi-layered covert QR codes for increased capacity and security." International Journal of Computers and Applications 37, no. 1 (2015): 17–27. http://dx.doi.org/10.1080/1206212x.2015.1061254.
Full textGandotra, Vandana, Archana Archana Singhal, and Punam Bedi. "Layered security architecture for threat management using multi-agent system." ACM SIGSOFT Software Engineering Notes 36, no. 5 (2011): 1–11. http://dx.doi.org/10.1145/2020976.2020984.
Full textJenifar, Khan Subham Sengupta Sudipta Sahana*. "MULTI-LAYERED RGB BASED SECURE TECHNIQUE FOR DATA TRANSFER." Global Journal of Engineering Science and Research Management 4, no. 3 (2017): 77–84. https://doi.org/10.5281/zenodo.439256.
Full textБатталова, Alina Battalova, Кундакчян, and Rezeda Kundakchyan. "PROBLEMS OF FOOD SAFETY OF RUSSIA IN THE GLOBALIZED ECONOMY." Vestnik of Kazan State Agrarian University 10, no. 2 (2015): 5–9. http://dx.doi.org/10.12737/12041.
Full textResearcher. "ADVANCED MULTI-LAYERED CLOUD SECURITY: A NOVEL FRAMEWORK FOR THREAT DETECTION AND PREVENTION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 823–35. https://doi.org/10.5281/zenodo.14243429.
Full textGuman Singh Chauhan and Rahul Jadon. "AI and ML-Powered CAPTCHA and advanced graphical passwords: Integrating the DROP methodology, AES encryption and neural network-based authentication for enhanced security." World Journal of Advanced Engineering Technology and Sciences 1, no. 1 (2020): 121–32. https://doi.org/10.30574/wjaets.2020.1.1.0027.
Full textSoundararajan, Balaji. "Implementing Payment System Security: A Technical Deep Dive." International Journal of Multidisciplinary Research and Growth Evaluation. 3, no. 5 (2022): 615–21. https://doi.org/10.54660/.ijmrge.2022.3.5.615-621.
Full textSwati Yadav. "Enhancing Security in Multi-Tenant Cloud Environments: Threat Detection, Prevention, and Data Breach Mitigation." Journal of Information Systems Engineering and Management 10, no. 22s (2025): 61–72. https://doi.org/10.52783/jisem.v10i22s.3472.
Full textAlhusayni, Ahmed, Vijey Thayananthan, Aiiad Albeshri, and Saleh Alghamdi. "Decentralized Multi-Layered Architecture to Strengthen the Security in the Internet of Things Environment Using Blockchain Technology." Electronics 12, no. 20 (2023): 4314. http://dx.doi.org/10.3390/electronics12204314.
Full textRaghavendra Kurva. "Real-Time Data Integrity Validation Using Blockchain for Autonomous Vehicles." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1275–82. https://doi.org/10.32628/cseit25112455.
Full textB. Angel Rubavathy. "Adaptive Multi-Layered Elgamal Cryptosystem with Machine Learning-Based Security for Cloud Data Allocation and Access Control." Journal of Information Systems Engineering and Management 10, no. 22s (2025): 573–80. https://doi.org/10.52783/jisem.v10i22s.3603.
Full textUrciuoli, Luca. "Supply chain security—mitigation measures and a logistics multi-layered framework." Journal of Transportation Security 3, no. 1 (2009): 1–28. http://dx.doi.org/10.1007/s12198-009-0034-3.
Full textAbu, Juha Ahmed Muid, Kumar Das Sudipta, Sydur Rahman MD, and Md. Mahbubur Rahman Dr. "Enhancing Image Encryption with Quadrant-Based Layered Multi-Key Systems." International Journal of Mathematics and Computer Research 12, no. 12 (2024): 4633–40. https://doi.org/10.5281/zenodo.14265604.
Full textSykot, Arman, Md Shawmoon Azad, Wahida Rahman Tanha, B. M. Monjur Morshed, Syed Emad Uddin Shubha, and M. R. C. Mahdy. "Multi-layered security system: Integrating quantum key distribution with classical cryptography to enhance steganographic security." Alexandria Engineering Journal 121 (May 2025): 167–82. https://doi.org/10.1016/j.aej.2025.02.056.
Full textNaga Krishna Mahesh Pulikonda. "Multi-Layered AI-enhanced compliance architecture for financial data engineering." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 3666–73. https://doi.org/10.30574/wjarr.2025.26.2.1935.
Full textMahmood, Zeba, and Vacius Jusas. "Blockchain-Enabled: Multi-Layered Security Federated Learning Platform for Preserving Data Privacy." Electronics 11, no. 10 (2022): 1624. http://dx.doi.org/10.3390/electronics11101624.
Full textWalters, Robert. "Cross-Border Data Flows: An Evolving Multi-Layered Regulatory Approach Required!" Global Privacy Law Review 3, Issue 1 (2022): 29–45. http://dx.doi.org/10.54648/gplr2022004.
Full textMatey, Preeti. "Strengthening Database Security: RBAC, Encryption, Backup, and 2FA Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–8. https://doi.org/10.55041/ijsrem39950.
Full textKUMAR, T. RAVI KIRAN, A. KAMAL NAYAN, B. UDAY KIRAN, S. PRANEETH REDDY, and K. SHIVA KUMAR. "A MULTI-LAYERED DEFENCE STRATEGY AGAINST DDOS ATTACKS." Journal of Nonlinear Analysis and Optimization 15, no. 02 (2024): 665–73. https://doi.org/10.36893/jnao.2024.v15i2.116.
Full textOwobu, Wilfred Oseremen, Olumese Anthony Abieba, Peter Gbenle, et al. "Conceptual Framework for Deploying Data Loss Prevention and Cloud Access Controls in Multi-Layered Security Environments." International Journal of Multidisciplinary Research and Growth Evaluation 3, no. 1 (2022): 850–60. https://doi.org/10.54660/.ijmrge.2022.3.1.850-860.
Full textIngole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar, and Supriya N. Deshpande. "Database Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.
Full textPelayo, F., and M. López-Aenlle. "Natural frequencies and damping ratios of multi-layered laminated glass beams using a dynamic effective thickness." Journal of Sandwich Structures & Materials 21, no. 2 (2017): 439–63. http://dx.doi.org/10.1177/1099636217695479.
Full textAfzal, Zeeshan, Mathias Ekstedt, Nils Müller, and Preetam Mukherjee. "Security Challenges in Energy Flexibility Markets: A Threat Modelling-Based Cyber-Security Analysis." Electronics 13, no. 22 (2024): 4522. http://dx.doi.org/10.3390/electronics13224522.
Full textCrossler, Robert E., France Bélanger, and Dustin Ormond. "The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats." Information Systems Frontiers 21, no. 2 (2017): 343–57. http://dx.doi.org/10.1007/s10796-017-9755-1.
Full textBaker, Bruce, and Eric Scheye. "Multi-layered justice and security delivery in post-conflict and fragile states." Conflict, Security & Development 7, no. 4 (2007): 503–28. http://dx.doi.org/10.1080/14678800701692944.
Full textJoseph, P., and S. Britto. "An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services." International Journal of Computer Applications 146, no. 15 (2016): 1–4. http://dx.doi.org/10.5120/ijca2016910862.
Full textNaresh, Vankamamidi S., Moustafa M. Nasralla, Sivaranjani Reddi, and Iván García-Magariño. "Quantum Diffie–Hellman Extended to Dynamic Quantum Group Key Agreement for e-Healthcare Multi-Agent Systems in Smart Cities." Sensors 20, no. 14 (2020): 3940. http://dx.doi.org/10.3390/s20143940.
Full textRoopesh, Ms. "CYBERSECURITY SOLUTIONS AND PRACTICES: FIREWALLS, INTRUSION DETECTION/PREVENTION, ENCRYPTION, MULTI-FACTOR AUTHENTICATION." ACADEMIC JOURNAL ON BUSINESS ADMINISTRATION, INNOVATION & SUSTAINABILITY 4, no. 3 (2024): 37–52. http://dx.doi.org/10.69593/ajbais.v4i3.90.
Full textVakilinia, Shahin, Mohammadhossein Alvandi, Mohammadreza Khalili Shoja, and Iman Vakilinia. "Cross-Layered Secure and QoS Aware Design of VOIP over Wireless Ad-Hoc Networks." International Journal of Business Data Communications and Networking 9, no. 4 (2013): 23–45. http://dx.doi.org/10.4018/ijbdcn.2013100102.
Full textThakur, Mr Sanjeev, and Ms Isha Birlay. "Data Security in Banks: Preventing Breaches and Ensuring Customer Trust." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43135.
Full textTang, Jian Gang. "Wireless Network Security Problems and Coping Strategies." Applied Mechanics and Materials 475-476 (December 2013): 925–29. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.925.
Full text