Journal articles on the topic 'Network Device Compliance'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network Device Compliance.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mohit, Bajpai. "Managing Network Devices Configuration, Golden Configuration, and Network Device Compliance." European Journal of Advances in Engineering and Technology 7, no. 1 (2020): 61–64. https://doi.org/10.5281/zenodo.13762549.
Full textMohit, Bajpai. "Automating Network Device Configuration and Compliance Enforcement." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 7, no. 3 (2019): 1–6. https://doi.org/10.5281/zenodo.14209408.
Full textMartin, Davies, Furey Eoghan, and Curran Kevin. "Improving compliance with bluetooth device detection." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 5 (2019): 2355–69. https://doi.org/10.12928/TELKOMNIKA.v17i5.12929.
Full textMcDaid, Alexander, Eoghan Furey, and Kevin Curran. "Wireless Interference Analysis for Home IoT Security Vulnerability Detection." International Journal of Wireless Networks and Broadband Technologies 10, no. 2 (2021): 55–77. http://dx.doi.org/10.4018/ijwnbt.2021070104.
Full textSuresh Reddy Thati. "Configuration and compliance automation in modern networks: A framework for enhanced security and operational efficiency." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 2513–19. https://doi.org/10.30574/wjaets.2025.15.2.0613.
Full textLeonardi, Luca, Lucia Lo Bello, Gaetano Patti, Alessio Pirri, and Mattia Pirri. "Combined Use of LoRaWAN Medium Access Control Protocols for IoT Applications." Applied Sciences 13, no. 4 (2023): 2341. http://dx.doi.org/10.3390/app13042341.
Full textAkilnath, Bodipudi. "Security Framework for 5G-Connected Biomedical Devices in Healthcare." Journal of Scientific and Engineering Research 10, no. 5 (2023): 394–400. https://doi.org/10.5281/zenodo.13348195.
Full textBoeding, Matthew, Michael Hempel, and Hamid Sharif. "End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT." Future Internet 17, no. 1 (2025): 34. https://doi.org/10.3390/fi17010034.
Full textBrivio, Stefano, and Sabina Spiga. "Stochastic circuit breaker network model for bipolar resistance switching memories." Journal of Computational Electronics 16, no. 4 (2017): pp 1154–1166. https://doi.org/10.1007/s10825-017-1055-y.
Full textOmelianenko, Halyna, Veronika Cherkashyna, and Anton Makarov. "The appropriateness of using electrical energy storage systems to increase the reliability of Ukrainian electrical networks." Bulletin of the National Technical University "KhPI". Series: Energy: Reliability and Energy Efficiency, no. 1(10) (July 9, 2025): 101–6. https://doi.org/10.20998/eree.2025.1(10).332984.
Full textKeeley, Dara. "Healthcare Providers’ Readiness to Address Medical Device Cybersecurity within the Irish Healthcare System." Global Clinical Engineering Journal 6, no. 2 (2024): 30–39. http://dx.doi.org/10.31354/globalce.v6i2.158.
Full textHegarty, Francis J., Silvana Togneri MacMahon, Patricia Byrne, and Fergal McCaffery. "Assessing a Hospital's Medical IT Network Risk Management Practice with 80001-1." Biomedical Instrumentation & Technology 48, no. 1 (2014): 64–71. http://dx.doi.org/10.2345/0899-8205-48.1.64.
Full textZhu, An, Haiping Ai, and Li Chen. "A Fuzzy Logic Reinforcement Learning Control with Spring-Damper Device for Space Robot Capturing Satellite." Applied Sciences 12, no. 5 (2022): 2662. http://dx.doi.org/10.3390/app12052662.
Full textTu, Thanh Diep Cong. "CONTROL NOVEL MODEL OF KNEE CPM DEVICE." Science and Technology Development Journal 12, no. 4 (2009): 18–29. http://dx.doi.org/10.32508/stdj.v12i4.2228.
Full textKadam, Saurabh Machhindra, and Pratap Singh Solanki. "A Literature Survey on Applications of 5G Technologies for Water Resource Management." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 1190–95. http://dx.doi.org/10.22214/ijraset.2023.49600.
Full textYewande Goodness Hassan, Anuoluwapo Collins, Gideon Opeyemi Babatunde, Abidemi Adeleye Alabi, and Sikirat Damilola Mustapha. "Holistic software solutions for securing Iot ecosystems against data theft and network-based cyber threats." Gulf Journal of Advance Business Research 3, no. 1 (2025): 252–61. https://doi.org/10.51594/gjabr.v3i1.77.
Full textDerek Asir Muthurajan Caleb. "Automated fibre channel device onboarding using FIDO protocol: Transforming SAN infrastructure management." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 2530–39. https://doi.org/10.30574/wjaets.2025.15.2.0657.
Full textPrasanth Kosaraju. "Safeguarding OT Networks in Biotech Manufacturing Plants." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 972–81. https://doi.org/10.32996/jcsts.2025.7.3.109.
Full textVázquez-Gallego, Francisco, Luis Alonso, and Jesus Alonso-Zarate. "Energy Analysis of Contention Tree-Based Access Protocols in Dense Machine-to-Machine Area Networks." Journal of Sensors 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/685164.
Full textVázquez-Gallego, Francisco, Luis Alonso, and Jesús Alonso-Zárate. "Energy Analysis of Contention Tree-based Access Protocols in Dense Machine-to-Machine Area Networks." Journal of Sensors 2015, no. 685164 (2015): 12. https://doi.org/10.5281/zenodo.46816.
Full textArun Sugumar. "AI-Driven 5G Network Slicing: Revolutionizing Enterprise Connectivity." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 2601–8. https://doi.org/10.32628/cseit25112729.
Full textHsieh, Caleb, Armand Ryden, and Michelle Zeidler. "1263 Mandibular Advancement Device referrals and compliance at the VA." Sleep 43, Supplement_1 (2020): A480—A481. http://dx.doi.org/10.1093/sleep/zsaa056.1257.
Full textRyu, Hojeong, and Sungjun Kim. "Pseudo-Interface Switching of a Two-Terminal TaOx/HfO2 Synaptic Device for Neuromorphic Applications." Nanomaterials 10, no. 8 (2020): 1550. http://dx.doi.org/10.3390/nano10081550.
Full textVostrikov, M. V., A. V. Daneyv, K. V. Menaker, and V. N. Sizykh. "EVALUATION OF THE RELIABILITY OF AN AUTOMATED FILTRATION DEVICE IN THE UPGRADED MICROPROCESSOR RELAY PROTECTION OF CONTACT NETWORK FEEDERS." Izvestiya of Samara Scientific Center of the Russian Academy of Sciences 23, no. 6 (2021): 126–39. http://dx.doi.org/10.37313/1990-5378-2021-23-6-126-139.
Full textRamadan, Zardi, Yulindon Yulindon, Yustini Yustini, and Aprinal Adila Asril. "Installation and Activation of Fiber To The Home (FTTH) Network Using Gigabit Passive Optical Network (GPON) Technology and Quality of Service (QoS) Analysis." JATAED: Journal of Appropriate Technology for Agriculture, Environment, and Development 2, no. 1 (2024): 17–24. http://dx.doi.org/10.62671/jataed.v2i1.62.
Full textNunday, Elizabeth Joseph. "Electronic Fiscal Device (EFD) Utilization among Entrepreneurs in Tanzania: Assessing Knowledge, Attitudes, and Challenges." East African Journal of Information Technology 8, no. 1 (2025): 46–56. https://doi.org/10.37284/eajit.8.1.2857.
Full textMukhin, Vadym, Pavlo Anakhov, Viktoriia Zhebka, et al. "Protecting Hybrid Information Transmission Network from Natural and Anthropogenic Hazards." International Journal of Computer Network and Information Security 14, no. 5 (2022): 1–10. http://dx.doi.org/10.5815/ijcnis.2022.05.01.
Full textOlajumoke Omotola Oyewole, Ololade Gilbert Fakeyede, Evelyn Chinedu Okeleke, Apeh Jonathan Apeh, and Olubukola Rhoda Adaramodu. "SECURITY CONSIDERATIONS AND GUIDELINES FOR AUGMENTED REALITY IMPLEMENTATION IN CORPORATE ENVIRONMENTS." Computer Science & IT Research Journal 4, no. 2 (2023): 69–84. http://dx.doi.org/10.51594/csitrj.v4i2.607.
Full textQin, Yabo, Zongwei Wang, Yaotian Ling, Yimao Cai, and Ru Huang. "A TaOx-Based RRAM with Improved Uniformity and Excellent Analog Characteristics by Local Dopant Engineering." Electronics 10, no. 20 (2021): 2451. http://dx.doi.org/10.3390/electronics10202451.
Full textIqbal, Adeel, Tahir Khurshaid, Yazdan Ahmad Qadri, Ali Nauman, and Sung Won Kim. "Priority-Aware Spectrum Management for QoS Optimization in Vehicular IoT." Sensors 25, no. 11 (2025): 3342. https://doi.org/10.3390/s25113342.
Full textLakhan, Abdullah, Muhammad Faisal Memon, Rahila Shah, and Amjad Ali. "A novel Primary Key infrastructure IoT enabled secure Access Control Framework Based smart home applications." VFAST Transactions on Software Engineering 13, no. 1 (2025): 37–48. https://doi.org/10.21015/vtse.v13i1.2040.
Full textNathani, Harshit H., Kuldeep J. Surati, Mrs Keyaben Sanket Kumar Patel, and Himani Parmar. "Networking and Server Management by Microsoft Azure Intune Portal." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 2840–43. https://doi.org/10.22214/ijraset.2025.67923.
Full textBartolomei, Lorenzo, Diego Cavaliere, Alessandro Mingotti, Lorenzo Peretto, and Roberto Tinarelli. "Testing of Electrical Energy Meters Subject to Realistic Distorted Voltages and Currents." Energies 13, no. 8 (2020): 2023. http://dx.doi.org/10.3390/en13082023.
Full textAlhashmi, Noora, Bashaer Aljneibi, Mahra Alameri, Richard Ikuesan, and Farkhund Iqbal. "Forensic Examinations of Alexa for Smart Home Privacy and Cybercrime Investigation." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 8–17. https://doi.org/10.34190/iccws.20.1.3390.
Full textLee, Dong Keun, Min-Hwi Kim, Suhyun Bang, et al. "Multilevel Switching Characteristics of Si3N4-Based Nano-Wedge Resistive Switching Memory and Array Simulation for In-Memory Computing Application." Electronics 9, no. 8 (2020): 1228. http://dx.doi.org/10.3390/electronics9081228.
Full textFang, Shanxiang, Yao Du, Yong Zhang, Fanbo Meng, and Marcelo H. Ang. "Research on Robotic Compliance Control for Ultrasonic Strengthening of Aviation Blade Surface." Micromachines 14, no. 4 (2023): 730. http://dx.doi.org/10.3390/mi14040730.
Full textPaul, Biplob, and Muzaffar Rao. "Zero-Trust Model for Smart Manufacturing Industry." Applied Sciences 13, no. 1 (2022): 221. http://dx.doi.org/10.3390/app13010221.
Full textChallener, Douglas, Priya Sampathkumar, and John O. O’Horo. "Practice Variation in Validation of Device Denominator Data for National Healthcare Safety Network Reporting." Infection Control & Hospital Epidemiology 41, S1 (2020): s354—s355. http://dx.doi.org/10.1017/ice.2020.973.
Full textAntonov, Sergey V., Vyacheslav S. Butko, and Vladimir I. Zykov. "Searching for and warning people in buildings in case of fires and emergencies via wireless Wi-Fi network." Fire and Emergencies: prevention, elimination 3 (2023): 105–11. http://dx.doi.org/10.25257/fe.2023.3.105-111.
Full textSULYMA, Volodymyr, Volodymyr GAPONOV, Leonid MESCHERYAKOV, and Vitaly KRAVCHENKO. "Design Requirements for the Device for Differentiating Pathological States of Biological Tissues." Eurasia Proceedings of Science Technology Engineering and Mathematics 29 (December 15, 2024): 311–19. https://doi.org/10.55549/epstem.1574795.
Full textVerde, Laura, Nadia Brancati, Giuseppe De Pietro, Maria Frucci, and Giovanna Sannino. "A Deep Learning Approach for Voice Disorder Detection for Smart Connected Living Environments." ACM Transactions on Internet Technology 22, no. 1 (2022): 1–16. http://dx.doi.org/10.1145/3433993.
Full textHaytham.B. Alaboodi. "Challenges and Recommendations for Improving Blockchain-Based Bank Transfer Security in 5G IoT Applications." Journal of Electrical Systems 20, no. 11s (2024): 1642–52. https://doi.org/10.52783/jes.7559.
Full textMarshall, Byron, Michael Curry, Robert E. Crossler, and John Correia. "Machine Learning and Survey-based Predictors of InfoSec Non-Compliance." ACM Transactions on Management Information Systems 13, no. 2 (2022): 1–20. http://dx.doi.org/10.1145/3466689.
Full textPareek, Pallavi, Surendra Yadav, and Surendra Singh Choudhary. "Addressing applications and security issues in the Internet of Things (IoT) : A comprehensive review." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 7 (2024): 1977–89. http://dx.doi.org/10.47974/jdmsc-2073.
Full textSegun, Adewumi Adebayo, Eleyele Dolapo Emmanuel, Alagbe Atilade George, and Azeez Ibraheem Abiodun. "DESIGN, SIMULATION AND PERFORMANCE EVALUATION OF HELICAL ANTENNA FOR 4G AND 5G MOBILE NETWORKS COMPLIANCE." Acta Electronica Malaysia 8, no. 2 (2024): 39–44. https://doi.org/10.26480/aem.02.2024.39.44.
Full textPyo, Juyeong, Seung-Jin Woo, Kisong Lee, and Sungjun Kim. "Demonstration of Threshold Switching and Bipolar Resistive Switching in Ag/SnOx/TiN Memory Device." Metals 11, no. 10 (2021): 1605. http://dx.doi.org/10.3390/met11101605.
Full textB, Mohammed Yakoob, and G. Manoj. "Exploring the Role of Network Marketing in the Business Development : An Analysis of Managerial Perspectives." Shanlax International Journal of Management 11, S1-May (2024): 54–63. http://dx.doi.org/10.34293/management.v11is1-may.7837.
Full textRakhimov, O. S., D. N. Mirzoev, and E. I. Grachieva. "Experimental study of quality and electricity losses in low voltage rural electric networks." Power engineering: research, equipment, technology 23, no. 3 (2021): 209–22. http://dx.doi.org/10.30724/1998-9903-2021-23-3-209-222.
Full textRakhimov, O. S., D. N. Mirzoev, and E. I. Grachieva. "Experimental study of quality and electricity losses in low voltage rural electric networks." Power engineering: research, equipment, technology 23, no. 3 (2021): 224–37. http://dx.doi.org/10.30724/1998-9903-2021-23-3-209-224-237.
Full textGronwald, Jacek, Lukasz Lasyk, Jakub Barbasz, et al. "Evaluation of the constructed device along with the software for digital archiving, sending the data, and supporting the diagnosis of cervical cancer." Journal of Clinical Oncology 38, no. 15_suppl (2020): e18017-e18017. http://dx.doi.org/10.1200/jco.2020.38.15_suppl.e18017.
Full text