Journal articles on the topic 'Security automation tools'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security automation tools.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shahane, Gauri. "Network Security (Automation)." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30835.
Full textSilva, Roberto De Carvalho. "AUTOMATION AND OPTIMIZATION OF THE SAP SOFTWARE INSTALLATION PROCESS IN CORPORATE WORKSTATIONS: IMPACTS ON SCALABILITY AND SECURITY." Revista ft 29, no. 145 (2025): 34–35. https://doi.org/10.69849/revistaft/ch10202504040734.
Full textRahman, Anisur, Md Ashrafuzzaman, Md Majadul Islam Jim, and Rebeka Sultana. "CLOUD SECURITY POSTURE MANAGEMENT AUTOMATING RISK IDENTIFICATION AND RESPONSE IN CLOUD INFRASTRUCTURES." ACADEMIC JOURNAL ON SCIENCE, TECHNOLOGY, ENGINEERING & MATHEMATICS EDUCATION 4, no. 3 (2024): 151–62. http://dx.doi.org/10.69593/ajsteme.v4i03.103.
Full textSridevi Kakolu and Muhammad Ashraf Faheem. "Revolutionizing industries through digitization: The strategic importance of mobile application automation." International Journal of Science and Research Archive 8, no. 1 (2023): 973–87. http://dx.doi.org/10.30574/ijsra.2023.8.1.0276.
Full textChintan Udeshi. "The Role of Automation and Platformization in Enhancing Enterprise Cybersecurity." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2984–90. https://doi.org/10.32628/cseit251112314.
Full textTilbury, Jack, and Stephen Flowerday. "Humans and Automation: Augmenting Security Operation Centers." Journal of Cybersecurity and Privacy 4, no. 3 (2024): 388–409. http://dx.doi.org/10.3390/jcp4030020.
Full textWeil, Ramon. "Security Orchestration, Automation and Response (SOAR)." Technische Sicherheit 13, no. 11-12 (2023): 41–42. http://dx.doi.org/10.37544/2191-0073-2023-11-12-41.
Full textChoi, Eun-Jin, and Seungil Noh. "Analysis of U.S. RMF Security Automation Tools for K-RMF Security Assessments." Journal of the Korea Academia-Industrial cooperation Society 25, no. 8 (2024): 341–49. http://dx.doi.org/10.5762/kais.2024.25.8.341.
Full textMojesh, L. "Automated Security Testing Tool." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50199.
Full textKanthed, Surbhi. "Automation Tools for DevOps: Leveraging Ansible, Terraform, and Beyond." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem01286.
Full textShekar, Vinay C., Sayeed Ur Rahman, Srinivas Vishal Bhat DB, Abdul Mateen, and Ranjitha A.S. "Enhanced Network Security for IoT based Home Automation System." International Journal of Emerging Research in Management and Technology 6, no. 6 (2018): 278. http://dx.doi.org/10.23956/ijermt.v6i6.282.
Full textBrown, Preston, Kallan Christensen, and David Schuster. "An Investigation of Trust in a Cyber Security Tool." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (2016): 1454–58. http://dx.doi.org/10.1177/1541931213601333.
Full textSujan Kumar, Kummari. "Next-Generation Security Operations: Leveraging Automation for Proactive Threat Mitigation." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43432.
Full textJanki, Velani. "Advancements in GitHub Automation and Workflow: A Comprehensive Exploration." International Journal of Innovative Science and Modern Engineering (IJISME) 12, no. 2 (2024): 10–13. https://doi.org/10.35940/ijisme.B1311.12020224.
Full textKämppi, Jarno, and Karo Saharinen. "Key Actions to Enable Automation for Mobile Network Security Operations." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 224–32. http://dx.doi.org/10.34190/eccws.23.1.2232.
Full textTilbury, Jack, and Stephen Flowerday. "Automation Bias and Complacency in Security Operation Centers." Computers 13, no. 7 (2024): 165. http://dx.doi.org/10.3390/computers13070165.
Full textRavi, Chandra Thota. "Cloud-Native DevSecOps: Integrating Security Automation into CI/CD Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–19. https://doi.org/10.5281/zenodo.15036934.
Full textTiwari, Pradeep Kumar, Sunil Kr Pandey, W. Thamba Meshach, et al. "Improved Data Security in Cloud Environment for Test Automation Framework and Access Control for Industry 4.0." Wireless Communications and Mobile Computing 2022 (May 25, 2022): 1–9. http://dx.doi.org/10.1155/2022/3242092.
Full textPonaka, Kamalakar Reddy. "Automated Security Vulnerability Backlog Management." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–4. http://dx.doi.org/10.55041/ijsrem16818.
Full textChura, T. R., and Y. M. Kostiv. "ADAPTATION OF INFORMATION SECURITY IN THE AGILE WORLD." Computer systems and network 7, no. 1 (2025): 307–12. https://doi.org/10.23939/csn2025.01.307.
Full textJ, Prassanna, Anjali R. Pawar, and Neelanarayanan V. "A REVIEW OF EXISTING CLOUD AUTOMATION TOOLS." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 471. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.20519.
Full textKhattar, Kriti. "Docker Like a Pro: Essential Practices for Secure and Scalable Containers." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41900.
Full textMongush, Amyrtaa K., and Igor N. Karmanov. "AUTOMATION OF COMPLEX INFORMATION SECURITY SYSTEMS DESIGN." Interexpo GEO-Siberia 6, no. 2 (2020): 31–35. http://dx.doi.org/10.33764/2618-981x-2020-6-2-31-35.
Full textAbhiram, Sanal, Sebastian Anjana, K. Haripriya, V. Adatte Nevin, and S. Sneha. "Virtual Smart Home Automation." Research and Reviews: Advancement in Robotics 7, no. 3 (2024): 4–10. https://doi.org/10.5281/zenodo.13317690.
Full textStanislav, Bushuev. "AUTOMATION OF DATABASE ADMINISTRATION TASKS." Deutsche internationale Zeitschrift für zeitgenössische Wissenschaft 98 (February 22, 2025): 78–82. https://doi.org/10.5281/zenodo.14911034.
Full textKhedkar, Samruddhi S., and Prof. D. G. Ingale. "Automated Penetration Testing." International Journal of Ingenious Research, Invention and Development (IJIRID) 5, no. 3 (2024): 299–305. https://doi.org/10.5281/zenodo.13988309.
Full textPalit, Romit, and Dr Saurabh Solanki. "Automation in Infrastructure Tools for New Service Integration." International Journal of Research in Humanities and Social Sciences 13, no. 3 (2025): 191–211. https://doi.org/10.63345/ijrhs.net.v13.i3.11.
Full textSabeeruddin, shaik. "The Growing Role of Security Orchestration, Automation and Response (SOAR) in SOC Operations." International Journal of Leading Research Publication 5, no. 12 (2024): 1–6. https://doi.org/10.5281/zenodo.14769600.
Full textMadamanchi, Sambasiva Rao. "Modern Approaches to Unix Automation: Shell Scripting, Configuration Management, and Security." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 3190–201. https://doi.org/10.22214/ijraset.2025.72773.
Full textUpadhyay, Aditya. "Project Sleuth: A Comprehensive All-in-One Bug Bounty Automation Tool." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 3198–203. https://doi.org/10.22214/ijraset.2025.68072.
Full textAakarsh Mavi. "Bridging the Gap: Cybersecurity Automation for Legacy Manufacturing Systems." Journal of Information Systems Engineering and Management 10, no. 30s (2025): 21–33. https://doi.org/10.52783/jisem.v10i30s.4768.
Full textYankson, Benjamin, Tyler Loucks, Andrea Sampson, and Chelsea Lojano. "Robots Security Assessment and Analysis Using Open-Source Tools." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 449–56. http://dx.doi.org/10.34190/iccws.18.1.1019.
Full textRusetskaya, Irina A. "COMPLIANCE IN INFORMATION SECURITY." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 2 (2023): 70–80. http://dx.doi.org/10.28995/2686-679x-2023-2-70-80.
Full textDr., Anitha S., and D. Pravishka. "Intelligent Automation Framework for Penetration Testing and Security Assessment." Research and Reviews: Advancement in Cyber Security 2, no. 3 (2025): 39–45. https://doi.org/10.5281/zenodo.15583371.
Full textChatterjee, Pushpalika, and Apurba Das. "Enhancing Software Security: A Research-Driven Automation Framework." International Journal of Scientific Research and Management (IJSRM) 12, no. 12 (2024): 1793–803. https://doi.org/10.18535/ijsrm/v12i12.ec03.
Full textMaksymovych, M., and L. Mychuda. "ROLE, PROBLEMS, AND METHODS OF SOFTWARE SECURITY TESTING AUTOMATION." Computer systems and network 6, no. 2 (2024): 131–41. https://doi.org/10.23939/csn2024.02.131.
Full textSandhya, Guduru. "Automated Vulnerability Scanning & Runtime Protection for DockerKubernetes: Integrating Trivy, Falco, and OPA." Journal of Scientific and Engineering Research 6, no. 2 (2019): 216–20. https://doi.org/10.5281/zenodo.15234550.
Full textChirag, Amrutlal Pethad. "Design and Build a CI/CD pipeline for Salesforce." European Journal of Advances in Engineering and Technology 8, no. 6 (2021): 136–46. https://doi.org/10.5281/zenodo.13919671.
Full textAakarsh Mavi. "Empowering HVAC Manufacturing with IT/OT Convergence for Operational Excellence." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 2500–2509. https://doi.org/10.32628/cseit24245475.
Full textAakarsh Mavi. "Security Automation Framework for Digital Twins in Smart Manufacturing." Journal of Information Systems Engineering and Management 10, no. 33s (2025): 1088–98. https://doi.org/10.52783/jisem.v10i33s.5848.
Full textMuhammad, Tayyab, and Muhammad Munir. "Network Automation." European Journal of Technology 7, no. 3 (2023): 23–42. http://dx.doi.org/10.47672/ejt.1547.
Full textKUMAR, R. SENTHIL. "DevOps in 2025: Trends, Innovations, and the Path Ahead." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40564.
Full textRajarajeswari, S., Shola Usha Rani, Alpanshu Kataria, and Soumitro Dutta. "Home Automation through Smart Lighting, Smart Security and other Appliances." ITM Web of Conferences 37 (2021): 01024. http://dx.doi.org/10.1051/itmconf/20213701024.
Full textTrudy-Ann, Campbell, Eromonsei Samson, and Afolabi Olusegun. "Automated API framework tools for evaluating cloud resources (IAM, S3, KMS) for compliance with ISO 27001 case study AWS." Global Journal of Engineering and Technology Advances 20, no. 1 (2024): 131–49. https://doi.org/10.5281/zenodo.13694364.
Full textLescisin, Michael, and Qusay H. Mahmoud. "Evaluation of Dynamic Analysis Tools for Software Security." International Journal of Systems and Software Security and Protection 9, no. 3 (2018): 34–59. http://dx.doi.org/10.4018/ijsssp.2018070102.
Full textManoj, Kodali. "Smart Home Automation." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45582.
Full textLaxminarayana, Korada, Kartik Sikha Vijay, and Siramgari Dayakar. "Streamlining Enterprise Cybersecurity: Building Real-Time Threat Analytics Solutions." European Journal of Advances in Engineering and Technology 7, no. 12 (2020): 107–11. https://doi.org/10.5281/zenodo.13762555.
Full textTaiwo Joseph Akinbolaji, Godwin Nzeako, David Akokodaripon, and Akorede Victor Aderoju. "Automation in Cloud-Based DevOps: A Guide to CI/CD Pipelines and Infrastructure as Code (IaC) with Terraform and Jenkins." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 090–104. http://dx.doi.org/10.30574/wjaets.2024.13.2.0542.
Full textArjun Kumar Paruchuri. "Identity-first security architecture: Leveraging Microsoft Entra ID and Intelligent automation for enterprise digital transformation." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 1539–46. https://doi.org/10.30574/wjaets.2025.15.3.1051.
Full textPutra, Wahyu Riski Aulia, Agus Reza Aristiadi Nurwa, Dimas Febriyan Priambodo, and Muhammad Hasbi. "Infrastructure as Code for Security Automation and Network Infrastructure Monitoring." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 22, no. 1 (2022): 201–14. http://dx.doi.org/10.30812/matrik.v22i1.2471.
Full text