Journal articles on the topic 'Security Automation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security Automation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Potter, Bruce. "Security automation." Network Security 2007, no. 9 (2007): 18–19. http://dx.doi.org/10.1016/s1353-4858(07)70084-3.
Full textHighland, HaroldJoseph. "Office automation security." Computers & Security 6, no. 6 (1987): 452–57. http://dx.doi.org/10.1016/0167-4048(87)90023-x.
Full textShahane, Gauri. "Network Security (Automation)." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30835.
Full textAvinash, Singh, Singh Bharat, Rawat Divyanshu, and Jaint Bhavnesh. "Automation Security System." International Journal of Engineering Research & Science 6, no. 4 (2020): 09–15. https://doi.org/10.5281/zenodo.3767642.
Full textBipin Gajbhiye, Anshika Aggarwal, and DR. Punit Goel. "Security Automation in Application Development Using Robotic Process Automation (RPA)." Universal Research Reports 10, no. 3 (2023): 167–80. http://dx.doi.org/10.36676/urr.v10.i3.1331.
Full textSagar, K. E. CH Vidya, J Swetha, T J Deepika, and S Rajesh. "SIGNIFICANT GROWTH IN HOME AUTOMATION AND ITS SECURITY SYSTEM USING ARDUINO." Journal of Nonlinear Analysis and Optimization 15, no. 02 (2024): 920–28. https://doi.org/10.36893/jnao.2024.v15i2.143.
Full textSilva, Roberto De Carvalho. "AUTOMATION AND OPTIMIZATION OF THE SAP SOFTWARE INSTALLATION PROCESS IN CORPORATE WORKSTATIONS: IMPACTS ON SCALABILITY AND SECURITY." Revista ft 29, no. 145 (2025): 34–35. https://doi.org/10.69849/revistaft/ch10202504040734.
Full textRunde, Markus, Walter Speth, Thomas Steffen, and Christoph Thiell. "Automation Security Risk Assessment." atp edition 58 (January 1, 2016): 48. http://dx.doi.org/10.17560/atp.v58i01-02.551.
Full textKothiyal, Sonakshi. "Automation in Cyber-Security." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (2019): 581–84. http://dx.doi.org/10.22214/ijraset.2019.5098.
Full textWong, Ken. "Security and Office Automation." EDPACS 15, no. 3 (1987): 5–11. http://dx.doi.org/10.1080/07366988709452219.
Full textWong, Ken. "Security and office automation." Computers & Security 7, no. 1 (1988): 106–7. http://dx.doi.org/10.1016/0167-4048(88)90548-2.
Full textRadack, Shirley, and Rick Kuhn. "Managing Security: The Security Content Automation Protocol." IT Professional 13, no. 1 (2011): 9–11. http://dx.doi.org/10.1109/mitp.2011.11.
Full textRavi, Chandra Thota. "Cloud-Native DevSecOps: Integrating Security Automation into CI/CD Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–19. https://doi.org/10.5281/zenodo.15036934.
Full textSandhya, Guduru. "Cloud Security Automation: Enforcing CIS Benchmarks with AWS Config, Azure Policy, and OpenStack Chef Cookbooks." Journal of Scientific and Engineering Research 7, no. 10 (2020): 243–48. https://doi.org/10.5281/zenodo.15234591.
Full textProf., S. S. Mhaske*1 Rupali J. Nirmal2 Dr. C. M. Jadhao3 &. Prof. P. S. Nimat3. "REVIEW PAPER ON HOME AUTOMATION AND SECURITY USING IOT." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES [NC-Rase 18] (November 15, 2018): 55–60. https://doi.org/10.5281/zenodo.1488701.
Full textJafarov, N. "REDUCING CYBERSECURITY RISKS BY AUTOMATIZING RISK MANAGEMENT." Znanstvena misel journal, no. 97 (December 30, 2024): 52–55. https://doi.org/10.5281/zenodo.14575450.
Full textStodolsky, D. S. "Automation of Contagion Vigilance." Methods of Information in Medicine 36, no. 03 (1997): 221–32. http://dx.doi.org/10.1055/s-0038-1636827.
Full textPriyadharsini, S. "Home Automation and Security System." International Journal for Research in Applied Science and Engineering Technology V, no. III (2017): 1174–79. http://dx.doi.org/10.22214/ijraset.2017.3215.
Full textKaur, Surinder, Rashmi Singh, Neha Khairwal, and Pratyk Jain. "HOME AUTOMATION AND SECURITY SYSTEM." Advanced Computational Intelligence: An International Journal (ACII) 3, no. 3 (2016): 17–23. http://dx.doi.org/10.5121/acii.2016.3303.
Full textMathew, Alex. "Cybersecurity Infrastructure and Security Automation." Advanced Computing: An International Journal 10, no. 6 (2019): 1–7. http://dx.doi.org/10.5121/acij.2019.10601.
Full textChien, Ting-Li, Kuo-Lan Su, and Jr-Hung Guo. "Intelligent Home-Automation Security System." International Journal of Automation Technology 3, no. 2 (2009): 121–29. http://dx.doi.org/10.20965/ijat.2009.p0123.
Full textGranzer, Wolfgang, Fritz Praus, and Wolfgang Kastner. "Security in Building Automation Systems." IEEE Transactions on Industrial Electronics 57, no. 11 (2010): 3622–30. http://dx.doi.org/10.1109/tie.2009.2036033.
Full textG, SHYAMALA, Ronith Gowda, Sashikiran Gavanivari, Suvith K S, and Vishwamohan Narendra. "Home Automation Security Using Blockchain." International Journal of Computer Science and Engineering 7, no. 7 (2020): 63–68. http://dx.doi.org/10.14445/23488387/ijcse-v7i7p111.
Full textMarsh, P. "Beyond control [automation system security]." Information Professional 2, no. 2 (2005): 12–16. http://dx.doi.org/10.1049/inp:20050202.
Full textEdwards, Chris. "Automation Key to Hardware Security." New Electronics 55, no. 10 (2022): 28–29. http://dx.doi.org/10.12968/s0047-9624(23)60439-0.
Full textSIDDHARTH, B. R., RANJAN RAVI, and SARDAR BASHA N. "HOME DOOR AUTOMATION SYSTEM." INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] 4, no. 12 (2018): 1–5. https://doi.org/10.5281/zenodo.1135412.
Full textJASMINE, PEMEENA PRIYADARISINI M., SARDAR BASHA N., RANJAN RAVI, and B. R. SIDDHARTH. "HOME DOOR AUTOMATION SYSTEM." IJIERT - International Journal of Innovations in Engineering Research and Technology 4, no. 12 (2017): 1–5. https://doi.org/10.5281/zenodo.1456246.
Full textIfeanyi, Chukwuagu M., Ogbu Gregory, and Chukwu Linus. "Improving Cyber Security in Power Systems and Substation Automation Using Intelligent Based System." American Journal of Multidisciplinary Research and Innovation 4, no. 4 (2025): 47–63. https://doi.org/10.54536/ajmri.v4i4.4823.
Full textCunha, Lilian. "ACCOUNTING AUTOMATION WITH N8N: POSSIBILITIES, LIMITS, AND IMPACTS FOR SMALL BUSINESSES." Revista ft 29, no. 146 (2025): 22–23. https://doi.org/10.69849/revistaft/dt10202505281222.
Full textSujan Kumar, Kummari. "Next-Generation Security Operations: Leveraging Automation for Proactive Threat Mitigation." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43432.
Full textTilbury, Jack, and Stephen Flowerday. "Automation Bias and Complacency in Security Operation Centers." Computers 13, no. 7 (2024): 165. http://dx.doi.org/10.3390/computers13070165.
Full textCho, Do-Eun. "Smart Contract Security Vulnerability Analysis and Security Automation Model." Journal of Digital Contents Society 25, no. 4 (2024): 1087–94. http://dx.doi.org/10.9728/dcs.2024.25.4.1087.
Full textChen, Liang, Xiao Jun Zuo, and Yu Fei Wang. "Research on Information Security Test Bed and Evaluation Framework for Distribution Automation System." Applied Mechanics and Materials 737 (March 2015): 210–13. http://dx.doi.org/10.4028/www.scientific.net/amm.737.210.
Full textShekar, Vinay C., Sayeed Ur Rahman, Srinivas Vishal Bhat DB, Abdul Mateen, and Ranjitha A.S. "Enhanced Network Security for IoT based Home Automation System." International Journal of Emerging Research in Management and Technology 6, no. 6 (2018): 278. http://dx.doi.org/10.23956/ijermt.v6i6.282.
Full textTilbury, Jack, and Stephen Flowerday. "Humans and Automation: Augmenting Security Operation Centers." Journal of Cybersecurity and Privacy 4, no. 3 (2024): 388–409. http://dx.doi.org/10.3390/jcp4030020.
Full textSridevi Kakolu and Muhammad Ashraf Faheem. "Revolutionizing industries through digitization: The strategic importance of mobile application automation." International Journal of Science and Research Archive 8, no. 1 (2023): 973–87. http://dx.doi.org/10.30574/ijsra.2023.8.1.0276.
Full textChinthamu, Narender, Ashish, Victor Emmanuel P, Mathiyalagan P, Syed Zahidur Rashid, and Jothi E. "Robotic Process Automation in Business Processes Streamlining Operations Through Automation Technologies." ITM Web of Conferences 76 (2025): 01005. https://doi.org/10.1051/itmconf/20257601005.
Full textLiu, Fang. "Social Security Research under Automation Control." Applied Mechanics and Materials 340 (July 2013): 621–25. http://dx.doi.org/10.4028/www.scientific.net/amm.340.621.
Full textSingh, Er Dhananjali, Satyendra Kumar Singh, and Jitendra Kumar Yadav. "Home Automation and Security Using IOT." IJARCCE 8, no. 5 (2019): 52–56. http://dx.doi.org/10.17148/ijarcce.2019.8512.
Full textKirubakaran, B., K. Baveena, M. Keerthana, and R. Ramya. "Automation Based StairBOT for Security Application." DJ Journal of Advances in Electronics and Communication Engineering 4, no. 2 (2018): 17–21. http://dx.doi.org/10.18831/djece.org/2018021003.
Full textTreytl, Albert, Peter Palensky, and Thilo Sauter. "SECURITY CONSIDERATIONS FOR ENERGY AUTOMATION NETWORKS." IFAC Proceedings Volumes 38, no. 2 (2005): 158–65. http://dx.doi.org/10.3182/20051114-2-mx-3901.00023.
Full textRathod, Ishwarlal, Anuprita P. Linge, Dev Davda, Rohit Manna, and Nividh Parekh. "Security Automation System by Unique Identifier." International Journal of Innovations in Engineering and Science 9, no. 1 (2024): 104–7. http://dx.doi.org/10.46335/ijies.2024.9.1.19.
Full textMoreira, Naiara, Elías Molina, Jesús Lázaro, Eduardo Jacob, and Armando Astarloa. "Cyber-security in substation automation systems." Renewable and Sustainable Energy Reviews 54 (February 2016): 1552–62. http://dx.doi.org/10.1016/j.rser.2015.10.124.
Full textEdelson, Eve. "Building automation security in office buildings." Computer Fraud & Security 2004, no. 10 (2004): 4–6. http://dx.doi.org/10.1016/s1361-3723(04)00120-4.
Full textHighland,, Harold Joseph. "Program aids for office automation security." Computers & Security 7, no. 1 (1988): 37–43. http://dx.doi.org/10.1016/0167-4048(88)90500-7.
Full textKeenan, Thomas P. "Emerging vulnerabilities in office automation security." Computers & Security 8, no. 3 (1989): 223–27. http://dx.doi.org/10.1016/0167-4048(89)90105-3.
Full textHoralek, Josef, and Vladimir Sobeslav. "Security Baseline for Substation Automation Systems." Sensors 23, no. 16 (2023): 7125. http://dx.doi.org/10.3390/s23167125.
Full textPatel, Jay Prakash, and Mansi Kapoor. "Home Automation New Approach for Security." International Journal of Advance Research and Innovation 3, no. 1 (2015): 130–33. http://dx.doi.org/10.51976/ijari.311524.
Full textNeves, Ângelo, and Gisele Lemes Veiga Araujo. "Smart Automation for Enhancing Cyber-Security." Foresight and STI Governance 17, no. 1 (2023): 89–97. http://dx.doi.org/10.17323/2500-2597.2023.1.89.97.
Full textWeil, Ramon. "Security Orchestration, Automation and Response (SOAR)." Technische Sicherheit 13, no. 11-12 (2023): 41–42. http://dx.doi.org/10.37544/2191-0073-2023-11-12-41.
Full text