Journal articles on the topic 'Security control framework'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security control framework.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kumar, Harsh. "Cloud Compliance Security Optimization." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49485.
Full textWang, Yu Fei, Tao Zhang, Yuan Yuan Ma, and Bo Zhang. "An Information Security Assessments Framework for Power Control Systems." Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.
Full textAl Ketbi, Maitha, Khaled Shuaib, Ezedin Barka, and Marton Gergely. "Establishing a Security Control Framework for Blockchain Technology." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 307–30. http://dx.doi.org/10.28945/4837.
Full textAbdulrahman, H. Altalhi1 Zailani Mohamed Sidek2 Norjihan Abdul Ghani3 Fazidah Othman4 and Maged Abdelkhaleq Al-Sheshtawil5. "ENHANCING THE SECURITY FRAMEWORK SECURECLOUD WITH THE SWIFT IDENTITY MANAGEMENT FRAMEWORK." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 2, February (2018): 01–07. https://doi.org/10.5281/zenodo.1444289.
Full textJi, Kaining, Yitian Liu, and Changju Hu. "Design of Security Control Framework for Power System Microservices." Advances in Engineering Technology Research 13, no. 1 (2025): 777. https://doi.org/10.56028/aetr.13.1.777.2025.
Full textKumar, Anurag, and Prof Bibha Kumari. "Implementing Privacy Preserving Techniques in Distributed Big Data Framework on Cloud Computing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem37051.
Full textYogesh Kumar Bhardwaj. "Securing Generative AI: Navigating Data Security Challenges in the AI Era." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 147–55. https://doi.org/10.32996/jcsts.2025.7.4.17.
Full textAlshammari, Ahmad. "A Novel Security Framework to Mitigate and Avoid Unexpected Security Threats in Saudi Arabia." Engineering, Technology & Applied Science Research 13, no. 4 (2023): 11445–50. http://dx.doi.org/10.48084/etasr.6091.
Full textXu, Mudi, Benfeng Chen, Zhizhong Tan, et al. "AHAC: Advanced Network-Hiding Access Control Framework." Applied Sciences 14, no. 13 (2024): 5593. http://dx.doi.org/10.3390/app14135593.
Full textKalwani, Seema. "Quality Framework, Principles, control practices, benchmark, internal controls addressing needs of current world." International Journal of Multidisciplinary Research and Growth Evaluation 2, no. 4 (2021): 919–26. https://doi.org/10.54660/.ijmrge.2021.2.4.919-926.
Full textTalha, Mohamed, and Anas Abou El Kalam. "Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms." JUCS - Journal of Universal Computer Science 27, no. 12 (2021): 1300–1324. http://dx.doi.org/10.3897/jucs.77046.
Full textTalha, Mohamed, and El Kalam Anas Abou. "Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms." JUCS - Journal of Universal Computer Science 27, no. (12) (2021): 1300–1324. https://doi.org/10.3897/jucs.77046.
Full textNazmul, Hossain* Md. Alam Hossain Taposh Das Md. Tariqul Islam. "MEASURING THE CYBER SECURITY RISK ASSESSMENT METHODS FOR SCADA SYSTEM." Global Journal of Engineering Science and Research Management 4, no. 7 (2017): 1–12. https://doi.org/10.5281/zenodo.824955.
Full textPradeep, Kumar. "Vault Security Framework Optimization for Improved Throughput and Security." International Journal of Leading Research Publication 4, no. 4 (2023): 1–29. https://doi.org/10.5281/zenodo.15026485.
Full textOladeji, Ifedayo, Ramon Zamora, and Tek Tjing Lie. "An Online Security Prediction and Control Framework for Modern Power Grids." Energies 14, no. 20 (2021): 6639. http://dx.doi.org/10.3390/en14206639.
Full textOladeji, Ifedayo, Ramon Zamora, and Tek Tjing Lie. "An Online Security Prediction and Control Framework for Modern Power Grids." Energies 14, no. 20 (2021): 6639. http://dx.doi.org/10.3390/en14206639.
Full textLu, Bo, Ruohan Cao, Luyao Tian, Hao Wang, and Yueming Lu. "FMNISCF: Fine-Grained Multi-Domain Network Interconnection Security Control Framework." Applied Sciences 10, no. 1 (2020): 409. http://dx.doi.org/10.3390/app10010409.
Full textPark, Jong. "USF-PAS : Study on Core Security Technologies for Ubiquitous Security Framework." JUCS - Journal of Universal Computer Science 15, no. (5) (2009): 1065–80. https://doi.org/10.3217/jucs-015-05-1065.
Full textKang, Jeong Hwa, and Minhye Seo. "Enhanced Authentication for Decentralized IoT Access Control Architecture." Cryptography 7, no. 3 (2023): 42. http://dx.doi.org/10.3390/cryptography7030042.
Full textCHEN, TSUNG-YI. "A MULTIPLE-LAYER KNOWLEDGE MANAGEMENT SYSTEM FRAMEWORK CONSIDERING USER KNOWLEDGE PRIVILEGES." International Journal of Software Engineering and Knowledge Engineering 19, no. 03 (2009): 361–87. http://dx.doi.org/10.1142/s0218194009004192.
Full textJamieson, Rodger, and Graham Low. "Local Area Network Operations: A Security, Control and Audit Perspective." Journal of Information Technology 5, no. 2 (1990): 63–72. http://dx.doi.org/10.1177/026839629000500202.
Full textAws, Hamed Hamad, Yousif Dawod Adnan, Fakhrulddin Abdulqader Mohammed, Al_Barazanchi Israa, and Muwafaq Gheni Hassan. "A secure sharing control framework supporting elastic mobile cloud computing." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 2270–77. https://doi.org/10.11591/ijece.v13i2.pp2270-2277.
Full textDinesh, Thangaraju. "Integrated Security Control Platforms: A Unified Framework for Enterprise Data Protection and Compliance." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–11. https://doi.org/10.5281/zenodo.15087110.
Full textWai, Eric, and C. K. M. Lee. "Seamless Industry 4.0 Integration: A Multilayered Cyber-Security Framework for Resilient SCADA Deployments in CPPS." Applied Sciences 13, no. 21 (2023): 12008. http://dx.doi.org/10.3390/app132112008.
Full textUgbaja, Unomah Success, Uloma Stella Nwabekee, Wilfred Oseremen Owobu, and Olumese Anthony Abieba. "Conceptual Framework for Role-Based Network Access Management to Minimize Unauthorized Data Exposure Across IT Environments." International Journal of Social Science Exceptional Research 2, no. 1 (2023): 211–21. https://doi.org/10.54660/ijsser.2023.2.1.211-221.
Full textAmarendra Reddy, P., Sheikh Gouse, and P. Bhaskara Reddy. "Security and Privacy Mechanisms of Big Data." International Journal of Engineering & Technology 7, no. 4.39 (2018): 730–33. http://dx.doi.org/10.14419/ijet.v7i4.39.26264.
Full textMehra, Taresh. "The Evolution of Backup Security: Integrating Zero Trust, Encryption, and Access Control for Data Integrity." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem41976.
Full textAruljothi, A., N. Prabhu, and N. M. Mallika. "Network Security Based on Component for Information Network." Asian Journal of Computer Science and Technology 8, S1 (2019): 15–17. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1986.
Full textHu, An Ming. "The Application Research of Lightweight J2EE Security Framework." Advanced Materials Research 989-994 (July 2014): 4342–45. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4342.
Full textAli, Mohammed H., and Nisreen K. Ali. "IoT based security system and intelligent home automation multi monitoring and control systems." IAES International Journal of Robotics and Automation (IJRA) 8, no. 3 (2019): 205–10. https://doi.org/10.11591/ijra.v8i3.pp205-210.
Full textNicho, Mathew, Hussein Fakhry, and Charles Haiber. "An Integrated Security Governance Framework for Effective PCI DSS Implementation." International Journal of Information Security and Privacy 5, no. 3 (2011): 50–67. http://dx.doi.org/10.4018/jisp.2011070104.
Full textBinghui, ZHENG, WANG Lijing, LI Hong, and LI Xiaobao. "Technical framework for ecological security control in lakes and reservoirs." Journal of Lake Sciences 26, no. 2 (2014): 169–76. http://dx.doi.org/10.18307/2014.0201.
Full textNaoui, Sarra, Mohamed Elhoucine Elhdhili, and Leila Azouz Saidane. "Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security." Wireless Personal Communications 110, no. 4 (2019): 2109–30. http://dx.doi.org/10.1007/s11277-019-06832-x.
Full textPavlich-Mariscal, Jaime A., Steven A. Demurjian, and Laurent D. Michel. "A framework for security assurance of access control enforcement code." Computers & Security 29, no. 7 (2010): 770–84. http://dx.doi.org/10.1016/j.cose.2010.03.004.
Full textEL Yamany, Hany F., Miriam A. M. Capretz, and David S. Allison. "Intelligent security and access control framework for service-oriented architecture." Information and Software Technology 52, no. 2 (2010): 220–36. http://dx.doi.org/10.1016/j.infsof.2009.10.005.
Full textDehlaghi-Ghadim, Alireza, Ali Balador, Mahshid Helali Moghadam, Hans Hansson, and Mauro Conti. "ICSSIM — A framework for building industrial control systems security testbeds." Computers in Industry 148 (June 2023): 103906. http://dx.doi.org/10.1016/j.compind.2023.103906.
Full textNadia, Razzaq. "SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS." International Journal of Information Technology, Modeling and Computing (IJITMC) 1, August (2018): 01–22. https://doi.org/10.5281/zenodo.1435311.
Full textKanobe, Fredrick, SP Sambo, and Billy Mathias Kalema. "Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda." Journal of Innovation Information Technology and Application (JINITA) 4, no. 1 (2022): 82–92. http://dx.doi.org/10.35970/jinita.v4i1.1292.
Full textKanobe, Fredrick, SP Sambo, and Billy Mathias Kalema. "Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda." Journal of Innovation Information Technology and Application (JINITA) 4, no. 1 (2022): 82–92. http://dx.doi.org/10.35970/jinita.v4i1.1427.
Full textH. Ali, Mohammed, and Nisreen K. Ali. "IoT based security system and intelligent home automation multi monitoring and control systems." IAES International Journal of Robotics and Automation (IJRA) 8, no. 3 (2019): 205. http://dx.doi.org/10.11591/ijra.v8i3.pp205-210.
Full textJagdish Jangid. "Secure Microservice Communication in Optical Networks." Journal of Information Systems Engineering and Management 10, no. 21s (2025): 911–26. https://doi.org/10.52783/jisem.v10i21s.3455.
Full textYu, Zhi Wei. "A Business Process-Based Risk Evaluation Framework." Advanced Materials Research 230-232 (May 2011): 1024–28. http://dx.doi.org/10.4028/www.scientific.net/amr.230-232.1024.
Full textAlrashede, Hamad, Fathy Eassa, Abdullah Marish Ali, Faisal Albalwy, and Hosam Aljihani. "A Blockchain-Based Security Framework for East-West Interface of SDN." Electronics 13, no. 19 (2024): 3799. http://dx.doi.org/10.3390/electronics13193799.
Full textTung, Shu Chu, Wu Jeng Li, and Shih Miao Huang. "Home Security Service and Condition Control." Applied Mechanics and Materials 479-480 (December 2013): 661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.661.
Full textPatel, Subhash Chandra, Sumit Jaiswal, Ravi Shankar Singh, and Jyoti Chauhan. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing." International Journal of Green Computing 9, no. 2 (2018): 1–15. http://dx.doi.org/10.4018/ijgc.2018070101.
Full textWang, Chun Lei, Qing Miao, Lan Fang, and Yi Qi Dai. "A Novel Framework for Industrial Control System Malicious Code Analysis." Advanced Materials Research 765-767 (September 2013): 1936–42. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1936.
Full textMohajan, Avoy, and Sharmin Jahan. "Embedding Security Awareness into a Blockchain-Based Dynamic Access Control Framework for the Zero Trust Model in Distributed Systems." Electronics 14, no. 6 (2025): 1095. https://doi.org/10.3390/electronics14061095.
Full textNarendra Chennupati. "Securing the Automated Enterprise: A Framework for Mitigating Security and Privacy Risks in AI-Driven Workflow Automation." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 624–32. https://doi.org/10.32996/jcsts.2025.7.3.71.
Full textRamaswamy, Mithilesh. "Enhancing Security in Bring Your Own Device Environments (BYOD) with Trusted Platform Modules, Continuous Monitoring, and Hardware Security Modules." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem6838.
Full textAgboola, Rihanat Bola, Zaharaddeen Salele Iro, Jamilu Awwalu, and Ibrahim Nasir Said. "Database security framework design using tokenization." Dutse Journal of Pure and Applied Sciences 8, no. 1b (2022): 16–26. http://dx.doi.org/10.4314/dujopas.v8i1b.3.
Full text