Academic literature on the topic 'Security solution'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security solution.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security solution"
Meyer, Helen. "Security risk or security solution?" Computers & Security 15, no. 4 (1996): 317. http://dx.doi.org/10.1016/0167-4048(96)88943-7.
Full textShukla, Surabhi. "Public Cloud Security Challenges & Solution." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 111–17. https://doi.org/10.70729/ijser15100.
Full textLi, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (2020): 916. http://dx.doi.org/10.3390/s20030916.
Full textTyler, Neil. "Pre-Provisioned Security Solution." New Electronics 51, no. 18 (2019): 8. http://dx.doi.org/10.12968/s0047-9624(22)61427-5.
Full textČuřík, Peter, Roderik Ploszek, and Pavol Zajac. "Practical Use of Secret Sharing for Enhancing Privacy in Clouds." Electronics 11, no. 17 (2022): 2758. http://dx.doi.org/10.3390/electronics11172758.
Full textBS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.
Full textStashchuk, Olena, and Rostyslav Martyniuk. "Banking innovations: security technology solution." VUZF Review 6, no. 1 (2021): 79–86. http://dx.doi.org/10.38188/2534-9228.21.6.08.
Full textSharma,, Rajani, and Rajender Kumar Trivedi. "Literature review: Cloud Computing –Security Issues, Solution and Technologies." International Journal of Engineering Research 3, no. 4 (2014): 221–25. http://dx.doi.org/10.17950/ijer/v3s4/408.
Full textOliveira, Vítor, António Coelho, Rui Guimarães, and Carlos Rebelo. "Serious Game in Security: A Solution for Security Trainees." Procedia Computer Science 15 (2012): 274–82. http://dx.doi.org/10.1016/j.procs.2012.10.079.
Full textKandpal, Meenakshi, Yash Pritwani, Chinmaya Misra, Amrendra Yadav, and Rabindra Barik. "Towards data storage scheme in blockchain based serverless environment: AES encryption and decryption algorithm approach." Facta universitatis - series: Electronics and Energetics 37, no. 2 (2024): 317–42. http://dx.doi.org/10.2298/fuee2402317k.
Full textDissertations / Theses on the topic "Security solution"
Wullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.
Full textHensley, Katrina Ludden Fredrick. "ATM security via "Stargate" solution /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA370810.
Full textHensley, Katrina, and Fredrick Ludden. "ATM security via "Stargate" solution." Thesis, Monterey, California: Naval Postgraduate School, 1999. http://hdl.handle.net/10945/13683.
Full textSkaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.
Full textMarcos, Conca Alexandre. "A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205272.
Full textNg, Yu Loon. "Short Message Service (SMS) security solution for mobile devices." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FNg%5FYu.pdf.
Full textSomasekaram, Premathas. "Designing a Business Intelligence Solution for Analyzing Security Data." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-208685.
Full textWilson, Freya Louise. "A solution for post quantum security using existing communications infrastructures." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/20820/.
Full textRajendran, Ashok. "Security Analysis of a Software Defined Wide Area Network Solution." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190193.
Full textAhmad, Nadeem, and M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.
Full textBooks on the topic "Security solution"
author, Nguyen Hung, Romero Stephanie author, Levison Jakob author, and Selga Dominici author, eds. WordPress: Brute security & Bot defense solution. National University, 2013.
Find full textInstitute for Essential Services Reform. Energy poverty: Fact and solution. Institute for Essential Services Reform, 2010.
Find full textMourani, Gerhard. Securing & optimizing Linux: The ultimate solution. Open Network Architecture Inc., 2001.
Find full textBeard, Sam. Restoring hope in America: The social security solution. Institute for Contemporary Studies, 1996.
Find full textZhen, Jiang, and Pan Yi, eds. From problem to solution: Wireless sensor networks security. Nova Science, 2008.
Find full textAmerican Bar Association. Standing Committee on Law and National Security. and American Bar Association Meeting, eds. National security leaks: Is there a legal solution?. American Bar Association, Standing Committee on Law and National Security, 1986.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. Designing for solution-based security on z/OS. IBM, International Technical Support Organization, 2008.
Find full textJoe, McGraw, and Lauchengco Duane, eds. The sovereignty solution: A common sense approach to global security. Naval Institute Press, 2011.
Find full textSecurity, Inter-American Conference on Social. Financing problems and options for a solution: The Americas social security report, 2002. Inter-American Conference on Social Security, 2002.
Find full textBook chapters on the topic "Security solution"
Welsh, Sean. "Solution design." In Ethics and Security Automata. Routledge, 2017. http://dx.doi.org/10.4324/9781315168951-5.
Full textNeelakrishnan, Priyanka. "Data Security Solution Design." In Autonomous Data Security. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0838-8_4.
Full textZhang, Weijia, and Tej Anand. "Security Considerations." In Blockchain and Ethereum Smart Contract Solution Development. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8164-2_8.
Full textYang, Haomiao, Hongwei Li, and Xuemin Sherman Shen. "Complete ADS-B Security Solution." In Secure Automatic Dependent Surveillance-Broadcast Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07021-1_5.
Full textThomas, Shince, Devesh Misra, P. R. Lakshmi Eswari, and N. Sarat Chandra Babu. "A Transparent End-to-End Security Solution." In Information Systems Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11593980_28.
Full textHernandez Fernandez, Javier, Aymen Omri, and Roberto Di Pietro. "PLC Network Integrity Solution." In Physical Layer Security in Power Line Communications. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57349-1_9.
Full textChorghe, Sharvari Prakash, and Narendra Shekokar. "A Solution to Detect Phishing in Android Devices." In Information Systems Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5_25.
Full textChoi, SuGil, Kwangjo Kim, and ByeongGon Kim. "Practical Solution for Location Privacy in Mobile IPv6." In Information Security Applications. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24591-9_6.
Full textRadha, V., and N. Hemanth Kumar. "EISA – An Enterprise Application Security Solution for Databases." In Information Systems Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11593980_12.
Full textAbdul Based, Md. "Information Handling in Security Solution Decisions." In Innovations and Advances in Computer Sciences and Engineering. Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-3658-2_67.
Full textConference papers on the topic "Security solution"
Qatinah, Shatha Hameed, and Ibrahim Ahmed Al-Baltah. "Kerberos Protocol: Security Attacks and Solution." In 2024 1st International Conference on Emerging Technologies for Dependable Internet of Things (ICETI). IEEE, 2024. https://doi.org/10.1109/iceti63946.2024.10777133.
Full textChiș, Alexandru, Titus-Constantin Bălan, Petru-Adrian Cotfas, and Daniel-Tudor Cotfas. "Deployment of a security solution for cloud." In 2024 15th International Conference on Communications (COMM). IEEE, 2024. http://dx.doi.org/10.1109/comm62355.2024.10741412.
Full textKumar, Arvind, Ashish Gholve, and Kedar Kotalwar. "Automotive Security Solution Using Hardware Security Module (HSM)." In International Automotive CAE Conference – Road to Virtual World. SAE International, 2024. http://dx.doi.org/10.4271/2024-28-0037.
Full textYassine, Hicham, and Mohammad Malli. "A Lightweight IoT Security Solution." In 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, 2019. http://dx.doi.org/10.1109/iwcmc.2019.8766687.
Full textLiu, W., and E. K. Park. "e-Healthcare Security Solution Framework." In 2012 21st International Conference on Computer Communications and Networks - ICCCN 2012. IEEE, 2012. http://dx.doi.org/10.1109/icccn.2012.6289239.
Full textJaigirdar, Fariha Tasmin. "Trust based Security Solution for Internet of Things Healthcare Solution." In UbiComp '18: The 2018 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 2018. http://dx.doi.org/10.1145/3267305.3277810.
Full textXu, Yuanyuan, and He Yang. "Security Solution Based on WSO2 IS." In 2015 International Conference on Advances in Mechanical Engineering and Industrial Informatics. Atlantis Press, 2015. http://dx.doi.org/10.2991/ameii-15.2015.35.
Full textWerapun, W., A. Abou El Kalam, B. Paillassa, and J. Fasson. "Solution analysis for SIP security threats." In 2009 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2009. http://dx.doi.org/10.1109/mmcs.2009.5256707.
Full textWu, Kai-xing, and Han Xi. "Research on AJAX Security and Solution." In Proceedings of the International Conference. World Scientific Publishing Company, 2008. http://dx.doi.org/10.1142/9789812799524_0320.
Full textNewaz, Nishat Tasnim, Mohammad Rafiqul Haque, Tajim Md Niamat Ullah Akhund, Tania Khatun, Milon Biswas, and Mohammad Abu Yousuf. "IoT Security Perspectives and Probable Solution." In 2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). IEEE, 2021. http://dx.doi.org/10.1109/worlds451998.2021.9513997.
Full textReports on the topic "Security solution"
Mattila, Petri. Finland's Security Solution in the Future. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada589427.
Full textShah, Viren. An Aspect-Oriented Security Assurance Solution. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada419305.
Full textPruet, Andres. The National Security Data Solution (NSDS). Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/1878003.
Full textMylrea, Michael, Sri Nikhil Gourisetti, Judah Plummer, et al. Keyless Infrastructure Security Solution (Kiss): Examining Security and Trust Gaps. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1827741.
Full textMylrea, Michael, Sri Nikhil Gourisetti, and Heather Culley. Keyless Infrastructure Security Solution (KISS) Technology Landscape Analysis Report. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1826603.
Full textChiang, Hsiao-Dong. High Performance Solution for Security Constrained Optimal Power Flow. Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/1863594.
Full textChiang, Hsiao-Dong. High Performance Solution for Security Constrained Optimal Power Flow. Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/1863594.
Full textPerkins, C., and M. Westerlund. Securing the RTP Framework: Why RTP Does Not Mandate a Single Media Security Solution. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7202.
Full textMylrea, Michael, Sri Nikhil Gourisetti, Vinod Tatireddy, et al. Keyless Infrastructure Security Solution (KISS): VOLTRON KSI Blockchain Design and Specification. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1828066.
Full textŠulus, Vytautas, and Pavel Voitkun. Prototype of the Electronic Voting System. Security Implementations Using Database Facilities. Vilnius Business College, 2024. https://doi.org/10.57005/ab.2024.3.4.
Full text