Journal articles on the topic 'Security solution'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security solution.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Meyer, Helen. "Security risk or security solution?" Computers & Security 15, no. 4 (1996): 317. http://dx.doi.org/10.1016/0167-4048(96)88943-7.
Full textShukla, Surabhi. "Public Cloud Security Challenges & Solution." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 111–17. https://doi.org/10.70729/ijser15100.
Full textLi, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (2020): 916. http://dx.doi.org/10.3390/s20030916.
Full textTyler, Neil. "Pre-Provisioned Security Solution." New Electronics 51, no. 18 (2019): 8. http://dx.doi.org/10.12968/s0047-9624(22)61427-5.
Full textČuřík, Peter, Roderik Ploszek, and Pavol Zajac. "Practical Use of Secret Sharing for Enhancing Privacy in Clouds." Electronics 11, no. 17 (2022): 2758. http://dx.doi.org/10.3390/electronics11172758.
Full textBS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.
Full textStashchuk, Olena, and Rostyslav Martyniuk. "Banking innovations: security technology solution." VUZF Review 6, no. 1 (2021): 79–86. http://dx.doi.org/10.38188/2534-9228.21.6.08.
Full textSharma,, Rajani, and Rajender Kumar Trivedi. "Literature review: Cloud Computing –Security Issues, Solution and Technologies." International Journal of Engineering Research 3, no. 4 (2014): 221–25. http://dx.doi.org/10.17950/ijer/v3s4/408.
Full textOliveira, Vítor, António Coelho, Rui Guimarães, and Carlos Rebelo. "Serious Game in Security: A Solution for Security Trainees." Procedia Computer Science 15 (2012): 274–82. http://dx.doi.org/10.1016/j.procs.2012.10.079.
Full textKandpal, Meenakshi, Yash Pritwani, Chinmaya Misra, Amrendra Yadav, and Rabindra Barik. "Towards data storage scheme in blockchain based serverless environment: AES encryption and decryption algorithm approach." Facta universitatis - series: Electronics and Energetics 37, no. 2 (2024): 317–42. http://dx.doi.org/10.2298/fuee2402317k.
Full textVulpe, Alexandru, Răzvan Crăciunescu, Ana-Maria Drăgulinescu, Sofoklis Kyriazakos, Ali Paikan, and Pouyan Ziafati. "Enabling Security Services in Socially Assistive Robot Scenarios for Healthcare Applications." Sensors 21, no. 20 (2021): 6912. http://dx.doi.org/10.3390/s21206912.
Full textHan, Yu, Xiaolei Wang, Yi Zhang, Gang Yang, and Xin Tan. "A UAV swarm communication network architecture based on consortium blockchain." Journal of Physics: Conference Series 2352, no. 1 (2022): 012008. http://dx.doi.org/10.1088/1742-6596/2352/1/012008.
Full textLonghas, Paul Ryan A., Alsafat M. Abdul, and Edcon B. Baccay. "The Security Assignment Problem and Its Solution." International Journal of Analysis and Applications 21 (July 17, 2023): 72. http://dx.doi.org/10.28924/2291-8639-21-2023-72.
Full textChatterjee, Ayan, and Andreas Prinz. "Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study." Sensors 22, no. 5 (2022): 1703. http://dx.doi.org/10.3390/s22051703.
Full textAlliance, Kingst TONY-MAYEKO. "Security solution in networks and attack simulations." Journal of Scientific and Engineering Research 11, no. 1 (2024): 203–8. https://doi.org/10.5281/zenodo.10620902.
Full textOlieh, Ofuchi Ngozi Rich. "A Smart Contract-based Blockchain Solution in IoT Networks." European Journal of Computer Science and Information Technology 12, no. 2 (2024): 75–92. http://dx.doi.org/10.37745/ejcsit.2013/vol12n27592.
Full textYue Ma, Yue Ma, Xin Li Yue Ma, and Jianbin Li Xin Li. "A Security Edge Computing Offloading Solution for 5G Cellular Network." 電腦學刊 32, no. 6 (2021): 015–23. http://dx.doi.org/10.53106/199115992021123206002.
Full textAhmad Kouchay, Shouket. "Cloud Security Vulnerabilities and Solution Model." Review of Computer Engineering Research 7, no. 1 (2020): 12–19. http://dx.doi.org/10.18488/journal.76.2020.71.12.19.
Full textWilson, Gordon. "Post SFOR: A European security solution?" RUSI Journal 143, no. 3 (1998): 19–23. http://dx.doi.org/10.1080/03071849808446262.
Full textGrant, Ian. "Healthcare security needs a social solution." Infosecurity Today 2, no. 2 (2005): 12–16. http://dx.doi.org/10.1016/s1742-6847(05)70179-8.
Full textKaneshige, Thomas. "Ex-IBMers offer total security solution." Computer Fraud & Security Bulletin 1995, no. 11 (1995): 9–10. http://dx.doi.org/10.1016/0142-0496(95)80073-5.
Full textTurner, Stephen J. "A concurrent solution to computer security." Artificial Intelligence Review 6, no. 2 (1992): 191–201. http://dx.doi.org/10.1007/bf00150233.
Full textGunpreet, Kaur, Kaur Ekleen, Jindal Harsh, and Gautam Neha. "Computer viruses: Security risks and solution." i-manager’s Journal on Software Engineering 17, no. 4 (2023): 29. http://dx.doi.org/10.26634/jse.17.4.19840.
Full textSingh, Devesh, and Ashwini Kumar Dautaniya. "Cloud Computing Security Challenges and Solution." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 3 (2019): 1185–90. http://dx.doi.org/10.61841/turcomat.v10i3.14399.
Full textRashidinia, Anoushirvan, S. Gavrilenko, M. Pochebut, and O. Sytnikova. "SOFTWARE SECURITY OVERVIEW." Системи управління, навігації та зв’язку. Збірник наукових праць 2, no. 54 (2019): 55–59. http://dx.doi.org/10.26906/sunz.2019.2.055.
Full textTang, Qiang. "Another Look at Privacy-Preserving Automated Contact Tracing." ACM Transactions on Spatial Algorithms and Systems 8, no. 2 (2022): 1–27. http://dx.doi.org/10.1145/3490490.
Full textIsnarti, Rika. "Indian Food Security; from Problem to Solution through Household Food Security." Frequency of International Relations (FETRIAN) 2, no. 1 (2020): 1–27. http://dx.doi.org/10.25077/fetrian.2.1.1-27.2020.
Full textJ G, Krithick, Nivedh T S, Siva Bharath S, Dr Radhamani A. S, and V. Ramanathan. "DATA SECURITY IN HEALTHCARE USING IOT." International Journal of Engineering Applied Sciences and Technology 7, no. 3 (2022): 79–82. http://dx.doi.org/10.33564/ijeast.2022.v07i03.011.
Full textYusupovich, Aminov Zarif, and Kholikulov Anvar Nematovich. "Problems Of Economic Security Of Enterprises And The Main Directions Of Their Solution." American Journal of Management and Economics Innovations 3, no. 05 (2021): 80–85. http://dx.doi.org/10.37547/tajmei/volume03issue05-13.
Full textP., Balaji, Athisha L., Kalpana Sri K., Kaniga K., and Keerthana R. "Deep Learning Based Detecting Security System." Advancement in Image Processing and Pattern Recognition 8, no. 2 (2025): 38–44. https://doi.org/10.5281/zenodo.15517554.
Full textCieśla, Rafał. "Security measures in combating document falsifiers." Nowa Kodyfikacja Prawa Karnego 44 (December 29, 2017): 41–53. http://dx.doi.org/10.19195/2084-5065.44.4.
Full textBatra, Isha, Hatem S. A. Hamatta, Arun Malik, et al. "LLSFIoT: Lightweight Logical Security Framework for Internet of Things." Wireless Communications and Mobile Computing 2021 (August 18, 2021): 1–9. http://dx.doi.org/10.1155/2021/8526206.
Full textAlexander. P. "The emerging roles of Automation in safety and security." International Journal on Integrated Education 2, no. 1 (2020): 62–65. http://dx.doi.org/10.31149/ijie.v2i1.523.
Full textNeerav Nishant, Et al. "The Proposed Framework for Cloud Computing System Security and Privacy Services." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1197–205. http://dx.doi.org/10.17762/ijritcc.v11i9.9034.
Full textIbraj, Bajram, Mirela Alushllari, and Ferit Hysa. "Environmental Security, Environmental Crime and National Security." International Journal of Religion 5, no. 11 (2024): 4890–900. http://dx.doi.org/10.61707/1ky4w568.
Full textMehraj, Tehseen, Mir Aman Sheheryar, Sajaad Ahmed Lone, and A. H. Mir. "A critical insight into the identity authentication systems on smartphones." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (2019): 982. http://dx.doi.org/10.11591/ijeecs.v13.i3.pp982-989.
Full textTehseen, Mehraj, Aman Sheheryar Mir, Ahmed Lone Sajaad, and H. Mir A. "A critical insight into the identity authentication systems on smartphones." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (2019): 982–89. https://doi.org/10.11591/ijeecs.v13.i3.pp982-989.
Full textAjah, Ifeyinwa Angela. "Evaluation of Enhanced Security Solutions in 802.11-Based Networks." International Journal of Network Security & Its Applications (IJNSA) 6, no. 4 (2014): 29–42. https://doi.org/10.5281/zenodo.7077353.
Full textLi, Zuyu. "A secret image sharing solution for autonomous vehicles." Applied and Computational Engineering 4, no. 1 (2023): 447–55. http://dx.doi.org/10.54254/2755-2721/4/2023303.
Full textPhanindra, Tatineni Leela. "ML Based Solution to Refine Captcha." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47613.
Full textRafeequ, Ahmed Mabrook, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, and Hemalata Vasudavan. "ACJS: “Anti-Crypto Jacking System” Security Development." International Journal of Data Science and Advanced Analytics 4 (June 17, 2023): 105–12. http://dx.doi.org/10.69511/ijdsaa.v4i0.150.
Full textSilva, Josival, Nelson Rosa, and Fernando Aires. "UP-Home: A Self-Adaptive Solution for Smart Home Security." JUCS - Journal of Universal Computer Science 30, no. 4 (2024): 502–30. http://dx.doi.org/10.3897/jucs.107050.
Full textSilva, Josival, Nelson Rosa, and Fernando Aires. "UP-Home: A Self-Adaptive Solution for Smart Home Security." JUCS - Journal of Universal Computer Science 30, no. (4) (2024): 502–30. https://doi.org/10.3897/jucs.107050.
Full textYang, Guang Hong, Qing Zhang, Ding Yong Tang, and Cong Min Huang. "A Solution about Application System How to Transfer Information Across Different Domains." Applied Mechanics and Materials 190-191 (July 2012): 898–901. http://dx.doi.org/10.4028/www.scientific.net/amm.190-191.898.
Full textXing, Qianqian, Baosheng Wang, and Xiaofeng Wang. "BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution." Symmetry 10, no. 9 (2018): 408. http://dx.doi.org/10.3390/sym10090408.
Full textYao, Wei Wei, Liang Gong, and Xia Xu. "Design and Implementation of Security Network Optimization." Advanced Materials Research 977 (June 2014): 507–10. http://dx.doi.org/10.4028/www.scientific.net/amr.977.507.
Full textZaher, Mahmoud A., and Nabil M. Eldakhly. "Securing the Internet of Things (IoT) with Blockchain: A Proof-of-Concept Implementation and Analysis." Journal of Cybersecurity and Information Management 10, no. 2 (2022): 26–34. http://dx.doi.org/10.54216/jcim.100203.
Full textWashima Tuleun. "Design of an asterisk-based VoIP system and the implementation of security solution across the VoIP network." World Journal of Advanced Research and Reviews 23, no. 1 (2024): 875–906. http://dx.doi.org/10.30574/wjarr.2024.23.1.2048.
Full textWashima, Tuleun. "Design of an asterisk-based VoIP system and the implementation of security solution across the VoIP network." World Journal of Advanced Research and Reviews 23, no. 1 (2024): 875–906. https://doi.org/10.5281/zenodo.14792201.
Full textMehmood, Abid, Abdul Nasir Khan, Iynkaran Natgunanathan, Arslan Shafique, Iftikhar Ahmed Khan, and Atta ur Rehman Khan. "Enhanced lightweight and compromised-resilient image encryption for resource constrained environments." PLOS ONE 20, no. 3 (2025): e0320046. https://doi.org/10.1371/journal.pone.0320046.
Full text