Journal articles on the topic 'Security solutions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security solutions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai, and Bhagyashri D. Dangewar. "Cloud Security: Problems and Solutions." International Journal of Scientific Research 3, no. 4 (2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.
Full textXu, Vincent. "Data Security Solutions." RESEARCH REVIEW International Journal of Multidisciplinary 05, no. 07 (2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.
Full textWebb, K. W. "Biometric Security Solutions." IEEE Security and Privacy Magazine 3, no. 5 (2005): 7. http://dx.doi.org/10.1109/msp.2005.117.
Full textGOHOREANU, Bogdan, Florin SANDU, and Dan-Nicolae ROBU. "SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 1 (2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.
Full textNanuru Yagamurthy, Deepak, and Rajesh Azmeera. "Security Challenges and Solutions in Cloud Computing." International Journal of Science and Research (IJSR) 7, no. 8 (2018): 1690–93. http://dx.doi.org/10.21275/sr24517174709.
Full textLi, Daoming, Qiang Chen, and Lun Wang. "Cloud Security: Challenges and Solutions." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 42–47. https://doi.org/10.5281/zenodo.12789566.
Full textAnupama.H.S, M. Anusha, Joshi Aparna, N. Apoorva, K.Cauvery N., and Lingaraju.G.M. "Security Solutions Using Brain Signals." International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (2018): 105–10. https://doi.org/10.11591/ijai.v7.i2.pp105-110.
Full textKenny, Peter. "Security and risk appraisal — EDIFACT security solutions." EDI in Finance 1991, no. 2 (1991): 4–7. https://doi.org/10.1016/0960-4634(91)90090-3.
Full textRanjana, Patel, and Arakh Rajendra. "Cyber Security Challenges & Their Solutions in India." International Journal of Trend in Research and Development 9, no. 1 (2022): 616–20. https://doi.org/10.5281/zenodo.6345325.
Full textGolchha, Prakhar, Rajesh Deshmukh, and Palak Lunia. "A Review on Network Security Threats and Solutions." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 21–24. https://doi.org/10.70729/ijser1567.
Full textSingh Gurjit Singh, Sahibdeep. "Microservices Security Challenges and Solutions in Cloud Environment." International Journal of Science and Research (IJSR) 13, no. 3 (2024): 201–5. http://dx.doi.org/10.21275/sr24303144734.
Full textNabeel, Zanoon, Albdour Nashat, S. A. Hamatta Hatem, and Al-Tarawneh RashaMoh'd. "SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND SECURITY SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (2015): 01–13. https://doi.org/10.5281/zenodo.8162659.
Full textWEBER, CYNTHIA, and MARK LACY. "Securing by design." Review of International Studies 37, no. 3 (2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.
Full textMittal, Himani. "Software security: Threats, solutions and challenges." Computer Software and Media Applications 6, no. 1 (2024): 3769. http://dx.doi.org/10.24294/csma.v6i1.3769.
Full textMadhavi, Dhingra. "BYOD SECURITY AND ITS POSSIBLE SOLUTIONS." INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH 5, no. 2 :SE (2018): 101–6. https://doi.org/10.5281/zenodo.1200272.
Full textGEANĂ, Ionuţ Cătălin. "Security Solutions for Informatics Systems." International Journal of Information Security and Cybercrime 1, no. 2 (2012): 17–24. http://dx.doi.org/10.19107/ijisc.2012.02.02.
Full textDhiman, Deepika. "WLAN Security Issues and Solutions." IOSR Journal of Computer Engineering 16, no. 1 (2014): 67–75. http://dx.doi.org/10.9790/0661-16146775.
Full textFausett, Crystal M., Megan P. Christovich, Jarod M. Parker, John M. Baker, and Joseph R. Keebler. "Telemedicine Security: Challenges and Solutions." Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, no. 1 (2021): 340–44. http://dx.doi.org/10.1177/2327857921101241.
Full textTrubilin, Alexander Ivanovich, Konstantin Eduardovich Tyupakov, and Alexander Alexandrovich Adamenko. "Food security: problems and solutions." Proceedings of the Kuban State Agrarian University, no. 90 (2021): 5–10. http://dx.doi.org/10.21515/1999-1703-90-5-10.
Full textYaacob, Mashkuri, Farhat Anwar, Rashidah Funke Olanrewaju, Burhan Ul Islam Khan, and Roohie Naaz Mir. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.10026783.
Full textKhan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Farhat Anwar, Roohie Naaz Mir, and Mashkuri Yaacob. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.105180.
Full textSmith, Robert E. "Proactive Solutions for Multinetwork Security." Information Systems Security 3, no. 2 (1994): 47–55. http://dx.doi.org/10.1080/10658989409342456.
Full textNorifusa, Masaya. "Internet security: difficulties and solutions." International Journal of Medical Informatics 49, no. 1 (1998): 69–74. http://dx.doi.org/10.1016/s1386-5056(98)00012-4.
Full textHancock, Bill. "Network Solutions Re-evaluates Security." Computers & Security 19, no. 5 (2000): 398–400. http://dx.doi.org/10.1016/s0167-4048(00)05018-5.
Full textReid, Linda. "Information Security: Risks and Solutions." Journal of Information Privacy and Security 2, no. 1 (2006): 1–2. http://dx.doi.org/10.1080/15536548.2006.10855782.
Full textH.S, Anupama, Anusha M, Aparna Joshi, Apoorva N, N. K. Cauvery, and Lingaraju G.M. "Security Solutions Using Brain Signals." IAES International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (2018): 105. http://dx.doi.org/10.11591/ijai.v7.i2.pp105-110.
Full textPotdar, Aarti, Pranav Patil, Raunak Bagla, and Rohitashwa Pandey. "Security Solutions for Cloud Computing." International Journal of Computer Applications 128, no. 16 (2015): 17–21. http://dx.doi.org/10.5120/ijca2015906747.
Full textPhithakkitnukoon, Santi, Ram Dantu, and Enkh-Amgalan Baatarjav. "VoIP Security — Attacks and Solutions." Information Security Journal: A Global Perspective 17, no. 3 (2008): 114–23. http://dx.doi.org/10.1080/19393550802308618.
Full textBarki, Amira, Abdelmadjid Bouabdallah, Said Gharout, and Jacques Traore. "M2M Security: Challenges and Solutions." IEEE Communications Surveys & Tutorials 18, no. 2 (2016): 1241–54. http://dx.doi.org/10.1109/comst.2016.2515516.
Full textPuri, Kunal Pradeep. "Cyber Security Challenges and Solutions." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 49–50. http://dx.doi.org/10.22214/ijraset.2024.57793.
Full textPuri, Kunal Pradeep. "Cyber Security Challenges and Solutions." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 49–50. http://dx.doi.org/10.22214/ijraset.2023.57793.
Full textZidanšek, Aleksander. "Creative Solutions for Human Security." Science, Art and Religion 3, no. 1--2 (2024): 62–65. http://dx.doi.org/10.5005/jp-journals-11005-0069.
Full textZamir, Islomovich Jumakulov. "FOOD SECURITY: PROBLEMS AND SOLUTIONS." INTERNATIONAL BULLETIN OF APPLIED SCIENCE AND TECHNOLOGY 3, no. 5 (2023): 178–82. https://doi.org/10.5281/zenodo.7898608.
Full textTiwari, Aniket Rajkumar. "Securing the Cloud: Overcoming Challenges and Implementing Solutions for Effective Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 5100–5111. http://dx.doi.org/10.22214/ijraset.2024.62772.
Full textManohar Ghag, Omkar. "Firmware Security in Connected Electric Vehicles: Challenges and Solutions." International Journal of Science and Research (IJSR) 12, no. 10 (2023): 2137–39. https://doi.org/10.21275/sr24302010944.
Full textZakarya, Muhammad, Muazzam Ali Khattak, Izaz Ur Rahman, and Ayaz Ali Khan. "Grid High Availability and Service Security Issues with Solutions." International Journal of Engineering and Technology 4, no. 6 (2012): 723–29. http://dx.doi.org/10.7763/ijet.2012.v4.472.
Full textSingh, Mandeep, Rajat Tyagi, Shivam Rathore, Pratyaksh Yadav, and Saksham Singh. "Decentralized Blockchain Solutions for Enhanced Document Security in Healthcare." International Journal of Research Publication and Reviews 5, no. 5 (2024): 12647–52. http://dx.doi.org/10.55248/gengpi.5.0524.1446.
Full textKim, JiHoon, Jong In Lim, and Huy Kang Kim. "Collaborative security response by interworking between multiple security solutions." Journal of the Korea Institute of Information Security and Cryptology 23, no. 1 (2013): 69–79. http://dx.doi.org/10.13089/jkiisc.2013.23.1.069.
Full textPiyushi, Gulati, Kumari Rana Kamini, Raghuvanshi Surabhi, and Anupama Pankaj Dr. "Android Operating System and its Security Issues." Journal of Android and IOS Applications and Testing 4, no. 1 (2019): 1–9. https://doi.org/10.5281/zenodo.2605874.
Full textMalipeddi, Anil Kumar, and Sreekanth Pasunuru. "Securing DevOps CI/CD pipelines with Agent-Based and Agentless Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01319.
Full textBS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.
Full textSonali Pandurang Doifode and Vishnukant Madhukar Biradar. "Cybersecurity in the Internet of Things (IoT): Challenges and Solutions." International Journal of Scientific Research in Modern Science and Technology 3, no. 7 (2024): 17–21. http://dx.doi.org/10.59828/ijsrmst.v3i7.222.
Full textPOPESCU, Eliza-Elena. "VoIP Security Threats." International Journal of Information Security and Cybercrime 13, no. 1 (2024): 66–70. http://dx.doi.org/10.19107/ijisc.2024.01.06.
Full textGaurav Malik and Prashasti. "Blockchain security- security challenges and solutions for decentralized systems and cryptocurrencies." International Journal of Science and Research Archive 9, no. 2 (2023): 1074–100. https://doi.org/10.30574/ijsra.2023.9.2.0515.
Full textFotiou and Polyzos. "Name-Based Security for Information-Centric Networking Architectures." Future Internet 11, no. 11 (2019): 232. http://dx.doi.org/10.3390/fi11110232.
Full textChen, Qiang, Daoming Li, and Lun Wang. "Network Security in the Internet of Things (IoT) Era." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 36–41. https://doi.org/10.5281/zenodo.12789562.
Full textBrown, Michael G., and Paolina Centonze. "Exploiting Flaws in Big Data Systems." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (2016): 6967–75. http://dx.doi.org/10.24297/ijct.v15i8.1498.
Full textN, Dr Chitra Kiran, Mr Suhas Suresh, and Mrs Suchira Suresh. "Vulnerability, threats, and attacks in E-Payments System: Security Solutions." International Journal of Psychosocial Rehabilitation 24, no. 04 (2020): 829–39. http://dx.doi.org/10.37200/ijpr/v24i4/pr201056.
Full textSingh, Dr Shashank. "Enhancing Safety and Security in Autonomous Cars: Challenges and Solutions." International Journal of Research Publication and Reviews 5, no. 2 (2024): 745–49. http://dx.doi.org/10.55248/gengpi.5.0224.0429.
Full textChhikara, Shashi, Iti Raghav, and Nitasha Hasteer. "Analyzing Security Solutions in Cloud Computing." International Journal of Computer Applications 68, no. 25 (2013): 17–21. http://dx.doi.org/10.5120/11750-7247.
Full text