To see the other types of publications on this topic, follow the link: Security solutions.

Journal articles on the topic 'Security solutions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security solutions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai, and Bhagyashri D. Dangewar. "Cloud Security: Problems and Solutions." International Journal of Scientific Research 3, no. 4 (2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xu, Vincent. "Data Security Solutions." RESEARCH REVIEW International Journal of Multidisciplinary 05, no. 07 (2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Webb, K. W. "Biometric Security Solutions." IEEE Security and Privacy Magazine 3, no. 5 (2005): 7. http://dx.doi.org/10.1109/msp.2005.117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

GOHOREANU, Bogdan, Florin SANDU, and Dan-Nicolae ROBU. "SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 1 (2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nanuru Yagamurthy, Deepak, and Rajesh Azmeera. "Security Challenges and Solutions in Cloud Computing." International Journal of Science and Research (IJSR) 7, no. 8 (2018): 1690–93. http://dx.doi.org/10.21275/sr24517174709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Daoming, Qiang Chen, and Lun Wang. "Cloud Security: Challenges and Solutions." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 42–47. https://doi.org/10.5281/zenodo.12789566.

Full text
Abstract:
As cloud computing continues to grow and become integral to business operations, securing cloud environments has emerged as a critical concern. This paper explores the multifaceted challenges of cloud security and proposes solutions to mitigate these risks. We discuss the inherent vulnerabilities of cloud infrastructure, the complexities of data protection, and the difficulties in maintaining compliance and governance. Specifically, we address issues such as data breaches, insider threats, and the lack of visibility and control in cloud environments. Through comprehensive analysis and experime
APA, Harvard, Vancouver, ISO, and other styles
7

Anupama.H.S, M. Anusha, Joshi Aparna, N. Apoorva, K.Cauvery N., and Lingaraju.G.M. "Security Solutions Using Brain Signals." International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (2018): 105–10. https://doi.org/10.11591/ijai.v7.i2.pp105-110.

Full text
Abstract:
A brain computer interface is a direct neural interface or a brain–machine interface. It provides a communication path between human brain and the computer system. It aims to convey people's intentions to the outside world directly from their thoughts. This paper focuses on current model which uses brain signals for the authentication of users. The Electro-encephalogram (EEG) signals are recorded from the neuroheadset when a user is shown a key image (signature image). These signals are further processed and are interpreted to obtain the thought pattern of the user to match them to t
APA, Harvard, Vancouver, ISO, and other styles
8

Kenny, Peter. "Security and risk appraisal — EDIFACT security solutions." EDI in Finance 1991, no. 2 (1991): 4–7. https://doi.org/10.1016/0960-4634(91)90090-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ranjana, Patel, and Arakh Rajendra. "Cyber Security Challenges & Their Solutions in India." International Journal of Trend in Research and Development 9, no. 1 (2022): 616–20. https://doi.org/10.5281/zenodo.6345325.

Full text
Abstract:
<strong><em>Abstract: </em></strong>Because the general population becomes increasingly progressively more and a lot of refined in their understanding and use of computers and because the technologies related to computing become more powerful, there&#39;s a robust chance that cybercrimes can become a lot of common. India is rated collectively of the countries with the very best levels of e-crime activities. Despite years of enhancements to the usability of interactive, end user facing security systems aboard a fast and sustained growth of law breaking, several of those security systems stay un
APA, Harvard, Vancouver, ISO, and other styles
10

Golchha, Prakhar, Rajesh Deshmukh, and Palak Lunia. "A Review on Network Security Threats and Solutions." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 21–24. https://doi.org/10.70729/ijser1567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Singh Gurjit Singh, Sahibdeep. "Microservices Security Challenges and Solutions in Cloud Environment." International Journal of Science and Research (IJSR) 13, no. 3 (2024): 201–5. http://dx.doi.org/10.21275/sr24303144734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Nabeel, Zanoon, Albdour Nashat, S. A. Hamatta Hatem, and Al-Tarawneh RashaMoh'd. "SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND SECURITY SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (2015): 01–13. https://doi.org/10.5281/zenodo.8162659.

Full text
Abstract:
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute challenges and weaknesses before the security progress in MANET network. It causes weakness in security, which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between them will be concluded and architectural security solutions in MANET will beproposed. &nbsp;
APA, Harvard, Vancouver, ISO, and other styles
13

WEBER, CYNTHIA, and MARK LACY. "Securing by design." Review of International Studies 37, no. 3 (2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.

Full text
Abstract:
AbstractThis article investigates how modern neo-liberal states are ‘securing by design’ – harnessing design to new technologies in order to produce security, safety, and protection. We take a critical view toward ‘securing by design’ and the policy agendas it produces of ‘designing out insecurity’ and ‘designing in protection’ because securing by design strategies rely upon inadequate conceptualisations of security, technology, and design and inadequate understandings of their relationships to produce inadequate ‘security solutions’ to ready-made ‘security problems’. This critique leads us to
APA, Harvard, Vancouver, ISO, and other styles
14

Mittal, Himani. "Software security: Threats, solutions and challenges." Computer Software and Media Applications 6, no. 1 (2024): 3769. http://dx.doi.org/10.24294/csma.v6i1.3769.

Full text
Abstract:
Software security is of great concern as computers have entered almost all walks of life and people at large have become dependent on technology for not only entertainment and communication but for performing tasks involving money and a lot of stake. Software security not only involves securing the software but also user data and communication media. This paper states the several types of security threats that exist since the time networking has evolved, namely, malware, Trojans, viruses, denial of service attacks, and many more. This paper reviews several measures to address these threats. It
APA, Harvard, Vancouver, ISO, and other styles
15

Madhavi, Dhingra. "BYOD SECURITY AND ITS POSSIBLE SOLUTIONS." INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH 5, no. 2 :SE (2018): 101–6. https://doi.org/10.5281/zenodo.1200272.

Full text
Abstract:
BYOD (Bring your own Device) is a piece of its bigger pattern consumerization, in which purchaser programming and equipment are being brought into the undertaking. BYOT (bring your own particular innovation) alludes to the utilization of customer gadgets and applications in the workplace. An powerful BYOD procedure can prompt various advantages for organizations, including enhanced representative employment fulfillment, expanded occupation proficiency and adaptability. BYOD can likewise give cost reserve funds from starting gadget buy to on-going use and IT helpdesk bolster as representatives
APA, Harvard, Vancouver, ISO, and other styles
16

GEANĂ, Ionuţ Cătălin. "Security Solutions for Informatics Systems." International Journal of Information Security and Cybercrime 1, no. 2 (2012): 17–24. http://dx.doi.org/10.19107/ijisc.2012.02.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Dhiman, Deepika. "WLAN Security Issues and Solutions." IOSR Journal of Computer Engineering 16, no. 1 (2014): 67–75. http://dx.doi.org/10.9790/0661-16146775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Fausett, Crystal M., Megan P. Christovich, Jarod M. Parker, John M. Baker, and Joseph R. Keebler. "Telemedicine Security: Challenges and Solutions." Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, no. 1 (2021): 340–44. http://dx.doi.org/10.1177/2327857921101241.

Full text
Abstract:
The proliferation of telemedicine spurred by the COVID-19 pandemic has come with a variety of human factors challenges. Such challenges include mitigating potential risks associated with the quick transition to virtual care. We identify challenges and solutions related to telemedicine security, and analyze our results using Schlarman’s People, Policy, Technology framework (2001). Our systematic literature review synthesizes gray literature (white papers, news articles, and blog posts) in addition to formal (published) literature. This methodology closes the gap between academic research and pr
APA, Harvard, Vancouver, ISO, and other styles
19

Trubilin, Alexander Ivanovich, Konstantin Eduardovich Tyupakov, and Alexander Alexandrovich Adamenko. "Food security: problems and solutions." Proceedings of the Kuban State Agrarian University, no. 90 (2021): 5–10. http://dx.doi.org/10.21515/1999-1703-90-5-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Yaacob, Mashkuri, Farhat Anwar, Rashidah Funke Olanrewaju, Burhan Ul Islam Khan, and Roohie Naaz Mir. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.10026783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Khan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Farhat Anwar, Roohie Naaz Mir, and Mashkuri Yaacob. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.105180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Smith, Robert E. "Proactive Solutions for Multinetwork Security." Information Systems Security 3, no. 2 (1994): 47–55. http://dx.doi.org/10.1080/10658989409342456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Norifusa, Masaya. "Internet security: difficulties and solutions." International Journal of Medical Informatics 49, no. 1 (1998): 69–74. http://dx.doi.org/10.1016/s1386-5056(98)00012-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hancock, Bill. "Network Solutions Re-evaluates Security." Computers & Security 19, no. 5 (2000): 398–400. http://dx.doi.org/10.1016/s0167-4048(00)05018-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Reid, Linda. "Information Security: Risks and Solutions." Journal of Information Privacy and Security 2, no. 1 (2006): 1–2. http://dx.doi.org/10.1080/15536548.2006.10855782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

H.S, Anupama, Anusha M, Aparna Joshi, Apoorva N, N. K. Cauvery, and Lingaraju G.M. "Security Solutions Using Brain Signals." IAES International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (2018): 105. http://dx.doi.org/10.11591/ijai.v7.i2.pp105-110.

Full text
Abstract:
A Brain Computer Interface is a direct neural interface or a brain–machine interface. It provides a communication path between human brain and the computer system. It aims to convey people's intentions to the outside world directly from their thoughts. This paper focuses on current model which uses brain signals for the authentication of users. The Electro- Encephalogram (EEG) signals are recorded from the neuroheadset when a user is shown a key image (signature image). These signals are further processed and are interpreted to obtain the thought pattern of the user to match them to the stored
APA, Harvard, Vancouver, ISO, and other styles
27

Potdar, Aarti, Pranav Patil, Raunak Bagla, and Rohitashwa Pandey. "Security Solutions for Cloud Computing." International Journal of Computer Applications 128, no. 16 (2015): 17–21. http://dx.doi.org/10.5120/ijca2015906747.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Phithakkitnukoon, Santi, Ram Dantu, and Enkh-Amgalan Baatarjav. "VoIP Security — Attacks and Solutions." Information Security Journal: A Global Perspective 17, no. 3 (2008): 114–23. http://dx.doi.org/10.1080/19393550802308618.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Barki, Amira, Abdelmadjid Bouabdallah, Said Gharout, and Jacques Traore. "M2M Security: Challenges and Solutions." IEEE Communications Surveys & Tutorials 18, no. 2 (2016): 1241–54. http://dx.doi.org/10.1109/comst.2016.2515516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Puri, Kunal Pradeep. "Cyber Security Challenges and Solutions." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 49–50. http://dx.doi.org/10.22214/ijraset.2024.57793.

Full text
Abstract:
Abstract: This article discusses the challenges and opportunities in the field of Cyber Physical Systems (CPSs). It highlights the integration of the physical and digital realms in CPSs and the increasing importance of security in this context. The article provides an overview of the challenges faced by CPSs and suggests potential solutions to address them. It emphasizes the need for preventive measures, coordination, lightweight solutions, and early-stage verification to enhance the security and effectiveness of CPSs.
APA, Harvard, Vancouver, ISO, and other styles
31

Puri, Kunal Pradeep. "Cyber Security Challenges and Solutions." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 49–50. http://dx.doi.org/10.22214/ijraset.2023.57793.

Full text
Abstract:
Abstract: This article discusses the challenges and opportunities in the field of Cyber Physical Systems (CPSs). It highlights the integration of the physical and digital realms in CPSs and the increasing importance of security in this context. The article provides an overview of the challenges faced by CPSs and suggests potential solutions to address them. It emphasizes the need for preventive measures, coordination, lightweight solutions, and early-stage verification to enhance the security and effectiveness of CPSs.
APA, Harvard, Vancouver, ISO, and other styles
32

Zidanšek, Aleksander. "Creative Solutions for Human Security." Science, Art and Religion 3, no. 1--2 (2024): 62–65. http://dx.doi.org/10.5005/jp-journals-11005-0069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Zamir, Islomovich Jumakulov. "FOOD SECURITY: PROBLEMS AND SOLUTIONS." INTERNATIONAL BULLETIN OF APPLIED SCIENCE AND TECHNOLOGY 3, no. 5 (2023): 178–82. https://doi.org/10.5281/zenodo.7898608.

Full text
Abstract:
Today, environmental and other problems such as drought, desertification and water scarcity threaten food security throughout the planet. The article focuses on the essence of the concept of food safety and the main directions of state policy to ensure it.
APA, Harvard, Vancouver, ISO, and other styles
34

Tiwari, Aniket Rajkumar. "Securing the Cloud: Overcoming Challenges and Implementing Solutions for Effective Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 5100–5111. http://dx.doi.org/10.22214/ijraset.2024.62772.

Full text
Abstract:
Abstract: “This research paper provides a sufficient overview of security challenges in cloud computing and corresponding solutions. Challenges include data breaches, compliance issues, and insider threats, while solutions encompass robust access controls, encryption, and API security measures. By implementing these solutions, organizations can mitigate risks and securely harness the advantages of cloud computing.”
APA, Harvard, Vancouver, ISO, and other styles
35

Manohar Ghag, Omkar. "Firmware Security in Connected Electric Vehicles: Challenges and Solutions." International Journal of Science and Research (IJSR) 12, no. 10 (2023): 2137–39. https://doi.org/10.21275/sr24302010944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Zakarya, Muhammad, Muazzam Ali Khattak, Izaz Ur Rahman, and Ayaz Ali Khan. "Grid High Availability and Service Security Issues with Solutions." International Journal of Engineering and Technology 4, no. 6 (2012): 723–29. http://dx.doi.org/10.7763/ijet.2012.v4.472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Singh, Mandeep, Rajat Tyagi, Shivam Rathore, Pratyaksh Yadav, and Saksham Singh. "Decentralized Blockchain Solutions for Enhanced Document Security in Healthcare." International Journal of Research Publication and Reviews 5, no. 5 (2024): 12647–52. http://dx.doi.org/10.55248/gengpi.5.0524.1446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kim, JiHoon, Jong In Lim, and Huy Kang Kim. "Collaborative security response by interworking between multiple security solutions." Journal of the Korea Institute of Information Security and Cryptology 23, no. 1 (2013): 69–79. http://dx.doi.org/10.13089/jkiisc.2013.23.1.069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Piyushi, Gulati, Kumari Rana Kamini, Raghuvanshi Surabhi, and Anupama Pankaj Dr. "Android Operating System and its Security Issues." Journal of Android and IOS Applications and Testing 4, no. 1 (2019): 1–9. https://doi.org/10.5281/zenodo.2605874.

Full text
Abstract:
<em>Android is a Mobile and Tablet Operating System </em><em>premised on </em><em>the Linux kernel owned by Google. The ultimate innovative feature of Android Operating System is open source due to this anyone can publish their applications freely on the Android market. This openness introduces the broad number of developers which utilize this platform, but it comes with the hazard that user may download malicious software which is written by network hackers and harm to its privacy. This requires the study of the Security Mechanisms for Android and to make it easy and user-friendly to make the
APA, Harvard, Vancouver, ISO, and other styles
40

Malipeddi, Anil Kumar, and Sreekanth Pasunuru. "Securing DevOps CI/CD pipelines with Agent-Based and Agentless Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01319.

Full text
Abstract:
As organizations increasingly adopt containerized applications and Continuous Integration/Continuous Deployment (CI/CD) pipelines, managing and securing secrets becomes critical to maintaining robust security. CI/CD pipelines are critical to modern software development, enabling rapid delivery of software updates. However, these pipelines often handle sensitive secrets such as credentials, API keys, and tokens, making them an attractive target for adversaries. This paper explores two distinct approaches to secrets management in DevOps environments: agent- based solutions, such as CyberArk Cred
APA, Harvard, Vancouver, ISO, and other styles
41

BS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.

Full text
Abstract:
The process of defending computer networks from cyber attacks or unintended, unauthorized access is known as cyber security. Organizations, businesses, and governments need cyber security solutions because cyber criminals pose a threat to everyone. Artificial intelligence promises to be a great solution for this. Security experts are better able to defend vulnerable networks and data from cyber attackers by combining the strengths of artificial intelligence and cyber security. This paper provides an introduction to the use of artificial intelligence in cyber security. AI-driven cyber security
APA, Harvard, Vancouver, ISO, and other styles
42

Sonali Pandurang Doifode and Vishnukant Madhukar Biradar. "Cybersecurity in the Internet of Things (IoT): Challenges and Solutions." International Journal of Scientific Research in Modern Science and Technology 3, no. 7 (2024): 17–21. http://dx.doi.org/10.59828/ijsrmst.v3i7.222.

Full text
Abstract:
The IOT is changing the way we communicate and interact across businesses, enabling unprecedented productivity, efficiency, and data storage simulation. Development of IOT has brought many benefits but also significant challenges to network security. This article explores the key challenges in securing IoT environments, including device diversity, limited budgets, lack of security protocols, and vulnerability of transmitted information. Evaluate solutions such as the use of lightweight encryption algorithms, zerotrust architectures, and AI driven security systems to assess their potential effe
APA, Harvard, Vancouver, ISO, and other styles
43

POPESCU, Eliza-Elena. "VoIP Security Threats." International Journal of Information Security and Cybercrime 13, no. 1 (2024): 66–70. http://dx.doi.org/10.19107/ijisc.2024.01.06.

Full text
Abstract:
Nowadays, communication is based on a wide variety of solutions, especially using the real-time ones. People use a lot of online tools that offer them audio-video solutions, and the most important thing is that anyone has access to them, and there are easy to use. VoIP (Voice over IP) is one of the most used solutions today, with which everyone can make calls over the internet. Like any other service that is exposed to the internet, it presents risks for the data violation and administrators or any people that use this service, needs to secure the system.
APA, Harvard, Vancouver, ISO, and other styles
44

Gaurav Malik and Prashasti. "Blockchain security- security challenges and solutions for decentralized systems and cryptocurrencies." International Journal of Science and Research Archive 9, no. 2 (2023): 1074–100. https://doi.org/10.30574/ijsra.2023.9.2.0515.

Full text
Abstract:
Blockchain technology is a chain of blocks formed using cryptography on multiple computers. It keeps a list of distributed transactions and ensures it is transparent, immutable, and hard to manipulate. Blockchain’s inherent security features would strengthen its build, including cryptographic hashing, consensus algorithms, and immutability. However, it is also highly exposed and vulnerable to several threats. In decentralized systems and cryptocurrencies, blockchain security is a crucial point of security to protect from attacks on systems, data breaches, and financial loss. Challenges in the
APA, Harvard, Vancouver, ISO, and other styles
45

Fotiou and Polyzos. "Name-Based Security for Information-Centric Networking Architectures." Future Internet 11, no. 11 (2019): 232. http://dx.doi.org/10.3390/fi11110232.

Full text
Abstract:
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice. For this paper, we designed and evaluated name-based security solutions that satisfy security requirements that are particular to ICN architectures. In order to achieve our goal, we leverage identity-based encryption, identity-based proxy re-encryption, and the emerging paradigm of decentralized identifiers. Our solutions support outsourcing content storage, content integrity protection and content authentication, and pr
APA, Harvard, Vancouver, ISO, and other styles
46

Chen, Qiang, Daoming Li, and Lun Wang. "Network Security in the Internet of Things (IoT) Era." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 36–41. https://doi.org/10.5281/zenodo.12789562.

Full text
Abstract:
The Internet of Things (IoT) represents a significant transformation in how devices communicate and interact, offering unprecedented convenience and efficiency. However, this interconnected environment also introduces substantial security challenges. Traditional network security measures are often inadequate for IoT environments due to their unique characteristics, such as resource constraints and diverse device types. This paper explores the current state of network security in the IoT era, examines the specific challenges posed by IoT environments, and presents innovative solutions and best
APA, Harvard, Vancouver, ISO, and other styles
47

Brown, Michael G., and Paolina Centonze. "Exploiting Flaws in Big Data Systems." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (2016): 6967–75. http://dx.doi.org/10.24297/ijct.v15i8.1498.

Full text
Abstract:
In this journal we discuss the relevant security threats, vulnerabilities and prominent techniques to securing data lake. Over the last few years, Big Data solutions to data processing have made remarkable strides in the how we interpret data. Because of its ubiquitous nature and ability to handle various data types, it has become a valuable tool and asset to many other fields including bioinformatics solutions, marketing solutions, and social media. Ethical infractions also play a role in data processing and because of this, it is critical that comprehensive security solutions are determined
APA, Harvard, Vancouver, ISO, and other styles
48

N, Dr Chitra Kiran, Mr Suhas Suresh, and Mrs Suchira Suresh. "Vulnerability, threats, and attacks in E-Payments System: Security Solutions." International Journal of Psychosocial Rehabilitation 24, no. 04 (2020): 829–39. http://dx.doi.org/10.37200/ijpr/v24i4/pr201056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Singh, Dr Shashank. "Enhancing Safety and Security in Autonomous Cars: Challenges and Solutions." International Journal of Research Publication and Reviews 5, no. 2 (2024): 745–49. http://dx.doi.org/10.55248/gengpi.5.0224.0429.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Chhikara, Shashi, Iti Raghav, and Nitasha Hasteer. "Analyzing Security Solutions in Cloud Computing." International Journal of Computer Applications 68, no. 25 (2013): 17–21. http://dx.doi.org/10.5120/11750-7247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!