Artykuły w czasopismach na temat „AI-Powered Security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „AI-Powered Security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Poongodi, R. K. "Zero Trust AI Authentication and Blockchain Powered Secure AI." International Journal for Research in Applied Science and Engineering Technology 13, no. 2 (2025): 52–56. https://doi.org/10.22214/ijraset.2025.66800.
Pełny tekst źródłaGudimetla, Sandeep Reddy, and Niranjan Reddy Kotha. "AI-POWERED THREAT DETECTION IN CLOUD ENVIRONMENTS." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 1 (2018): 638–42. http://dx.doi.org/10.61841/turcomat.v9i1.14730.
Pełny tekst źródłaSohaib uz Zaman, Erum Parveen, and Syed Hasnain Alam. "AI to Enhance the Transactional Security in Digital Banking." Journal of Management & Social Science 2, no. 2 (2025): 1–22. https://doi.org/10.63075/2apb3z22.
Pełny tekst źródłaDongare, Chinmay, Shubham Jha, Akshara Raul, and Maya Patil. "GUARDIANWATCH: AI-POWERED PUBLIC SAFETY SURVEILLANCE." ICTACT Journal on Data Science and Machine Learning 6, no. 1 (2024): 724–28. https://doi.org/10.21917/ijdsml.2024.0148.
Pełny tekst źródłaAkhtar, Zarif Bin, and Ahmed Tajbiul Rawol. "Enhancing Cybersecurity through AI-Powered Security Mechanisms." IT Journal Research and Development 9, no. 1 (2024): 50–67. http://dx.doi.org/10.25299/itjrd.2024.16852.
Pełny tekst źródłaAbubakar, Ruqayyah Abdullahi, Ahmed Abubakar Aliyu, Zahra B. Yashe, et al. "Enhanced AI-Powered Customer Experience Model." Science World Journal 20, no. 1 (2025): 17–21. https://doi.org/10.4314/swj.v20i1.3.
Pełny tekst źródłaGandham, Deepak. "AI-POWERED API SECURITY: REVOLUTIONIZING DIGITAL DEFENSE." INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND MANAGEMENT INFORMATION SYSTEMS 16, no. 1 (2025): 358–69. https://doi.org/10.34218/ijitmis_16_01_027.
Pełny tekst źródłakhan, Emad, MD Hafizullah, MD Saif, MD Ashraf Ansari, and Neha Kumari. "AI powered: Election voting system." International Journal of Research in Engineering and Innovation 09, no. 04 (2025): 199–204. https://doi.org/10.36037/ijrei.2025.9408.
Pełny tekst źródłaArun Kumar Soumya, Akash. "AI-Powered Strategies for Enhanced Email Security and Phishing Defense." International Journal of Science and Research (IJSR) 13, no. 12 (2024): 1335–37. https://doi.org/10.21275/sr241220090939.
Pełny tekst źródłaSwapna Reddy Anugu. "AI in Financial Services: Revolutionizing Fraud Detection and Risk Management." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 208–17. https://doi.org/10.32628/cseit25112354.
Pełny tekst źródłaArefin, Sabira. "Strengthening Healthcare Data Security with Ai-Powered Threat Detection." International Journal of Scientific Research and Management (IJSRM) 12, no. 10 (2024): 1477–83. http://dx.doi.org/10.18535/ijsrm/v12i10.ec02.
Pełny tekst źródłaSudheer Obbu. "Zero trust architecture for AI-powered cloud systems: Securing the future of automated workloads." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1315–39. https://doi.org/10.30574/wjarr.2025.26.1.1173.
Pełny tekst źródłaAlok, Anand, Kumar Anish, Babu NJ Akash, Kumar Deepak, and M. K. Varshitha. "AI Powered Code Review Assistant." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 12 (2024): 458–63. https://doi.org/10.5281/zenodo.14533537.
Pełny tekst źródłaSandeep, Phanireddy. "AI-Powered Zero Trust Architecture for Web App Security." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 11, no. 4 (2023): 1–6. https://doi.org/10.5281/zenodo.14945119.
Pełny tekst źródłaGaddam, Narayana. "AI-POWERED KEY DISTRIBUTION MECHANISM FOR IOT SECURITY." INTERNATIONAL JOURNAL OF INTERNET OF THINGS 1, no. 1 (2023): 16–28. https://doi.org/10.34218/ijiot_01_01_003.
Pełny tekst źródłaHusnain, Ali. "Artificial Intelligence and Deep Learning in Healthcare, Cyber security, and Food Systems: A Comprehensive Review of Applications, Challenges, and Future Directions." Global Journal of Emerging AI and Computing 1, no. 2 (2025): 95–126. https://doi.org/10.70445/gjeac.1.2.2025.95-126.
Pełny tekst źródłaMADHURI, BODIGARI, and SMT.A.KALPANA. "The AI-Powered Cybersecurity: Identifying A Threats in Digital Banking." Journal of Engineering Sciences 16, no. 04 (2025): 153–58. https://doi.org/10.36893/jes.2025.v16i04.025.
Pełny tekst źródłaMohsin, Zainab Rustum. "AI-Powered Encryption Revolutionizing Cybersecurity with Adaptive Cryptographic Algorithms." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 16, no. 1 (2025): 44–62. https://doi.org/10.61841/turcomat.v16i1.14976.
Pełny tekst źródłaKolawole Joseph Ajiboye. "Ensuring data security and compliance in AI-powered business applications." Global Journal of Engineering and Technology Advances 15, no. 1 (2023): 125–42. https://doi.org/10.30574/gjeta.2023.15.1.0067.
Pełny tekst źródłaKotte, Girish. "AI-Powered Automated Incident Response in Healthcare Cybersecurity Operations." International Journal of All Research Education & Scientific Methods 13, no. 05 (2025): 3369–75. https://doi.org/10.56025/ijaresm.2025.1210243369.
Pełny tekst źródłaSutanto, Yulius. "Cybersecurity Challenges and AI-Powered Mitigation Strategies in CCTV Surveillance Systems." International Journal of Information System and Innovative Technology 3, no. 2 (2024): 17–24. https://doi.org/10.63322/fsk65573.
Pełny tekst źródłaKhan, Prottoy, Md Zahirul Islam, and Sazib Hossain. "AI-Powered Cybersecurity: Revolutionizing Business Threat Detection and Response." American Journal of Smart Technology and Solutions 4, no. 1 (2025): 37–48. https://doi.org/10.54536/ajsts.v4i1.4488.
Pełny tekst źródłaUpasana, Ranjan Singh Ashish, Raj Ritik, Raj Ritik, and Singh Satyarth. "Next Gen: AI Powered ERP." Recent Innovations in Wireless Network Security 7, no. 2 (2025): 26–35. https://doi.org/10.5281/zenodo.15300471.
Pełny tekst źródłaKulkarni,, Srushti. "AI Powered Contactless Fingerprint Recognition." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35013.
Pełny tekst źródłaC, Vivek. "AI-Powered Patient Case Similarity." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40833.
Pełny tekst źródłaChadrack, Irabaruta, and Dr Nyesheja Muhire Enan. "AI Powered Network Traffic Detection." Journal of Information and Technology 5, no. 2 (2025): 53–65. https://doi.org/10.70619/vol5iss2pp53-65.
Pełny tekst źródłaShravan Kumar Amjala. "AI-Powered Cloud Automation: A Scholarly Perspective." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 2664–72. https://doi.org/10.30574/wjaets.2025.15.2.0845.
Pełny tekst źródłaKumar, Manish. "AIRA : AI-Powered Code Review & Bug Detection System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42592.
Pełny tekst źródłaSiva Krishna Jampani. "Revolutionizing Penetration Testing: AI-Powered Automation for Enterprise Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1562–69. https://doi.org/10.32628/cseit241061201.
Pełny tekst źródłaIvan, Mishchenko. "Biometric Authentication in Android: Enhancing Security with AI-Powered Solutions." Asian Journal of Research in Computer Science 18, no. 4 (2025): 416–26. https://doi.org/10.9734/ajrcos/2025/v18i4629.
Pełny tekst źródłaJyoti Bolannavar, Divyashree R, and Dr. Sumati Ramakrishna Gowda. "Intelligent Safety: Revolutionizing Home Security with AI and IoT." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 2319–33. https://doi.org/10.32628/cseit2410481.
Pełny tekst źródłaKhan, Ali Raza A., Muhammad Ismaeel Khan, Aftab Arif, Nadeem Anjum, and Haroon Arif. "Intelligent Defense: Redefining OS Security with AI." International Journal of Innovative Research in Computer Science and Technology 13, no. 1 (2025): 85–90. https://doi.org/10.55524/ijircst.2025.13.1.13.
Pełny tekst źródłaAsst., Prof. Shraddhha Kulkarni. "AI -Powered Digital Marketing and its Vulnerabilities: A Cybersecurity Analysis." International Journal of Advance and Applied Research S6, no. 23 (2025): 188–90. https://doi.org/10.5281/zenodo.15195020.
Pełny tekst źródłaGifia S, Carolin, and Indhumathi S. "Gen AI-Powered Signature Identifier and Image Manipulation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44457.
Pełny tekst źródłaNze, Stella Udoka. "AI-Powered Chatbots." Global Journal of Human Resource Management 12, no. 6 (2024): 34–45. http://dx.doi.org/10.37745/gjhrm.2013/vol12n63445.
Pełny tekst źródłaHarutyunyan, Gayane, Gyulnara Danielyan, and Khachatur Ghazeyan. "The effectiveness of ai-powered weapons from the standpoint of strategic decision-making (Case of Armenia)." International Journal of Innovative Research and Scientific Studies 8, no. 2 (2025): 2222–31. https://doi.org/10.53894/ijirss.v8i2.5650.
Pełny tekst źródłaSibin, Thomas. "AI-Powered Home Safety: The Next Generation of Security Systems." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 7, no. 2 (2019): 1–5. https://doi.org/10.5281/zenodo.14951146.
Pełny tekst źródłaKrishnan, Mahendhiran. "API C4E Augmentation: AI-Powered Agent(AIPA) Framework." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 988–95. http://dx.doi.org/10.22214/ijraset.2024.65267.
Pełny tekst źródłaSunday Adeola Oladosu, Adebimpe Bolatito Ige, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Olukunle Oladipupo Amoo, and Adeoye Idowu Afolabi. "Next-generation network security: conceptualizing a Unified, AI-Powered Security Architecture for Cloud-Native and On-Premise Environments." International Journal of Science and Technology Research Archive 3, no. 2 (2022): 270–80. https://doi.org/10.53771/ijstra.2022.3.2.0143.
Pełny tekst źródłaThomas Aerathu Mathew. "AI-powered threat detection: Strengthening data platform security with LLMs." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 387–93. https://doi.org/10.30574/wjarr.2025.26.2.1604.
Pełny tekst źródłaB, Vivekanandam. "Surveillance 5.0: Next-Gen Security Powered by Quantum AI Optimization." June 2024 3, no. 1 (2024): 113–24. http://dx.doi.org/10.36548/rrrj.2024.1.008.
Pełny tekst źródłaChetan Prakash Ratnawat. "AI-Powered Financial Reporting Chatbots: Transforming Insurance Industry Operations." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1779–86. https://doi.org/10.32628/cseit241061222.
Pełny tekst źródłaUsta, Uygar, Sumer Erkan Kaya, and Savas Barış. "Using AI-Powered Vehicle Identification System in Gas Stations (AI-VIS)." Orclever Proceedings of Research and Development 3, no. 1 (2023): 255–63. http://dx.doi.org/10.56038/oprd.v3i1.330.
Pełny tekst źródłaReddy Gopireddy, Ravindar. "AI-Powered Security in Cloud Environments: Enhancing Data Protection and Threat Detection." International Journal of Science and Research (IJSR) 10, no. 11 (2021): 1568–72. http://dx.doi.org/10.21275/sr24731135001.
Pełny tekst źródłaGarg, Chanchal. "AI-Powered Talent Acquisition Platform." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47414.
Pełny tekst źródłaBiju, Ashwin, Abijith K, and Mrs Sajitha A S. "Secure Flow AI-Powered Redirection Blocker for Safe Browsing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44339.
Pełny tekst źródłaAyush, Kumar Jha Shahi Raza Khan. "AI-Powered Context-Aware Blockchain Explorer." Career Point International Journal of Research(CPIJR) 1, no. 4 (2025): 53–72. https://doi.org/10.5281/zenodo.15137907.
Pełny tekst źródłaOlubusola Odeyemi, Chinwe Chinazo Okoye, Onyeka Chrisanctus Ofodile, Omotayo Bukola Adeoye, Wilhelmina Afua Addy, and Adeola Olusola Ajayi-Nifise. "INTEGRATING AI WITH BLOCKCHAIN FOR ENHANCED FINANCIAL SERVICES SECURITY." Finance & Accounting Research Journal 6, no. 3 (2024): 271–87. http://dx.doi.org/10.51594/farj.v6i3.855.
Pełny tekst źródłaVarma, Jahith Sai Krishna. "EagleAI: AI Powered Real Time Restricted Area Surveillance." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 3499–506. https://doi.org/10.22214/ijraset.2025.70612.
Pełny tekst źródłaAyomide, Oluwaromika Olukoya, Asiimire Shallon, and Refus Adigun Damilare. "Evaluating the Effectiveness of AI-Powered Cloud Based Threat Intelligence in Mitigating Phishing Attacks." International Journal of Innovative Science and Research Technology (IJISRT) 10, no. 1 (2025): 855–63. https://doi.org/10.5281/zenodo.14737744.
Pełny tekst źródła