Artykuły w czasopismach na temat „Security and Privacy issues and its approaches”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Security and Privacy issues and its approaches”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Kanika*1, Alka Agrawal2 &. R.A. Khan3. "AN OVERVIEW OF PRIVACY PRESERVATION IN BIG DATA." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 61–71. https://doi.org/10.5281/zenodo.822970.
Pełny tekst źródłaBaig, Ahmed Fraz, and Sigurd Eskeland. "Security, Privacy, and Usability in Continuous Authentication: A Survey." Sensors 21, no. 17 (2021): 5967. http://dx.doi.org/10.3390/s21175967.
Pełny tekst źródłaRamakrishnan, Mr R. "Privacy Challenges and Solutions in Big Data Analytics: A Comprehensive Review." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 2435–40. http://dx.doi.org/10.22214/ijraset.2024.62103.
Pełny tekst źródłaMylavathi, G. A., N. M. Mallika, and K. Mohanraj. "Survey of Security and Privacy Issues in Big Data Analytics." Asian Journal of Computer Science and Technology 8, S1 (2019): 33–35. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1972.
Pełny tekst źródłaAbdulsalam, Yunusa Simpa, and Mustapha Hedabou. "Security and Privacy in Cloud Computing: Technical Review." Future Internet 14, no. 1 (2021): 11. http://dx.doi.org/10.3390/fi14010011.
Pełny tekst źródłaTiwari,, Arun. "Security and Privacy Analysis in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31055.
Pełny tekst źródłaMassis, Bruce. "The Internet of Things and its impact on the library." New Library World 117, no. 3/4 (2016): 289–92. http://dx.doi.org/10.1108/nlw-12-2015-0093.
Pełny tekst źródłaSivan, Remya, and Zuriati Ahmad Zukarnain. "Security and Privacy in Cloud-Based E-Health System." Symmetry 13, no. 5 (2021): 742. http://dx.doi.org/10.3390/sym13050742.
Pełny tekst źródłaTareq, Imad, Bassant M. Elbagoury, Salsabil El-Regaily, and El-Sayed M. El-Horbaty. "A survey about deep learning and federated Learning in cyberse-curity." Periodicals of Engineering and Natural Sciences (PEN) 12, no. 1 (2024): 75–100. https://doi.org/10.21533/pen.v12.i1.23.
Pełny tekst źródłaReddy, Manjunath, Nur Mohammad Ali Chisty, and Anusha Bodepudi. "A Review of Cybersecurity and Biometric Authentication in Cloud Network." Engineering International 10, no. 1 (2022): 9–18. http://dx.doi.org/10.18034/ei.v10i1.652.
Pełny tekst źródłaMisbah Kousar. "Design of a Decentralized Authentication and Off-Chain Data Management Protocol for VANETs Using Blockchain." Communications on Applied Nonlinear Analysis 32, no. 2 (2024): 718–31. http://dx.doi.org/10.52783/cana.v32.1917.
Pełny tekst źródłaMumtaz, Rusul, Venus Samawi, Aysh Alhroob, Wael Alzyadat, and Ikhlas Almukahel. "PDIS: A Service Layer for Privacy and Detecting Intrusions in Cloud Computing." International Journal of Advances in Soft Computing and its Applications 14, no. 2 (2022): 15–35. http://dx.doi.org/10.15849/ijasca.220720.02.
Pełny tekst źródłaEl-Attar, Noha E., Doaa S. El-Morshedy, and Wael A. Awad. "A New Hybrid Automated Security Framework to Cloud Storage System." Cryptography 5, no. 4 (2021): 37. http://dx.doi.org/10.3390/cryptography5040037.
Pełny tekst źródłaAdnan Darwish, Marwan, Eiad Yafi, Abdullah H. Almasri, and Megat F Zuhairi. "Privacy and Security of Cloud Computing: A Comprehensive Review of Techniques and Challenges." International Journal of Engineering & Technology 7, no. 4.29 (2018): 240–47. http://dx.doi.org/10.14419/ijet.v7i4.29.26263.
Pełny tekst źródłaV., Maheshwari, and Prasanna M. "The impact of security and privacy threat modeling on blockchain-enabled-electronic voting system." Applied and Computational Engineering 6, no. 1 (2023): 306–11. http://dx.doi.org/10.54254/2755-2721/6/20230797.
Pełny tekst źródłaEze, Kelechi G., Cajetan M. Akujuobi, Shermar Hunter, Shumon ,. Alam, Sarhan Musa, and Justin Foreman. "A Blockchain-based Security Architecture for the Internet of Things." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (March 23, 2022): 12–22. http://dx.doi.org/10.37394/23209.2022.19.2.
Pełny tekst źródłaKhan, Muhammad Ayaz, Subhan Ullah, Tahir Ahmad, Khwaja Jawad, and Attaullah Buriro. "Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol." Sensors 23, no. 12 (2023): 5518. http://dx.doi.org/10.3390/s23125518.
Pełny tekst źródłaRenjith, E. Jeslin. "Revolutionizing Cloud Security: Innovative Approaches for Safeguarding Data Integrity." FMDB Transactions on Sustainable Computer Letters 2, no. 2 (2024): 111–19. http://dx.doi.org/10.69888/ftscl.2024.000185.
Pełny tekst źródłaRahman, Wan Fariza Wan Abdul, Aisha Hassan Abdalla, and Md Rafiqul Islam. "The Proposed Framework and Challenges towards Smart City Implementation." Journal of Physics: Conference Series 2084, no. 1 (2021): 012025. http://dx.doi.org/10.1088/1742-6596/2084/1/012025.
Pełny tekst źródłaW., Sakpere,, Odetunde, A. I., and Ibekwe ,. E. C. "Policing the Cyberspace: Jurisprudential Approaches." African Journal of Law, Political Research and Administration 8, no. 1 (2025): 125–35. https://doi.org/10.52589/ajlpra-14s5ukgt.
Pełny tekst źródłaPapamartzivanos, Dimitrios, Sofia Anna Menesidou, Panagiotis Gouvas, and Thanassis Giannetsos. "A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly." Future Internet 13, no. 2 (2021): 30. http://dx.doi.org/10.3390/fi13020030.
Pełny tekst źródłaBarakat, Ghena, Luca D’agati, Giuseppe Tricomi, Francesco Longo, Antonio Puliafito, and Giovanni Merlino. "Discrete Event Modeling and Simulation Approaches for IIoT." WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 21 (December 6, 2024): 2456–63. https://doi.org/10.37394/23207.2024.21.202.
Pełny tekst źródłaFerrara, Pietro, Luca Olivieri, and Fausto Spoto. "Static Privacy Analysis by Flow Reconstruction of Tainted Data." International Journal of Software Engineering and Knowledge Engineering 31, no. 07 (2021): 973–1016. http://dx.doi.org/10.1142/s0218194021500303.
Pełny tekst źródłaKanthavel, R. "Review on Data Securing Techniques for Internet of Medical Things." September 2021 3, no. 3 (2021): 177–91. http://dx.doi.org/10.36548/jscp.2021.3.004.
Pełny tekst źródłaAlgarni, Sultan, Fathy Eassa, Khalid Almarhabi, et al. "Blockchain-Based Secured Access Control in an IoT System." Applied Sciences 11, no. 4 (2021): 1772. http://dx.doi.org/10.3390/app11041772.
Pełny tekst źródłaKolmahin, Danil, and Anatoliy Sergiyenko. "Combining Pretty Good Privacy and Role-Based Access Control Technologies for Access Protection to Confidential Data." Information, Computing and Intelligent systems, no. 4 (October 2, 2024): 69–78. http://dx.doi.org/10.20535/2786-8729.4.2024.305130.
Pełny tekst źródłaMugonza, Robert1 and Basaza-Ejiri. H. Annabella2Mugonza Robert1 and Basaza-Ejiri. H. Annabella2. "A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 8, no. 1/2/3/4/5 (2023): 23. https://doi.org/10.5281/zenodo.7568321.
Pełny tekst źródłaMugonza, Robert1 and Basaza-Ejiri. H. Annabella2. "A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 8, no. 1/2/3/4/5 (2018): 01–16. https://doi.org/10.5281/zenodo.1489020.
Pełny tekst źródłaPrasadhini, D. Hari, Harini R, and R. Jerushaa Michelle. "Blockchain-Enabled IoT: Enabling Trust and Security in a Connected World." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 2631–34. http://dx.doi.org/10.22214/ijraset.2023.52051.
Pełny tekst źródłaPrabhdeep Singh and Ashish Kumar Pandey. "A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing." International Journal of Data Informatics and Intelligent Computing 1, no. 2 (2022): 23–33. http://dx.doi.org/10.59461/ijdiic.v1i2.33.
Pełny tekst źródłaViswanadham, Yedida Venkata Rama Subramanya, and Kayalvizhi Jayavel. "A Framework for Data Privacy Preserving in Supply Chain Management Using Hybrid Meta-Heuristic Algorithm with Ethereum Blockchain Technology." Electronics 12, no. 6 (2023): 1404. http://dx.doi.org/10.3390/electronics12061404.
Pełny tekst źródłaJayasinghe, Upul, Gyu Myoung Lee, Áine MacDermott, and Woo Seop Rhee. "TrustChain: A Privacy Preserving Blockchain with Edge Computing." Wireless Communications and Mobile Computing 2019 (July 8, 2019): 1–17. http://dx.doi.org/10.1155/2019/2014697.
Pełny tekst źródłaAhmad, Ahsan, Aftab Tariq, Hafiz Khawar Hussain, and Ahmad Yousaf Gill. "Revolutionizing Healthcare: How Deep Learning is poised to Change the Landscape of Medical Diagnosis and Treatment." Journal of Computer Networks, Architecture and High Performance Computing 5, no. 2 (2023): 458–71. http://dx.doi.org/10.47709/cnahpc.v5i2.2350.
Pełny tekst źródłaWang, Yongchao. "Federated Learning Applications in Fingerprint and Finger Vein Recognition." ITM Web of Conferences 70 (2025): 01023. https://doi.org/10.1051/itmconf/20257001023.
Pełny tekst źródłaMorales-Alarcón, Cristian Hugo, Elba Bodero-Poveda, Henry Mauricio Villa-Yánez, and Pamela Alexandra Buñay-Guisñan. "Blockchain and Its Application in the Peer Review of Scientific Works: A Systematic Review." Publications 12, no. 4 (2024): 40. http://dx.doi.org/10.3390/publications12040040.
Pełny tekst źródłaShinde1, Aditya S. "Multi-Factor Authentication: A Comprehensive Review." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50831.
Pełny tekst źródłaČižiūnienė, Kristina, Margarita Prokopovič, Jurijus Zaranka, and Jonas Matijošius. "Biometric Breakthroughs for Sustainable Travel: Transforming Public Transportation through Secure Identification." Sustainability 16, no. 12 (2024): 5071. http://dx.doi.org/10.3390/su16125071.
Pełny tekst źródłaBolatbekkyzy, G. "Legal Issues of Cross-Border Data Transfer in the Era of Digital Government." Journal of Digital Technologies and Law 2, no. 2 (2024): 286–307. http://dx.doi.org/10.21202/jdtl.2024.15.
Pełny tekst źródłaKhatiwada, Pankaj, Bian Yang, Jia-Chun Lin, and Bernd Blobel. "Patient-Generated Health Data (PGHD): Understanding, Requirements, Challenges, and Existing Techniques for Data Security and Privacy." Journal of Personalized Medicine 14, no. 3 (2024): 282. http://dx.doi.org/10.3390/jpm14030282.
Pełny tekst źródłaLee, Yeon-Ji, Na-Yeon Shin, and Il-Gu Lee. "Privacy-Preserving Data Sharing via PCA-Based Dimensionality Reduction in Non-IID Environments." Electronics 14, no. 13 (2025): 2711. https://doi.org/10.3390/electronics14132711.
Pełny tekst źródłaChen, Haoyu. "Person Re-ID: Tackling occlusion, labeled data, and privacy." Applied and Computational Engineering 86, no. 1 (2024): 161–73. http://dx.doi.org/10.54254/2755-2721/86/20241592.
Pełny tekst źródłaQamar, Faizan, Syed Hussain Ali Kazmi, Maraj Uddin Ahmed Siddiqui, Rosilah Hassan, and Khairul Akram Zainol Ariffin. "Federated learning for millimeter-wave spectrum in 6G networks: applications, challenges, way forward and open research issues." PeerJ Computer Science 10 (October 9, 2024): e2360. http://dx.doi.org/10.7717/peerj-cs.2360.
Pełny tekst źródłaB k, Jyoti, R. Nirmala, and G. Gurumita. "Enhancing Blockchain Framework Using Web3.0 for IoT Based Plant Disease Detection System." Journal of Smart Internet of Things 2024, no. 2 (2024): 166–78. https://doi.org/10.2478/jsiot-2024-0019.
Pełny tekst źródłaLiguori, Carlos. "Exploring Lawful Hacking as a Possible Answer to the "Going Dark" Debate." Michigan Technology Law Review, no. 26.2 (2020): 317. http://dx.doi.org/10.36645/mtlr.26.2.exploring.
Pełny tekst źródłaJenab, Kouroush, Sam Khoury, and Kim LaFevor. "Flow-Graph and Markovian Methods for Cyber Security Analysis." International Journal of Enterprise Information Systems 12, no. 1 (2016): 59–84. http://dx.doi.org/10.4018/ijeis.2016010104.
Pełny tekst źródłaUpadhyay, Shrikant, Mohit Kumar, Ashwani Kumar, et al. "Feature Extraction Approach for Speaker Verification to Support Healthcare System Using Blockchain Security for Data Privacy." Computational and Mathematical Methods in Medicine 2022 (July 25, 2022): 1–12. http://dx.doi.org/10.1155/2022/8717263.
Pełny tekst źródłaSeyedmostafa, Safavi, and Shukur Zarina. "CenterYou: Android privacy made easier the Cloud Way." Trends in Computer Science and Information Technology 7, no. 3 (2022): 057–73. http://dx.doi.org/10.17352/tcsit.000052.
Pełny tekst źródłaArellano, April Moreno, Wenrui Dai, Shuang Wang, Xiaoqian Jiang, and Lucila Ohno-Machado. "Privacy Policy and Technology in Biomedical Data Science." Annual Review of Biomedical Data Science 1, no. 1 (2018): 115–29. http://dx.doi.org/10.1146/annurev-biodatasci-080917-013416.
Pełny tekst źródłaDavydov, S. A. "The Concept of Security in Turkish History and Culture." Concept: philosophy, religion, culture 7, no. 2 (2023): 63–72. http://dx.doi.org/10.24833/2541-8831-2023-2-26-63-72.
Pełny tekst źródłaVedant Sinha, Nikhil, and Sambhav Marupudi. "<b>AI-Enhanced Threat Detection and Response in Financial Cybersecurity: Current Practice and Emerging Trends</b>." International Journal of Engineering and Computer Science 14, no. 05 (2025): 27207–28. https://doi.org/10.18535/ijecs.v14i05.5133.
Pełny tekst źródła