Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Security solution.

Artykuły w czasopismach na temat „Security solution”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Security solution”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Meyer, Helen. "Security risk or security solution?" Computers & Security 15, no. 4 (1996): 317. http://dx.doi.org/10.1016/0167-4048(96)88943-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Shukla, Surabhi. "Public Cloud Security Challenges & Solution." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 111–17. https://doi.org/10.70729/ijser15100.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Li, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (2020): 916. http://dx.doi.org/10.3390/s20030916.

Pełny tekst źródła
Streszczenie:
With the rapid development of the Internet of Things (IoT), the number of IoT devices has increased exponentially. Therefore, we have put forward higher security requirements for the management, transmission, and storage of massive IoT data. However, during the transmission process of IoT data, security issues, such as data theft and forgery, are prone to occur. In addition, most existing data storage solutions are centralized, i.e., data are stored and maintained by a centralized server. Once the server is maliciously attacked, the security of IoT data will be greatly threatened. In view of t
Style APA, Harvard, Vancouver, ISO itp.
4

Tyler, Neil. "Pre-Provisioned Security Solution." New Electronics 51, no. 18 (2019): 8. http://dx.doi.org/10.12968/s0047-9624(22)61427-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Čuřík, Peter, Roderik Ploszek, and Pavol Zajac. "Practical Use of Secret Sharing for Enhancing Privacy in Clouds." Electronics 11, no. 17 (2022): 2758. http://dx.doi.org/10.3390/electronics11172758.

Pełny tekst źródła
Streszczenie:
The topic of this contribution is the practical use of secret sharing schemes in securing private data. In the first part, we focus on the security model and the overview of the available solutions. In the second part, we describe our solution for storing sensitive data in commercial cloud storage systems, an application called Datachest. The application uploads the data in encrypted form. Cryptographic keys are divided into shares. Each cloud receives one share. This solution improves the security of users’ sensitive data in the cloud. In the final part, we explore the ramifications of secret
Style APA, Harvard, Vancouver, ISO itp.
6

BS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.

Pełny tekst źródła
Streszczenie:
The process of defending computer networks from cyber attacks or unintended, unauthorized access is known as cyber security. Organizations, businesses, and governments need cyber security solutions because cyber criminals pose a threat to everyone. Artificial intelligence promises to be a great solution for this. Security experts are better able to defend vulnerable networks and data from cyber attackers by combining the strengths of artificial intelligence and cyber security. This paper provides an introduction to the use of artificial intelligence in cyber security. AI-driven cyber security
Style APA, Harvard, Vancouver, ISO itp.
7

Stashchuk, Olena, and Rostyslav Martyniuk. "Banking innovations: security technology solution." VUZF Review 6, no. 1 (2021): 79–86. http://dx.doi.org/10.38188/2534-9228.21.6.08.

Pełny tekst źródła
Streszczenie:
The article identifies the essence of the concept of banking innovations and their role in the financial security of banking institutions. Features of development of technological banking innovations in Ukraine, including in the conditions of influence of COVID-19 are considered. The characteristics of banking innovations are considered, the criteria to be met by banking innovations both on the part of the client and on the part of the bank are identified. The classification of banking innovations according to such features as: by time aspect, by novelty, by causes of occurrence, by volume of
Style APA, Harvard, Vancouver, ISO itp.
8

Sharma,, Rajani, and Rajender Kumar Trivedi. "Literature review: Cloud Computing –Security Issues, Solution and Technologies." International Journal of Engineering Research 3, no. 4 (2014): 221–25. http://dx.doi.org/10.17950/ijer/v3s4/408.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Oliveira, Vítor, António Coelho, Rui Guimarães, and Carlos Rebelo. "Serious Game in Security: A Solution for Security Trainees." Procedia Computer Science 15 (2012): 274–82. http://dx.doi.org/10.1016/j.procs.2012.10.079.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Kandpal, Meenakshi, Yash Pritwani, Chinmaya Misra, Amrendra Yadav, and Rabindra Barik. "Towards data storage scheme in blockchain based serverless environment: AES encryption and decryption algorithm approach." Facta universitatis - series: Electronics and Energetics 37, no. 2 (2024): 317–42. http://dx.doi.org/10.2298/fuee2402317k.

Pełny tekst źródła
Streszczenie:
In today's digital age, data storage has become an increasingly important issue. The exponential growth of data has led to the need for secure and private storage solutions. Unfortunately, without a standardized protocol, the security and privacy of sensitive data can be a challenge. However, blockchain technology has emerged as a promising solution for secure data storage. Blockchain's decentralized and immutable nature provides a comprehensive solution for the security and privacy of all types of data. In this research, we propose an innovative framework that leverages the benefits of blockc
Style APA, Harvard, Vancouver, ISO itp.
11

Vulpe, Alexandru, Răzvan Crăciunescu, Ana-Maria Drăgulinescu, Sofoklis Kyriazakos, Ali Paikan, and Pouyan Ziafati. "Enabling Security Services in Socially Assistive Robot Scenarios for Healthcare Applications." Sensors 21, no. 20 (2021): 6912. http://dx.doi.org/10.3390/s21206912.

Pełny tekst źródła
Streszczenie:
Today’s IoT deployments are highly complex, heterogeneous and constantly changing. This poses severe security challenges such as limited end-to-end security support, lack of cross-platform cross-vertical security interoperability as well as the lack of security services that can be readily applied by security practitioners and third party developers. Overall, these require scalable, decentralized and intelligent IoT security mechanisms and services which are addressed by the SecureIoT project. This paper presents the definition, implementation and validation of a SecureIoT-enabled socially ass
Style APA, Harvard, Vancouver, ISO itp.
12

Han, Yu, Xiaolei Wang, Yi Zhang, Gang Yang, and Xin Tan. "A UAV swarm communication network architecture based on consortium blockchain." Journal of Physics: Conference Series 2352, no. 1 (2022): 012008. http://dx.doi.org/10.1088/1742-6596/2352/1/012008.

Pełny tekst źródła
Streszczenie:
In the context of the development of UAVs towards clustering, intelligence, and autonomy, it is necessary to ensure that multiple UAVs and ground control stations can communicate and share information securely in real-time so that UAV swarms can make real-time and effective decisions and collaborations. These factors pose challenges to the security, robustness, and operational efficiency of UAV swarm communication networks. This paper combines blockchain technology with a UAV swarm communication network, proposes a new UAV swarm communication network architecture based on consortium blockchain
Style APA, Harvard, Vancouver, ISO itp.
13

Longhas, Paul Ryan A., Alsafat M. Abdul, and Edcon B. Baccay. "The Security Assignment Problem and Its Solution." International Journal of Analysis and Applications 21 (July 17, 2023): 72. http://dx.doi.org/10.28924/2291-8639-21-2023-72.

Pełny tekst źródła
Streszczenie:
In this paper we derived a new method for finding the optimal solution to security assignment problems using projection onto a convex set. This study will help communities find the optimal number of assigned and reserved personnels in designating security officers to an area. This study is applicable as well to CCTV assignment problems. The main goal of this study is to give a new method that can be applied in solving security assignment problems. We used some of the known properties of the convex optimization in proving the properties of the optimal solution, such as the concept of proximity
Style APA, Harvard, Vancouver, ISO itp.
14

Chatterjee, Ayan, and Andreas Prinz. "Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study." Sensors 22, no. 5 (2022): 1703. http://dx.doi.org/10.3390/s22051703.

Pełny tekst źródła
Streszczenie:
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket l
Style APA, Harvard, Vancouver, ISO itp.
15

Alliance, Kingst TONY-MAYEKO. "Security solution in networks and attack simulations." Journal of Scientific and Engineering Research 11, no. 1 (2024): 203–8. https://doi.org/10.5281/zenodo.10620902.

Pełny tekst źródła
Streszczenie:
<strong>Abstract </strong>The objective of this work is the implementation of a security solution for an administration, by making use of services, mechanisms, tools and procedures that are commonly called "solutions" or "measures" of security". It is a question of putting the necessary mechanisms for the protection of the resources of the information system and to prevent malicious people intending to break into the system.
Style APA, Harvard, Vancouver, ISO itp.
16

Olieh, Ofuchi Ngozi Rich. "A Smart Contract-based Blockchain Solution in IoT Networks." European Journal of Computer Science and Information Technology 12, no. 2 (2024): 75–92. http://dx.doi.org/10.37745/ejcsit.2013/vol12n27592.

Pełny tekst źródła
Streszczenie:
The emergence and growing use of advanced technologies has opened up new possibilities for addressing the security challenges of resource-constrained IoT net- works. As IoT devices exchange sensitive data, secure key management is essential for IoT network security, particularly during the key revocation phase. However, current IoT key management solutions require improvements due to the resource limitations of IoT devices. Despite these limitations, existing key revocation solutions still have several areas for improvement, including high communication overheads. Therefore, a decentralized an
Style APA, Harvard, Vancouver, ISO itp.
17

Yue Ma, Yue Ma, Xin Li Yue Ma, and Jianbin Li Xin Li. "A Security Edge Computing Offloading Solution for 5G Cellular Network." 電腦學刊 32, no. 6 (2021): 015–23. http://dx.doi.org/10.53106/199115992021123206002.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Ahmad Kouchay, Shouket. "Cloud Security Vulnerabilities and Solution Model." Review of Computer Engineering Research 7, no. 1 (2020): 12–19. http://dx.doi.org/10.18488/journal.76.2020.71.12.19.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Wilson, Gordon. "Post SFOR: A European security solution?" RUSI Journal 143, no. 3 (1998): 19–23. http://dx.doi.org/10.1080/03071849808446262.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Grant, Ian. "Healthcare security needs a social solution." Infosecurity Today 2, no. 2 (2005): 12–16. http://dx.doi.org/10.1016/s1742-6847(05)70179-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Kaneshige, Thomas. "Ex-IBMers offer total security solution." Computer Fraud & Security Bulletin 1995, no. 11 (1995): 9–10. http://dx.doi.org/10.1016/0142-0496(95)80073-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Turner, Stephen J. "A concurrent solution to computer security." Artificial Intelligence Review 6, no. 2 (1992): 191–201. http://dx.doi.org/10.1007/bf00150233.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Gunpreet, Kaur, Kaur Ekleen, Jindal Harsh, and Gautam Neha. "Computer viruses: Security risks and solution." i-manager’s Journal on Software Engineering 17, no. 4 (2023): 29. http://dx.doi.org/10.26634/jse.17.4.19840.

Pełny tekst źródła
Streszczenie:
Computer viruses are malicious computer programs that can affect the working of a computer system, thus affecting important data and files. This study provides an overview of the history of computer viruses, their evolution, and the ways in which they spread and infect systems. It discusses the various security vulnerabilities that viruses exploit, such as software bugs and human errors, and the damage they can cause, such as data loss, system crashes, and identity theft. The study also analyzes various preventive measures that can be taken to minimize the risk of virus infection, such as soft
Style APA, Harvard, Vancouver, ISO itp.
24

Singh, Devesh, and Ashwini Kumar Dautaniya. "Cloud Computing Security Challenges and Solution." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 3 (2019): 1185–90. http://dx.doi.org/10.61841/turcomat.v10i3.14399.

Pełny tekst źródła
Streszczenie:
Cloud computing has become a fundamental part of present-day IT infrastructure, presenting unprecedented tiers of scalability, flexibility, and value efficiency. However, this paradigm shift in computing comes with its very own set of protection demanding situations that demand meticulous examination. This evaluation paper delves into the multifaceted panorama of cloud computing security challenges and explores modern solutions to mitigate these concerns. The primary focus areas encompass records safety, get admission to manipulate, compliance and prison concerns, community safety, virtualizat
Style APA, Harvard, Vancouver, ISO itp.
25

Rashidinia, Anoushirvan, S. Gavrilenko, M. Pochebut, and O. Sytnikova. "SOFTWARE SECURITY OVERVIEW." Системи управління, навігації та зв’язку. Збірник наукових праць 2, no. 54 (2019): 55–59. http://dx.doi.org/10.26906/sunz.2019.2.055.

Pełny tekst źródła
Streszczenie:
The article analyzes the main threats and problems of software protection. Methods for protecting information, their advantages and disadvantages are considered, and the possibility of using existing tools to protect software is studied. The possibility of improving and using a number of software protection methods against active fraud attacks was brought. Type of attacks exists and why protection is necessary was specified. Furthermore, we discussed several states of the art protection techniques which can be used in software to protect against analysis and tampering attacks. Analyzed such me
Style APA, Harvard, Vancouver, ISO itp.
26

Tang, Qiang. "Another Look at Privacy-Preserving Automated Contact Tracing." ACM Transactions on Spatial Algorithms and Systems 8, no. 2 (2022): 1–27. http://dx.doi.org/10.1145/3490490.

Pełny tekst źródła
Streszczenie:
In the current COVID-19 pandemic, manual contact tracing has been proven to be very helpful to reach close contacts of infected users and slow down spread of the virus. To improve its scalability, a number of automated contact tracing (ACT) solutions have been proposed, and some of them have been deployed. Despite the dedicated efforts, security and privacy issues of these solutions are still open and under intensive debate. In this article, we examine the ACT concept from a broader perspective, by focusing on not only security and privacy issues but also functional issues such as interface, u
Style APA, Harvard, Vancouver, ISO itp.
27

Isnarti, Rika. "Indian Food Security; from Problem to Solution through Household Food Security." Frequency of International Relations (FETRIAN) 2, no. 1 (2020): 1–27. http://dx.doi.org/10.25077/fetrian.2.1.1-27.2020.

Pełny tekst źródła
Streszczenie:
This paper assess food security in India especially in rural area where food security condition is far behind. India is one of countries suffering from food insecurity that leads to nutrition insecurity. To achieve food security is not about how much food being produced, or analyzed the availability of food but also about food utility, a condition where everyone can achieve food nutrition with amount of food being produced. So, food security is also about how people can buy food in adequate price and accessible to free from malnutrition and obtain good dietary for healthy life, the utility of
Style APA, Harvard, Vancouver, ISO itp.
28

J G, Krithick, Nivedh T S, Siva Bharath S, Dr Radhamani A. S, and V. Ramanathan. "DATA SECURITY IN HEALTHCARE USING IOT." International Journal of Engineering Applied Sciences and Technology 7, no. 3 (2022): 79–82. http://dx.doi.org/10.33564/ijeast.2022.v07i03.011.

Pełny tekst źródła
Streszczenie:
While the Internet of Things (IoT) has been instrumental in healthcare data transmission, it also presents vulnerabilities and security risks to patients’ personalized health information for remote medical treatment. Currently most published security solutions available for healthcare data don't seem to be focused on data flow all the way from IoT sensor devices placed on a patient’s body through network routers to doctor’s offices. In this project, the IoT network facilitates healthcare data transmission for remote medical treatment, explored security risks related to unsecured data transmiss
Style APA, Harvard, Vancouver, ISO itp.
29

Yusupovich, Aminov Zarif, and Kholikulov Anvar Nematovich. "Problems Of Economic Security Of Enterprises And The Main Directions Of Their Solution." American Journal of Management and Economics Innovations 3, no. 05 (2021): 80–85. http://dx.doi.org/10.37547/tajmei/volume03issue05-13.

Pełny tekst źródła
Streszczenie:
The article describes the problems of economic security of enterprises and the main directions of their solution. It outlines the principles of economic security of the enterprise, the tasks of ensuring the security of the enterprise, the conceptual directions for ensuring the economic security of the enterprise.
Style APA, Harvard, Vancouver, ISO itp.
30

P., Balaji, Athisha L., Kalpana Sri K., Kaniga K., and Keerthana R. "Deep Learning Based Detecting Security System." Advancement in Image Processing and Pattern Recognition 8, no. 2 (2025): 38–44. https://doi.org/10.5281/zenodo.15517554.

Pełny tekst źródła
Streszczenie:
<em>With the growing demand for intelligent and contactless security solutions, deep learning technologies have become central to modern authentication systems. This project presents a deep learning-based security system designed for securing lockers through face recognition. The system captures the facial image of a passenger and locks the allotted locker. Only the registered passenger is allowed to unlock it. If any unauthorized individual attempts to access the locker, the system identifies the mismatch, denies access, triggers a buzzer alarm, and sends an instant alert to security personne
Style APA, Harvard, Vancouver, ISO itp.
31

Cieśla, Rafał. "Security measures in combating document falsifiers." Nowa Kodyfikacja Prawa Karnego 44 (December 29, 2017): 41–53. http://dx.doi.org/10.19195/2084-5065.44.4.

Pełny tekst źródła
Streszczenie:
Evolution of political and economic transformation has to a considerable degree contributed to the increase of crimes committed with fake documents. Development of civilisation and technological progress necessitate protection of public documents. To ensure security and trust to the institutions issuing documents their producers and issu­ers use various security measures to protect them against falsification. Combination of advanced technologies with biometric identifiers is a necessary solution. Implementation of advanced security measures should, at least for a certain period of time, hinder
Style APA, Harvard, Vancouver, ISO itp.
32

Batra, Isha, Hatem S. A. Hamatta, Arun Malik, et al. "LLSFIoT: Lightweight Logical Security Framework for Internet of Things." Wireless Communications and Mobile Computing 2021 (August 18, 2021): 1–9. http://dx.doi.org/10.1155/2021/8526206.

Pełny tekst źródła
Streszczenie:
Current research in Internet of Things (IoT) is focused on the security enhancements to every communicated message in the network. Keeping this thought in mind, researcher in this work emphasizes on a security oriented cryptographic solution. Commonly used security cryptographic solutions are heavy in nature considering their key size, operations, and mechanism they follow to secure a message. This work first determines the benefit of applying lightweight security cryptographic solutions in IoT. The existing lightweight counterparts are still vulnerable to attacks and also consume calculative
Style APA, Harvard, Vancouver, ISO itp.
33

Alexander. P. "The emerging roles of Automation in safety and security." International Journal on Integrated Education 2, no. 1 (2020): 62–65. http://dx.doi.org/10.31149/ijie.v2i1.523.

Pełny tekst źródła
Streszczenie:
The present study defines automated solutions in safety and security in the emerging world. As there are large number of cyber security threats in the world there have been large number of solutions and one such solution is the use of automation in safety and security. Hence, the presented report display the role and importance of automation.
Style APA, Harvard, Vancouver, ISO itp.
34

Neerav Nishant, Et al. "The Proposed Framework for Cloud Computing System Security and Privacy Services." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1197–205. http://dx.doi.org/10.17762/ijritcc.v11i9.9034.

Pełny tekst źródła
Streszczenie:
Public cloud computing has emerged as a popular and efficient solution for organizations to store, process, and access their data and applications. However, with the increasing adoption of public cloud services, concerns regarding security have become a critical factor in decision-making processes. This study aims to investigate the security aspects of public cloud computing and identify potential vulnerabilities and threats that organizations may face. The aim of this study is to examine the challenges associated with cloud computing and its security concerns. Cloud computing is a technology
Style APA, Harvard, Vancouver, ISO itp.
35

Ibraj, Bajram, Mirela Alushllari, and Ferit Hysa. "Environmental Security, Environmental Crime and National Security." International Journal of Religion 5, no. 11 (2024): 4890–900. http://dx.doi.org/10.61707/1ky4w568.

Pełny tekst źródła
Streszczenie:
In this paper we address environmental security, environmental crime and national security, which are important issues for the individual, society and the state. In this situation, we would be interested to look at the level of environmental security, environmental crime situation and the connection these two have with national security. Last decades have shown serious environmental damage and environmental security, despite the legal and criminal measures taken by the government and the state. This disturbing phenomenon remains a major problem for solution. Further we analyzed the legal frame
Style APA, Harvard, Vancouver, ISO itp.
36

Mehraj, Tehseen, Mir Aman Sheheryar, Sajaad Ahmed Lone, and A. H. Mir. "A critical insight into the identity authentication systems on smartphones." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (2019): 982. http://dx.doi.org/10.11591/ijeecs.v13.i3.pp982-989.

Pełny tekst źródła
Streszczenie:
&lt;span&gt;The advancement of computing power on mobile devices and their popularity among people in performing sensitive data exchange is uncovering an urgent need for a highly secure solution than the existing ones. The need for such a security solution persists that should be able to thwart not only the contemporary threats but also offer continued support without bowing down to progression in technology. Though some security solutions have been contemplated, a lack of standardised or absolute security solution which can provide a feasible and secure solution to mobile phones exists. In th
Style APA, Harvard, Vancouver, ISO itp.
37

Tehseen, Mehraj, Aman Sheheryar Mir, Ahmed Lone Sajaad, and H. Mir A. "A critical insight into the identity authentication systems on smartphones." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (2019): 982–89. https://doi.org/10.11591/ijeecs.v13.i3.pp982-989.

Pełny tekst źródła
Streszczenie:
The advancement of computing power on mobile devices and their popularity among people in performing sensitive data exchange is uncovering an urgent need for a highly secure solution than the existing ones. The need for such a security solution persists that should be able to thwart not only the contemporary threats but also offer continued support without bowing down to progression in technology. Though some security solutions have been contemplated, a lack of standardised or absolute security solution which can provide a feasible and secure solution to mobile phones exists. In this paper, a
Style APA, Harvard, Vancouver, ISO itp.
38

Ajah, Ifeyinwa Angela. "Evaluation of Enhanced Security Solutions in 802.11-Based Networks." International Journal of Network Security & Its Applications (IJNSA) 6, no. 4 (2014): 29–42. https://doi.org/10.5281/zenodo.7077353.

Pełny tekst źródła
Streszczenie:
Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially vulnerable to packet sniffing. Today, wireless networks are more prolific, and the monitoring devices used to find them are mobile and easy to access. Securing wireless networks can be difficult because these networks consist of radio transmitters and receivers, and anybody can listen, capture data and attempt to compromise it. In recent years, a range of technologies and mechanisms have helped makes networking more secure. This paper holistically evaluated various enhanced protocols proposed to
Style APA, Harvard, Vancouver, ISO itp.
39

Li, Zuyu. "A secret image sharing solution for autonomous vehicles." Applied and Computational Engineering 4, no. 1 (2023): 447–55. http://dx.doi.org/10.54254/2755-2721/4/2023303.

Pełny tekst źródła
Streszczenie:
With the improvement of personal privacy awareness and government agencies' awareness of national security information protection, data access and data security of smart cars is a thorny problem. The fundamental reason is that the key to access and store data is kept in the hands of smart car companies. Although many scholars have made great progress in the research of secret image sharing solutions before, such as progressive visual secret sharing, polynomial based secret image sharing, etc., these encryption schemes are single key encryption and cannot solve the technical problems encountere
Style APA, Harvard, Vancouver, ISO itp.
40

Phanindra, Tatineni Leela. "ML Based Solution to Refine Captcha." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47613.

Pełny tekst źródła
Streszczenie:
Abstract Traditional CAPTCHA mechanisms, though widely used for securing web portals, are increasingly criticized for poor user experience and limited accessibility. In response, the Unique Identification Authority of India (UIDAI) seeks to replace CAPTCHA with a passive alternative that can seamlessly differentiate between bots and legitimate users without explicit user intervention. This research presents a novel passive CAPTCHA solution that leverages browser-based environmental parameters and interaction behaviors. A JavaScript-based frontend captures user-specific data like mouse entropy,
Style APA, Harvard, Vancouver, ISO itp.
41

Rafeequ, Ahmed Mabrook, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, and Hemalata Vasudavan. "ACJS: “Anti-Crypto Jacking System” Security Development." International Journal of Data Science and Advanced Analytics 4 (June 17, 2023): 105–12. http://dx.doi.org/10.69511/ijdsaa.v4i0.150.

Pełny tekst źródła
Streszczenie:
Computer users globally are common targets for attackers, including for the rising threat of crypto jacking. The threat on illegal crypto mining, has been ongoing since 2017, and it has done devastating levels of damage to users and organization’s devices all around the world. Few solutions had been developed by various communities to mitigate the threat. However, there has not been a solution brought whereby a single software is able to automate the steps and processes to remove crypto jacking threat from user devices, till date. The aim of this research is to propose a single software based
Style APA, Harvard, Vancouver, ISO itp.
42

Silva, Josival, Nelson Rosa, and Fernando Aires. "UP-Home: A Self-Adaptive Solution for Smart Home Security." JUCS - Journal of Universal Computer Science 30, no. 4 (2024): 502–30. http://dx.doi.org/10.3897/jucs.107050.

Pełny tekst źródła
Streszczenie:
Smart home devices are vulnerable to attacks that put their users&amp;rsquo; security at risk. Vulnerabilities are discovered very frequently and can expose these devices through unsecured services. Meanwhile, the lack of standardisation in upgrade methods makes smart homes a potentially vulnerable environment. Furthermore, many manufacturers release their products and then abandon them, refusing to support security updates. As a result, security updates are needed to deal with the emergence of new attacks. There are several proposals to promote security in smart homes. However, there are rare
Style APA, Harvard, Vancouver, ISO itp.
43

Silva, Josival, Nelson Rosa, and Fernando Aires. "UP-Home: A Self-Adaptive Solution for Smart Home Security." JUCS - Journal of Universal Computer Science 30, no. (4) (2024): 502–30. https://doi.org/10.3897/jucs.107050.

Pełny tekst źródła
Streszczenie:
Smart home devices are vulnerable to attacks that put their users' security at risk. Vulnerabilities are discovered very frequently and can expose these devices through unsecured services. Meanwhile, the lack of standardisation in upgrade methods makes smart homes a potentially vulnerable environment. Furthermore, many manufacturers release their products and then abandon them, refusing to support security updates. As a result, security updates are needed to deal with the emergence of new attacks. There are several proposals to promote security in smart homes. However, there are rare solutions
Style APA, Harvard, Vancouver, ISO itp.
44

Yang, Guang Hong, Qing Zhang, Ding Yong Tang, and Cong Min Huang. "A Solution about Application System How to Transfer Information Across Different Domains." Applied Mechanics and Materials 190-191 (July 2012): 898–901. http://dx.doi.org/10.4028/www.scientific.net/amm.190-191.898.

Pełny tekst źródła
Streszczenie:
We design a data exchange platform with the joint topology , based on data exchange and file encryption technology of messaging middleware and integration middleware, after analyzing the requirements on how to exchange information of different application systems in different security domains. The platform achieves the purpose of exchanging information securely between different application systems and different security domains , in accordance with the requirements of relevant standards.
Style APA, Harvard, Vancouver, ISO itp.
45

Xing, Qianqian, Baosheng Wang, and Xiaofeng Wang. "BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution." Symmetry 10, no. 9 (2018): 408. http://dx.doi.org/10.3390/sym10090408.

Pełny tekst źródła
Streszczenie:
Without the design for inherent security, the Border Gateway Protocol (BGP) is vulnerable to prefix/subprefix hijacks and other attacks. Though many BGP security approaches have been proposed to prevent or detect such attacks, the unsatisfactory cost-effectiveness frustrates their deployment. In fact, the currently deployed BGP security infrastructure leaves the chance for potential centralized authority misconfiguration and abuse. It actually becomes the critical yield point that demands the logging and auditing of misbehaviors and attacks in BGP security deployments. We propose a blockchain-
Style APA, Harvard, Vancouver, ISO itp.
46

Yao, Wei Wei, Liang Gong, and Xia Xu. "Design and Implementation of Security Network Optimization." Advanced Materials Research 977 (June 2014): 507–10. http://dx.doi.org/10.4028/www.scientific.net/amr.977.507.

Pełny tekst źródła
Streszczenie:
Optimization of computer network security technology shift in the relationship is constantly updated. Any computer network security solutions can not be designed once and for all. How seamless integration of network security technology and network security management together to make the network security implementation strategy is very important, this paper proposes a reasonable solution to improve overall network design and optimization of the security system, to develop scientific, reliable, dynamic network security optimization design, the design of enterprise network security solutions, co
Style APA, Harvard, Vancouver, ISO itp.
47

Zaher, Mahmoud A., and Nabil M. Eldakhly. "Securing the Internet of Things (IoT) with Blockchain: A Proof-of-Concept Implementation and Analysis." Journal of Cybersecurity and Information Management 10, no. 2 (2022): 26–34. http://dx.doi.org/10.54216/jcim.100203.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) has revolutionized the way we interact with everyday objects, enabling devices to collect and share data seamlessly. However, this increased connectivity has also increased the security risks associated with these devices, as they often lack the necessary security mechanisms to prevent malicious attacks. To address this issue, we propose using blockchain technology to secure IoT devices. In this paper, we present a proof-of-concept implementation of a blockchain-based IoT security system and analyze its effectiveness. Our system leverages blockchain's distributed l
Style APA, Harvard, Vancouver, ISO itp.
48

Washima Tuleun. "Design of an asterisk-based VoIP system and the implementation of security solution across the VoIP network." World Journal of Advanced Research and Reviews 23, no. 1 (2024): 875–906. http://dx.doi.org/10.30574/wjarr.2024.23.1.2048.

Pełny tekst źródła
Streszczenie:
Voice over Internet Protocol (VoIP) is a rapidly advancing technology that facilitates the transmission of voice and audio signals over the Internet or an IP-based network in real-time. This technology has seen a significant rise in demand due to its advantages over traditional circuit-switched telephony, including lower call rates, reduced operational costs, easier management, and enhanced call features. However, the growth in VoIP usage has also increased the potential for various security threats and attacks, jeopardizing the privacy, confidentiality, and integrity of transmitted data. This
Style APA, Harvard, Vancouver, ISO itp.
49

Washima, Tuleun. "Design of an asterisk-based VoIP system and the implementation of security solution across the VoIP network." World Journal of Advanced Research and Reviews 23, no. 1 (2024): 875–906. https://doi.org/10.5281/zenodo.14792201.

Pełny tekst źródła
Streszczenie:
Voice over Internet Protocol (VoIP) is a rapidly advancing technology that facilitates the transmission of voice and audio signals over the Internet or an IP-based network in real-time. This technology has seen a significant rise in demand due to its advantages over traditional circuit-switched telephony, including lower call rates, reduced operational costs, easier management, and enhanced call features. However, the growth in VoIP usage has also increased the potential for various security threats and attacks, jeopardizing the privacy, confidentiality, and integrity of transmitted data. This
Style APA, Harvard, Vancouver, ISO itp.
50

Mehmood, Abid, Abdul Nasir Khan, Iynkaran Natgunanathan, Arslan Shafique, Iftikhar Ahmed Khan, and Atta ur Rehman Khan. "Enhanced lightweight and compromised-resilient image encryption for resource constrained environments." PLOS ONE 20, no. 3 (2025): e0320046. https://doi.org/10.1371/journal.pone.0320046.

Pełny tekst źródła
Streszczenie:
The Internet is experiencing a significant increase in multimedia traffic volume, highlighting the growing importance of managing and securing multimedia content efficiently. Classical or traditional security solutions are suitable for those applications that have sufficient computing resources. However, the rise of IoTs and its applications opens new directions for researchers to provide lightweight security solutions. Many IoT applications send critical image data over the Internet, which requires adequate protection. Traditional security solutions are not suitable due to the resource-constr
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!