Artykuły w czasopismach na temat „Security solution”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Security solution”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Meyer, Helen. "Security risk or security solution?" Computers & Security 15, no. 4 (1996): 317. http://dx.doi.org/10.1016/0167-4048(96)88943-7.
Pełny tekst źródłaShukla, Surabhi. "Public Cloud Security Challenges & Solution." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 111–17. https://doi.org/10.70729/ijser15100.
Pełny tekst źródłaLi, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (2020): 916. http://dx.doi.org/10.3390/s20030916.
Pełny tekst źródłaTyler, Neil. "Pre-Provisioned Security Solution." New Electronics 51, no. 18 (2019): 8. http://dx.doi.org/10.12968/s0047-9624(22)61427-5.
Pełny tekst źródłaČuřík, Peter, Roderik Ploszek, and Pavol Zajac. "Practical Use of Secret Sharing for Enhancing Privacy in Clouds." Electronics 11, no. 17 (2022): 2758. http://dx.doi.org/10.3390/electronics11172758.
Pełny tekst źródłaBS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.
Pełny tekst źródłaStashchuk, Olena, and Rostyslav Martyniuk. "Banking innovations: security technology solution." VUZF Review 6, no. 1 (2021): 79–86. http://dx.doi.org/10.38188/2534-9228.21.6.08.
Pełny tekst źródłaSharma,, Rajani, and Rajender Kumar Trivedi. "Literature review: Cloud Computing –Security Issues, Solution and Technologies." International Journal of Engineering Research 3, no. 4 (2014): 221–25. http://dx.doi.org/10.17950/ijer/v3s4/408.
Pełny tekst źródłaOliveira, Vítor, António Coelho, Rui Guimarães, and Carlos Rebelo. "Serious Game in Security: A Solution for Security Trainees." Procedia Computer Science 15 (2012): 274–82. http://dx.doi.org/10.1016/j.procs.2012.10.079.
Pełny tekst źródłaKandpal, Meenakshi, Yash Pritwani, Chinmaya Misra, Amrendra Yadav, and Rabindra Barik. "Towards data storage scheme in blockchain based serverless environment: AES encryption and decryption algorithm approach." Facta universitatis - series: Electronics and Energetics 37, no. 2 (2024): 317–42. http://dx.doi.org/10.2298/fuee2402317k.
Pełny tekst źródłaVulpe, Alexandru, Răzvan Crăciunescu, Ana-Maria Drăgulinescu, Sofoklis Kyriazakos, Ali Paikan, and Pouyan Ziafati. "Enabling Security Services in Socially Assistive Robot Scenarios for Healthcare Applications." Sensors 21, no. 20 (2021): 6912. http://dx.doi.org/10.3390/s21206912.
Pełny tekst źródłaHan, Yu, Xiaolei Wang, Yi Zhang, Gang Yang, and Xin Tan. "A UAV swarm communication network architecture based on consortium blockchain." Journal of Physics: Conference Series 2352, no. 1 (2022): 012008. http://dx.doi.org/10.1088/1742-6596/2352/1/012008.
Pełny tekst źródłaLonghas, Paul Ryan A., Alsafat M. Abdul, and Edcon B. Baccay. "The Security Assignment Problem and Its Solution." International Journal of Analysis and Applications 21 (July 17, 2023): 72. http://dx.doi.org/10.28924/2291-8639-21-2023-72.
Pełny tekst źródłaChatterjee, Ayan, and Andreas Prinz. "Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study." Sensors 22, no. 5 (2022): 1703. http://dx.doi.org/10.3390/s22051703.
Pełny tekst źródłaAlliance, Kingst TONY-MAYEKO. "Security solution in networks and attack simulations." Journal of Scientific and Engineering Research 11, no. 1 (2024): 203–8. https://doi.org/10.5281/zenodo.10620902.
Pełny tekst źródłaOlieh, Ofuchi Ngozi Rich. "A Smart Contract-based Blockchain Solution in IoT Networks." European Journal of Computer Science and Information Technology 12, no. 2 (2024): 75–92. http://dx.doi.org/10.37745/ejcsit.2013/vol12n27592.
Pełny tekst źródłaYue Ma, Yue Ma, Xin Li Yue Ma, and Jianbin Li Xin Li. "A Security Edge Computing Offloading Solution for 5G Cellular Network." 電腦學刊 32, no. 6 (2021): 015–23. http://dx.doi.org/10.53106/199115992021123206002.
Pełny tekst źródłaAhmad Kouchay, Shouket. "Cloud Security Vulnerabilities and Solution Model." Review of Computer Engineering Research 7, no. 1 (2020): 12–19. http://dx.doi.org/10.18488/journal.76.2020.71.12.19.
Pełny tekst źródłaWilson, Gordon. "Post SFOR: A European security solution?" RUSI Journal 143, no. 3 (1998): 19–23. http://dx.doi.org/10.1080/03071849808446262.
Pełny tekst źródłaGrant, Ian. "Healthcare security needs a social solution." Infosecurity Today 2, no. 2 (2005): 12–16. http://dx.doi.org/10.1016/s1742-6847(05)70179-8.
Pełny tekst źródłaKaneshige, Thomas. "Ex-IBMers offer total security solution." Computer Fraud & Security Bulletin 1995, no. 11 (1995): 9–10. http://dx.doi.org/10.1016/0142-0496(95)80073-5.
Pełny tekst źródłaTurner, Stephen J. "A concurrent solution to computer security." Artificial Intelligence Review 6, no. 2 (1992): 191–201. http://dx.doi.org/10.1007/bf00150233.
Pełny tekst źródłaGunpreet, Kaur, Kaur Ekleen, Jindal Harsh, and Gautam Neha. "Computer viruses: Security risks and solution." i-manager’s Journal on Software Engineering 17, no. 4 (2023): 29. http://dx.doi.org/10.26634/jse.17.4.19840.
Pełny tekst źródłaSingh, Devesh, and Ashwini Kumar Dautaniya. "Cloud Computing Security Challenges and Solution." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 3 (2019): 1185–90. http://dx.doi.org/10.61841/turcomat.v10i3.14399.
Pełny tekst źródłaRashidinia, Anoushirvan, S. Gavrilenko, M. Pochebut, and O. Sytnikova. "SOFTWARE SECURITY OVERVIEW." Системи управління, навігації та зв’язку. Збірник наукових праць 2, no. 54 (2019): 55–59. http://dx.doi.org/10.26906/sunz.2019.2.055.
Pełny tekst źródłaTang, Qiang. "Another Look at Privacy-Preserving Automated Contact Tracing." ACM Transactions on Spatial Algorithms and Systems 8, no. 2 (2022): 1–27. http://dx.doi.org/10.1145/3490490.
Pełny tekst źródłaIsnarti, Rika. "Indian Food Security; from Problem to Solution through Household Food Security." Frequency of International Relations (FETRIAN) 2, no. 1 (2020): 1–27. http://dx.doi.org/10.25077/fetrian.2.1.1-27.2020.
Pełny tekst źródłaJ G, Krithick, Nivedh T S, Siva Bharath S, Dr Radhamani A. S, and V. Ramanathan. "DATA SECURITY IN HEALTHCARE USING IOT." International Journal of Engineering Applied Sciences and Technology 7, no. 3 (2022): 79–82. http://dx.doi.org/10.33564/ijeast.2022.v07i03.011.
Pełny tekst źródłaYusupovich, Aminov Zarif, and Kholikulov Anvar Nematovich. "Problems Of Economic Security Of Enterprises And The Main Directions Of Their Solution." American Journal of Management and Economics Innovations 3, no. 05 (2021): 80–85. http://dx.doi.org/10.37547/tajmei/volume03issue05-13.
Pełny tekst źródłaP., Balaji, Athisha L., Kalpana Sri K., Kaniga K., and Keerthana R. "Deep Learning Based Detecting Security System." Advancement in Image Processing and Pattern Recognition 8, no. 2 (2025): 38–44. https://doi.org/10.5281/zenodo.15517554.
Pełny tekst źródłaCieśla, Rafał. "Security measures in combating document falsifiers." Nowa Kodyfikacja Prawa Karnego 44 (December 29, 2017): 41–53. http://dx.doi.org/10.19195/2084-5065.44.4.
Pełny tekst źródłaBatra, Isha, Hatem S. A. Hamatta, Arun Malik, et al. "LLSFIoT: Lightweight Logical Security Framework for Internet of Things." Wireless Communications and Mobile Computing 2021 (August 18, 2021): 1–9. http://dx.doi.org/10.1155/2021/8526206.
Pełny tekst źródłaAlexander. P. "The emerging roles of Automation in safety and security." International Journal on Integrated Education 2, no. 1 (2020): 62–65. http://dx.doi.org/10.31149/ijie.v2i1.523.
Pełny tekst źródłaNeerav Nishant, Et al. "The Proposed Framework for Cloud Computing System Security and Privacy Services." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1197–205. http://dx.doi.org/10.17762/ijritcc.v11i9.9034.
Pełny tekst źródłaIbraj, Bajram, Mirela Alushllari, and Ferit Hysa. "Environmental Security, Environmental Crime and National Security." International Journal of Religion 5, no. 11 (2024): 4890–900. http://dx.doi.org/10.61707/1ky4w568.
Pełny tekst źródłaMehraj, Tehseen, Mir Aman Sheheryar, Sajaad Ahmed Lone, and A. H. Mir. "A critical insight into the identity authentication systems on smartphones." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (2019): 982. http://dx.doi.org/10.11591/ijeecs.v13.i3.pp982-989.
Pełny tekst źródłaTehseen, Mehraj, Aman Sheheryar Mir, Ahmed Lone Sajaad, and H. Mir A. "A critical insight into the identity authentication systems on smartphones." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (2019): 982–89. https://doi.org/10.11591/ijeecs.v13.i3.pp982-989.
Pełny tekst źródłaAjah, Ifeyinwa Angela. "Evaluation of Enhanced Security Solutions in 802.11-Based Networks." International Journal of Network Security & Its Applications (IJNSA) 6, no. 4 (2014): 29–42. https://doi.org/10.5281/zenodo.7077353.
Pełny tekst źródłaLi, Zuyu. "A secret image sharing solution for autonomous vehicles." Applied and Computational Engineering 4, no. 1 (2023): 447–55. http://dx.doi.org/10.54254/2755-2721/4/2023303.
Pełny tekst źródłaPhanindra, Tatineni Leela. "ML Based Solution to Refine Captcha." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47613.
Pełny tekst źródłaRafeequ, Ahmed Mabrook, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, and Hemalata Vasudavan. "ACJS: “Anti-Crypto Jacking System” Security Development." International Journal of Data Science and Advanced Analytics 4 (June 17, 2023): 105–12. http://dx.doi.org/10.69511/ijdsaa.v4i0.150.
Pełny tekst źródłaSilva, Josival, Nelson Rosa, and Fernando Aires. "UP-Home: A Self-Adaptive Solution for Smart Home Security." JUCS - Journal of Universal Computer Science 30, no. 4 (2024): 502–30. http://dx.doi.org/10.3897/jucs.107050.
Pełny tekst źródłaSilva, Josival, Nelson Rosa, and Fernando Aires. "UP-Home: A Self-Adaptive Solution for Smart Home Security." JUCS - Journal of Universal Computer Science 30, no. (4) (2024): 502–30. https://doi.org/10.3897/jucs.107050.
Pełny tekst źródłaYang, Guang Hong, Qing Zhang, Ding Yong Tang, and Cong Min Huang. "A Solution about Application System How to Transfer Information Across Different Domains." Applied Mechanics and Materials 190-191 (July 2012): 898–901. http://dx.doi.org/10.4028/www.scientific.net/amm.190-191.898.
Pełny tekst źródłaXing, Qianqian, Baosheng Wang, and Xiaofeng Wang. "BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution." Symmetry 10, no. 9 (2018): 408. http://dx.doi.org/10.3390/sym10090408.
Pełny tekst źródłaYao, Wei Wei, Liang Gong, and Xia Xu. "Design and Implementation of Security Network Optimization." Advanced Materials Research 977 (June 2014): 507–10. http://dx.doi.org/10.4028/www.scientific.net/amr.977.507.
Pełny tekst źródłaZaher, Mahmoud A., and Nabil M. Eldakhly. "Securing the Internet of Things (IoT) with Blockchain: A Proof-of-Concept Implementation and Analysis." Journal of Cybersecurity and Information Management 10, no. 2 (2022): 26–34. http://dx.doi.org/10.54216/jcim.100203.
Pełny tekst źródłaWashima Tuleun. "Design of an asterisk-based VoIP system and the implementation of security solution across the VoIP network." World Journal of Advanced Research and Reviews 23, no. 1 (2024): 875–906. http://dx.doi.org/10.30574/wjarr.2024.23.1.2048.
Pełny tekst źródłaWashima, Tuleun. "Design of an asterisk-based VoIP system and the implementation of security solution across the VoIP network." World Journal of Advanced Research and Reviews 23, no. 1 (2024): 875–906. https://doi.org/10.5281/zenodo.14792201.
Pełny tekst źródłaMehmood, Abid, Abdul Nasir Khan, Iynkaran Natgunanathan, Arslan Shafique, Iftikhar Ahmed Khan, and Atta ur Rehman Khan. "Enhanced lightweight and compromised-resilient image encryption for resource constrained environments." PLOS ONE 20, no. 3 (2025): e0320046. https://doi.org/10.1371/journal.pone.0320046.
Pełny tekst źródła