Literatura científica selecionada sobre o tema "Security solutions"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Security solutions".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Security solutions"

1

Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai, and Bhagyashri D. Dangewar. "Cloud Security: Problems and Solutions." International Journal of Scientific Research 3, no. 4 (2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Xu, Vincent. "Data Security Solutions." RESEARCH REVIEW International Journal of Multidisciplinary 05, no. 07 (2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Webb, K. W. "Biometric Security Solutions." IEEE Security and Privacy Magazine 3, no. 5 (2005): 7. http://dx.doi.org/10.1109/msp.2005.117.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

GOHOREANU, Bogdan, Florin SANDU, and Dan-Nicolae ROBU. "SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 1 (2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Nanuru Yagamurthy, Deepak, and Rajesh Azmeera. "Security Challenges and Solutions in Cloud Computing." International Journal of Science and Research (IJSR) 7, no. 8 (2018): 1690–93. http://dx.doi.org/10.21275/sr24517174709.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Li, Daoming, Qiang Chen, and Lun Wang. "Cloud Security: Challenges and Solutions." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 42–47. https://doi.org/10.5281/zenodo.12789566.

Texto completo da fonte
Resumo:
As cloud computing continues to grow and become integral to business operations, securing cloud environments has emerged as a critical concern. This paper explores the multifaceted challenges of cloud security and proposes solutions to mitigate these risks. We discuss the inherent vulnerabilities of cloud infrastructure, the complexities of data protection, and the difficulties in maintaining compliance and governance. Specifically, we address issues such as data breaches, insider threats, and the lack of visibility and control in cloud environments. Through comprehensive analysis and experime
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Anupama.H.S, M. Anusha, Joshi Aparna, N. Apoorva, K.Cauvery N., and Lingaraju.G.M. "Security Solutions Using Brain Signals." International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (2018): 105–10. https://doi.org/10.11591/ijai.v7.i2.pp105-110.

Texto completo da fonte
Resumo:
A brain computer interface is a direct neural interface or a brain–machine interface. It provides a communication path between human brain and the computer system. It aims to convey people's intentions to the outside world directly from their thoughts. This paper focuses on current model which uses brain signals for the authentication of users. The Electro-encephalogram (EEG) signals are recorded from the neuroheadset when a user is shown a key image (signature image). These signals are further processed and are interpreted to obtain the thought pattern of the user to match them to t
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Kenny, Peter. "Security and risk appraisal — EDIFACT security solutions." EDI in Finance 1991, no. 2 (1991): 4–7. https://doi.org/10.1016/0960-4634(91)90090-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Ranjana, Patel, and Arakh Rajendra. "Cyber Security Challenges & Their Solutions in India." International Journal of Trend in Research and Development 9, no. 1 (2022): 616–20. https://doi.org/10.5281/zenodo.6345325.

Texto completo da fonte
Resumo:
<strong><em>Abstract: </em></strong>Because the general population becomes increasingly progressively more and a lot of refined in their understanding and use of computers and because the technologies related to computing become more powerful, there&#39;s a robust chance that cybercrimes can become a lot of common. India is rated collectively of the countries with the very best levels of e-crime activities. Despite years of enhancements to the usability of interactive, end user facing security systems aboard a fast and sustained growth of law breaking, several of those security systems stay un
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Golchha, Prakhar, Rajesh Deshmukh, and Palak Lunia. "A Review on Network Security Threats and Solutions." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 21–24. https://doi.org/10.70729/ijser1567.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes

Teses / dissertações sobre o assunto "Security solutions"

1

Haenel, Arié. "Hybrid security solutions for IoT devices." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS022.

Texto completo da fonte
Resumo:
Il y a quelques années, un incident de cybersécurité aurait pu facilement être le scénario d'un film hollywoodien : des attaquants ont exploité un point d'entrée inattendu : un thermomètre intelligent dans l'aquarium du hall d'un casino. Cet objet connecté avait accès au réseau du casino, et les pirates ont réussi à le compromettre. Ils ont ensuite utilisé ce point d'entrée initial pour accéder à d'autres parties du réseau et ont finalement exfiltré 20 Go de données sensibles, y compris des informations sur les clients ”gros joueurs”.Cet exploit audacieux met en évidence la vulnérabilité des a
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Mustafa, Ali, Nasir Siddique, and Mubeen Zubair. "DATA LINK LAYER SECURITY PROBLEMS AND SOLUTIONS." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27574.

Texto completo da fonte
Resumo:
The Open Systems Interconnect Model (OSI) is a conceptual model of networking thatcategorizes network functions into seven layers. It is defined in this model that how layerscommunicate with each other. In this thesis, we address common Layer 2 attacks and theirsolutions. Layer 2 is considered a very weak link in a secure network. If the data is compromisedat Layer 2, it cannot be detected at other layers because each layer works without the knowledgeof other layers. We discuss Layer 2 weakness and vulnerability exploitation tools briefly. It isexplained how an attacker can exploit network by
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Alsaid, Adil. "Enhancing end user security : attacks and solutions." Thesis, Royal Holloway, University of London, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439012.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Bailey, Carmen F. "Analysis of security solutions in large enterprises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Ho, Sze-lok, and 何思樂. "Technical solutions for conducting investigations in digital age." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.

Texto completo da fonte
Resumo:
Confidentiality has always been a concern in secret operation. In this thesis, we consider the situation of legitimate data request and transfer between investigator and database owner who provides intelligence, where the identity of the investigation subject and the records in the database are both confidential. Current practice of secret investigation solely relies on the integrity and carefulness of the involved individuals to resist data leakage, but regulations, policy, agreement, such human means cannot give a promising solution, thus a technical means is needed. As appropriate solution
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Alexander, James. "Promoting security imaginaries : an analysis of the market for everyday security solutions." Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/promoting-security-imaginaries-an-analysis-of-the-market-for-everyday-security-solutions(1dc57433-40f6-40c1-bd13-56ab2347c35a).html.

Texto completo da fonte
Resumo:
This thesis is centred on the question of the effect security technologies, and the imaginaries associated with them, have on the formation of the present security doxa. With a more nuanced understanding of technology as process, and the role of imagination reintroduced into the nexus, this thesis aims to enable an understanding of how technological security solutions are deployed in everyday life and how this contributes to a reformulating of politics in a world gripped by anxiety about an uncertain future. Of primary interest is the way in which seemingly mundane technologies can enter the d
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Skaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Raza, Shahid. "Lightweight Security Solutions for the Internet of Things." Doctoral thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-18863.

Texto completo da fonte
Resumo:
The future Internet will be an IPv6 network interconnecting traditional computers and a large number of smart object or networks such as Wireless Sensor Networks (WSNs). This Internet of Things (IoT) will be the foundation of many services and our daily life will depend on its availability and reliable operations. Therefore, among many other issues, the challenge of implementing secure communication in the IoT must be addressed. The traditional Internet has established and tested ways of securing networks. The IoT is a hybrid network of the Internet and resource-constrained networks, and it is
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Hussein, Soran. "Lightweight Security Solutions for LTE/LTE-A Networks." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.

Texto completo da fonte
Resumo:
Récemment, le 3GPP (3rd Generation Partnership Project) a standardisé les systèmes LTE/LTE-A (Long Term Evolution/LTE-Advanced) qui ont été approuvés par l'UIT (Union Internationale des Télécommunications) comme des réseaux de télécommunications mobiles de 4éme génération. La sécurité est l'une des questions essentielles qui doivent être traitées avec soin pour protéger les informations de l'opérateur et des utilisateurs. Aussi, le 3GPP a normalisé plusieurs algorithmes et protocoles afin de sécuriser les communications entre les différentes entités du réseau. Cependant, l'augmentation du nive
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Lejaha, Retselisitsoe. "SDN based security solutions for multi-tenancy NFV." Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/24474.

Texto completo da fonte
Resumo:
The Internet continues to expand drastically as a result of explosion of mobile devices, content, server virtualization, and advancement of cloud services. This increase has significantly changed traffic patterns within the enterprise data centres. Therefore, advanced technologies are needed to improve traditional network deployments to enable them to handle the changing network patterns. Software defined networks (SDN) and network function virtualisation (NFV) are innovative technologies that enable network flexibility, increase network and service agility, and support service-driven virtual
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes

Livros sobre o assunto "Security solutions"

1

Hruska, Jan. Computer security solutions. Blackwell Scientific, 1990.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

M, Jackson Keith, ed. Computer security solutions. CRC Press, 1990.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Hruska, Jan. Computer security solutions. Blackwell Scientific, 1990.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Mueller, John Paul. .NET Development Security Solutions. John Wiley & Sons, Ltd., 2006.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Inc, NetLibrary, ed. Designing security architecture solutions. John Wiley, 2002.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Associated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. The Associated Chambers of Commerce and Industry of India, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

International Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 5th ed. IBM, International Technical Support Organization, 2007.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

International Business Machines Corporation. International Technical Support Organization., ed. Enterprise security architecture using IBM Tivoli security solutions. 3rd ed. IBM, International Technical Support Organization, 2006.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Sarkar, Atanu, Suman Ranjan Sensarma, and Gary W. vanLoon, eds. Sustainable Solutions for Food Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-77878-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Mason, Andrew G. Cisco secure Internet security solutions. Cisco Press, 2001.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Mais fontes

Capítulos de livros sobre o assunto "Security solutions"

1

Versluis, Gerald, and Steven Thewissen. "Network and Security." In Xamarin.Forms Solutions. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4134-9_4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Schreck, Jörg. "Solutions for Security." In Security and Privacy in User Modeling. Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-017-0377-2_8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Stevens, Alex. "Implementing Security Solutions." In Enterprise Fortress. CRC Press, 2025. https://doi.org/10.1201/9781003585923-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Widdowson, Amanda. "Mitigating solutions." In Humans and Cyber Security. CRC Press, 2025. https://doi.org/10.1201/9781003427681-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Li, Bin, and David Zhang. "Signature Security System for E-Commerce." In Biometric Solutions. Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Khairallah, Michael. "Presenting the Solutions." In Physical Security Assessment Handbook, 2nd ed. CRC Press, 2024. http://dx.doi.org/10.4324/9781003490432-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Morton, Adam. "Managing Security and Access Control." In Mastering Snowflake Solutions. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8029-4_4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

McDonald, Connor, Chaim Katz, Christopher Beck, Joel R. Kallman, and David C. Knox. "Security Packages." In Mastering Oracle PL/SQL: Practical Solutions. Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0702-3_8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Ling, Lee Luan, and Miguel Gustavo Lizárraga. "Biometrics on the Internet: Security Applications and Services." In Biometric Solutions. Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

You, Jane, and David Zhang. "Web Guard: A Biometrics Identification System for Network Security." In Biometric Solutions. Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Security solutions"

1

Tatarka, Slavomír, Michal Janovec, and Jozef Papán. "IoT Security Threats and Solutions." In 2024 International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2024. https://doi.org/10.1109/iceta63795.2024.10850844.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Aftabjahani, Sohrab, and Wilson Pradeep. "Security Verification and Secure Testing Solutions." In 2025 IEEE 43rd VLSI Test Symposium (VTS). IEEE, 2025. https://doi.org/10.1109/vts65138.2025.11022775.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Apiecionek, Łukasz. "Fuzzy Network Solutions for IoT Security." In IEEE EUROCON 2025 - 21st International Conference on Smart Technologies. IEEE, 2025. https://doi.org/10.1109/eurocon64445.2025.11073458.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Harshavardhan, H., Sanjana Madi, Shivaleela Kalasad, Sameeksha Shetty, and Vaibhavi Malemath. "Ensuring Data Security in the Cloud: Emerging Security Challenges and Solutions." In 2025 International Conference on Multi-Agent Systems for Collaborative Intelligence (ICMSCI). IEEE, 2025. https://doi.org/10.1109/icmsci62561.2025.10894030.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Jasser, Stefanie, and Matthias Riebisch. "Reusing security solutions." In ECSAW '16: European Conference on Software Architecture Workshops. ACM, 2016. http://dx.doi.org/10.1145/2993412.3007556.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Fischer, D., B. Markscheffel, and T. Seyffarth. "Smartphone security: Overview of security software solutions." In 2013 IEEE Third International Conference on Information Science and Technology (ICIST). IEEE, 2013. http://dx.doi.org/10.1109/icist.2013.6747557.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Fischer, D., B. Markscheffel, and T. Seyffarth. "Smartphone security: Overview of security software solutions." In 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2013. http://dx.doi.org/10.1109/icitst.2013.6750208.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Spitz, Stephan, and Alexander Lawall. "Silicon-Integrated Security Solutions Driving IoT Security." In 10th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2024. http://dx.doi.org/10.5220/0012350200003648.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Habbak, Hany, Khaled Metwally, and Ahmed Maher Mattar. "Securing Big Data: A Survey on Security Solutions." In 2022 13th International Conference on Electrical Engineering (ICEENG). IEEE, 2022. http://dx.doi.org/10.1109/iceeng49683.2022.9781955.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Adibi, S. "Comparative mobile platforms security solutions." In 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2014. http://dx.doi.org/10.1109/ccece.2014.6900963.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Relatórios de organizações sobre o assunto "Security solutions"

1

Mbemba, Augustin. Central Africa: Salient Security Issues and Uncertain Political Solutions. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada522104.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Howell, Gema. Security Analysis of IoT Management Solutions for First Responders. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.tn.2223.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Boyens, Chantel, and Jack Smalligan. Social Security Customer Service Challenges: Causes, Impacts, and Solutions. AARP Public Policy Institute, 2024. http://dx.doi.org/10.26419/ppi.00239.001.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Pudelek, Jessie, and Kevin Hill. End-User Security: A Cornerstone of Defense-in-Depth Cybersecurity Solutions. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1524811.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Ward, Heather, and Sarah Brown. GNSI Decision Brief: Beyond Intervention: Sustainable Solutions for Haiti’s Security Needs. Global and National Security Institute, 2024. http://dx.doi.org/10.5038/nlry9529.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Šulus, Vytautas, and Pavel Voitkun. Prototype of the Electronic Voting System. Security Implementations Using Database Facilities. Vilnius Business College, 2024. https://doi.org/10.57005/ab.2024.3.4.

Texto completo da fonte
Resumo:
Electronic Voting Systems (EVS) has become more popular and has progressed despite many concerns about auditing and transparency. Authors present a technical solution for a prototype of a possible EVS. This prototype, with additional improvements, could be used as an EVS in Lithuania and other countries worldwide. This article is intended to show how EVS requirements relate to software solutions using open-source products.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Schulzrinne, H., E. Marocco, and E. Ivov. Security Issues and Solutions in Peer-to-Peer Systems for Realtime Communications. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5765.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Talebian, Sara, Frida Lager, and Katy Harris. Solutions for managing food security risks in a rapidly changing geopolitical landscape. Stockholm Environment Institute, 2024. http://dx.doi.org/10.51414/sei2024.044.

Texto completo da fonte
Resumo:
The authors adopt a geopolitical lens to better understand policy responses to food insecurities under reversal of global integration and weakening multilateralism. They specifically focus on transboundary climate risks to food production and trade: how climate impacts on agriculture can generate cascading effects through international trade and global supply chains to catalyse risks to countries worldwide.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Texto completo da fonte
Resumo:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Gopalan, Sundararajan Srinivasa, Rajesh Bhatia, Sonalini Khetrapal, and Sungsup Ra. Addressing Nutrition Security in Urban India through Multisectoral Action. Asian Development Bank, 2022. http://dx.doi.org/10.22617/wps220057-2.

Texto completo da fonte
Resumo:
It describes malnutrition’s impact on health and nonhealth sectors, identifies key determinants, and offers specific solutions according to the local contexts in various urban areas. The recommendations go beyond examining the health sector and take into account water supply, sanitation, sociocultural factors, food supply, and other issues affecting urban nutrition in India.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!