Siga este link para ver outros tipos de publicações sobre o tema: Security solutions.

Artigos de revistas sobre o tema "Security solutions"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Security solutions".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai, and Bhagyashri D. Dangewar. "Cloud Security: Problems and Solutions." International Journal of Scientific Research 3, no. 4 (2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Xu, Vincent. "Data Security Solutions." RESEARCH REVIEW International Journal of Multidisciplinary 05, no. 07 (2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Webb, K. W. "Biometric Security Solutions." IEEE Security and Privacy Magazine 3, no. 5 (2005): 7. http://dx.doi.org/10.1109/msp.2005.117.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

GOHOREANU, Bogdan, Florin SANDU, and Dan-Nicolae ROBU. "SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 1 (2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Nanuru Yagamurthy, Deepak, and Rajesh Azmeera. "Security Challenges and Solutions in Cloud Computing." International Journal of Science and Research (IJSR) 7, no. 8 (2018): 1690–93. http://dx.doi.org/10.21275/sr24517174709.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Li, Daoming, Qiang Chen, and Lun Wang. "Cloud Security: Challenges and Solutions." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 42–47. https://doi.org/10.5281/zenodo.12789566.

Texto completo da fonte
Resumo:
As cloud computing continues to grow and become integral to business operations, securing cloud environments has emerged as a critical concern. This paper explores the multifaceted challenges of cloud security and proposes solutions to mitigate these risks. We discuss the inherent vulnerabilities of cloud infrastructure, the complexities of data protection, and the difficulties in maintaining compliance and governance. Specifically, we address issues such as data breaches, insider threats, and the lack of visibility and control in cloud environments. Through comprehensive analysis and experime
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Anupama.H.S, M. Anusha, Joshi Aparna, N. Apoorva, K.Cauvery N., and Lingaraju.G.M. "Security Solutions Using Brain Signals." International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (2018): 105–10. https://doi.org/10.11591/ijai.v7.i2.pp105-110.

Texto completo da fonte
Resumo:
A brain computer interface is a direct neural interface or a brain–machine interface. It provides a communication path between human brain and the computer system. It aims to convey people's intentions to the outside world directly from their thoughts. This paper focuses on current model which uses brain signals for the authentication of users. The Electro-encephalogram (EEG) signals are recorded from the neuroheadset when a user is shown a key image (signature image). These signals are further processed and are interpreted to obtain the thought pattern of the user to match them to t
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Kenny, Peter. "Security and risk appraisal — EDIFACT security solutions." EDI in Finance 1991, no. 2 (1991): 4–7. https://doi.org/10.1016/0960-4634(91)90090-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Ranjana, Patel, and Arakh Rajendra. "Cyber Security Challenges & Their Solutions in India." International Journal of Trend in Research and Development 9, no. 1 (2022): 616–20. https://doi.org/10.5281/zenodo.6345325.

Texto completo da fonte
Resumo:
<strong><em>Abstract: </em></strong>Because the general population becomes increasingly progressively more and a lot of refined in their understanding and use of computers and because the technologies related to computing become more powerful, there&#39;s a robust chance that cybercrimes can become a lot of common. India is rated collectively of the countries with the very best levels of e-crime activities. Despite years of enhancements to the usability of interactive, end user facing security systems aboard a fast and sustained growth of law breaking, several of those security systems stay un
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Golchha, Prakhar, Rajesh Deshmukh, and Palak Lunia. "A Review on Network Security Threats and Solutions." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 21–24. https://doi.org/10.70729/ijser1567.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Singh Gurjit Singh, Sahibdeep. "Microservices Security Challenges and Solutions in Cloud Environment." International Journal of Science and Research (IJSR) 13, no. 3 (2024): 201–5. http://dx.doi.org/10.21275/sr24303144734.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Nabeel, Zanoon, Albdour Nashat, S. A. Hamatta Hatem, and Al-Tarawneh RashaMoh'd. "SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND SECURITY SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (2015): 01–13. https://doi.org/10.5281/zenodo.8162659.

Texto completo da fonte
Resumo:
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute challenges and weaknesses before the security progress in MANET network. It causes weakness in security, which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between them will be concluded and architectural security solutions in MANET will beproposed. &nbsp;
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

WEBER, CYNTHIA, and MARK LACY. "Securing by design." Review of International Studies 37, no. 3 (2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.

Texto completo da fonte
Resumo:
AbstractThis article investigates how modern neo-liberal states are ‘securing by design’ – harnessing design to new technologies in order to produce security, safety, and protection. We take a critical view toward ‘securing by design’ and the policy agendas it produces of ‘designing out insecurity’ and ‘designing in protection’ because securing by design strategies rely upon inadequate conceptualisations of security, technology, and design and inadequate understandings of their relationships to produce inadequate ‘security solutions’ to ready-made ‘security problems’. This critique leads us to
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Mittal, Himani. "Software security: Threats, solutions and challenges." Computer Software and Media Applications 6, no. 1 (2024): 3769. http://dx.doi.org/10.24294/csma.v6i1.3769.

Texto completo da fonte
Resumo:
Software security is of great concern as computers have entered almost all walks of life and people at large have become dependent on technology for not only entertainment and communication but for performing tasks involving money and a lot of stake. Software security not only involves securing the software but also user data and communication media. This paper states the several types of security threats that exist since the time networking has evolved, namely, malware, Trojans, viruses, denial of service attacks, and many more. This paper reviews several measures to address these threats. It
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Madhavi, Dhingra. "BYOD SECURITY AND ITS POSSIBLE SOLUTIONS." INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH 5, no. 2 :SE (2018): 101–6. https://doi.org/10.5281/zenodo.1200272.

Texto completo da fonte
Resumo:
BYOD (Bring your own Device) is a piece of its bigger pattern consumerization, in which purchaser programming and equipment are being brought into the undertaking. BYOT (bring your own particular innovation) alludes to the utilization of customer gadgets and applications in the workplace. An powerful BYOD procedure can prompt various advantages for organizations, including enhanced representative employment fulfillment, expanded occupation proficiency and adaptability. BYOD can likewise give cost reserve funds from starting gadget buy to on-going use and IT helpdesk bolster as representatives
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

GEANĂ, Ionuţ Cătălin. "Security Solutions for Informatics Systems." International Journal of Information Security and Cybercrime 1, no. 2 (2012): 17–24. http://dx.doi.org/10.19107/ijisc.2012.02.02.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Dhiman, Deepika. "WLAN Security Issues and Solutions." IOSR Journal of Computer Engineering 16, no. 1 (2014): 67–75. http://dx.doi.org/10.9790/0661-16146775.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Fausett, Crystal M., Megan P. Christovich, Jarod M. Parker, John M. Baker, and Joseph R. Keebler. "Telemedicine Security: Challenges and Solutions." Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, no. 1 (2021): 340–44. http://dx.doi.org/10.1177/2327857921101241.

Texto completo da fonte
Resumo:
The proliferation of telemedicine spurred by the COVID-19 pandemic has come with a variety of human factors challenges. Such challenges include mitigating potential risks associated with the quick transition to virtual care. We identify challenges and solutions related to telemedicine security, and analyze our results using Schlarman’s People, Policy, Technology framework (2001). Our systematic literature review synthesizes gray literature (white papers, news articles, and blog posts) in addition to formal (published) literature. This methodology closes the gap between academic research and pr
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Trubilin, Alexander Ivanovich, Konstantin Eduardovich Tyupakov, and Alexander Alexandrovich Adamenko. "Food security: problems and solutions." Proceedings of the Kuban State Agrarian University, no. 90 (2021): 5–10. http://dx.doi.org/10.21515/1999-1703-90-5-10.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Yaacob, Mashkuri, Farhat Anwar, Rashidah Funke Olanrewaju, Burhan Ul Islam Khan, and Roohie Naaz Mir. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.10026783.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Khan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Farhat Anwar, Roohie Naaz Mir, and Mashkuri Yaacob. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.105180.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Smith, Robert E. "Proactive Solutions for Multinetwork Security." Information Systems Security 3, no. 2 (1994): 47–55. http://dx.doi.org/10.1080/10658989409342456.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Norifusa, Masaya. "Internet security: difficulties and solutions." International Journal of Medical Informatics 49, no. 1 (1998): 69–74. http://dx.doi.org/10.1016/s1386-5056(98)00012-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Hancock, Bill. "Network Solutions Re-evaluates Security." Computers & Security 19, no. 5 (2000): 398–400. http://dx.doi.org/10.1016/s0167-4048(00)05018-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Reid, Linda. "Information Security: Risks and Solutions." Journal of Information Privacy and Security 2, no. 1 (2006): 1–2. http://dx.doi.org/10.1080/15536548.2006.10855782.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

H.S, Anupama, Anusha M, Aparna Joshi, Apoorva N, N. K. Cauvery, and Lingaraju G.M. "Security Solutions Using Brain Signals." IAES International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (2018): 105. http://dx.doi.org/10.11591/ijai.v7.i2.pp105-110.

Texto completo da fonte
Resumo:
A Brain Computer Interface is a direct neural interface or a brain–machine interface. It provides a communication path between human brain and the computer system. It aims to convey people's intentions to the outside world directly from their thoughts. This paper focuses on current model which uses brain signals for the authentication of users. The Electro- Encephalogram (EEG) signals are recorded from the neuroheadset when a user is shown a key image (signature image). These signals are further processed and are interpreted to obtain the thought pattern of the user to match them to the stored
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Potdar, Aarti, Pranav Patil, Raunak Bagla, and Rohitashwa Pandey. "Security Solutions for Cloud Computing." International Journal of Computer Applications 128, no. 16 (2015): 17–21. http://dx.doi.org/10.5120/ijca2015906747.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Phithakkitnukoon, Santi, Ram Dantu, and Enkh-Amgalan Baatarjav. "VoIP Security — Attacks and Solutions." Information Security Journal: A Global Perspective 17, no. 3 (2008): 114–23. http://dx.doi.org/10.1080/19393550802308618.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Barki, Amira, Abdelmadjid Bouabdallah, Said Gharout, and Jacques Traore. "M2M Security: Challenges and Solutions." IEEE Communications Surveys & Tutorials 18, no. 2 (2016): 1241–54. http://dx.doi.org/10.1109/comst.2016.2515516.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Puri, Kunal Pradeep. "Cyber Security Challenges and Solutions." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 49–50. http://dx.doi.org/10.22214/ijraset.2024.57793.

Texto completo da fonte
Resumo:
Abstract: This article discusses the challenges and opportunities in the field of Cyber Physical Systems (CPSs). It highlights the integration of the physical and digital realms in CPSs and the increasing importance of security in this context. The article provides an overview of the challenges faced by CPSs and suggests potential solutions to address them. It emphasizes the need for preventive measures, coordination, lightweight solutions, and early-stage verification to enhance the security and effectiveness of CPSs.
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Puri, Kunal Pradeep. "Cyber Security Challenges and Solutions." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 49–50. http://dx.doi.org/10.22214/ijraset.2023.57793.

Texto completo da fonte
Resumo:
Abstract: This article discusses the challenges and opportunities in the field of Cyber Physical Systems (CPSs). It highlights the integration of the physical and digital realms in CPSs and the increasing importance of security in this context. The article provides an overview of the challenges faced by CPSs and suggests potential solutions to address them. It emphasizes the need for preventive measures, coordination, lightweight solutions, and early-stage verification to enhance the security and effectiveness of CPSs.
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Zidanšek, Aleksander. "Creative Solutions for Human Security." Science, Art and Religion 3, no. 1--2 (2024): 62–65. http://dx.doi.org/10.5005/jp-journals-11005-0069.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Zamir, Islomovich Jumakulov. "FOOD SECURITY: PROBLEMS AND SOLUTIONS." INTERNATIONAL BULLETIN OF APPLIED SCIENCE AND TECHNOLOGY 3, no. 5 (2023): 178–82. https://doi.org/10.5281/zenodo.7898608.

Texto completo da fonte
Resumo:
Today, environmental and other problems such as drought, desertification and water scarcity threaten food security throughout the planet. The article focuses on the essence of the concept of food safety and the main directions of state policy to ensure it.
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Tiwari, Aniket Rajkumar. "Securing the Cloud: Overcoming Challenges and Implementing Solutions for Effective Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 5100–5111. http://dx.doi.org/10.22214/ijraset.2024.62772.

Texto completo da fonte
Resumo:
Abstract: “This research paper provides a sufficient overview of security challenges in cloud computing and corresponding solutions. Challenges include data breaches, compliance issues, and insider threats, while solutions encompass robust access controls, encryption, and API security measures. By implementing these solutions, organizations can mitigate risks and securely harness the advantages of cloud computing.”
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Manohar Ghag, Omkar. "Firmware Security in Connected Electric Vehicles: Challenges and Solutions." International Journal of Science and Research (IJSR) 12, no. 10 (2023): 2137–39. https://doi.org/10.21275/sr24302010944.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Zakarya, Muhammad, Muazzam Ali Khattak, Izaz Ur Rahman, and Ayaz Ali Khan. "Grid High Availability and Service Security Issues with Solutions." International Journal of Engineering and Technology 4, no. 6 (2012): 723–29. http://dx.doi.org/10.7763/ijet.2012.v4.472.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Singh, Mandeep, Rajat Tyagi, Shivam Rathore, Pratyaksh Yadav, and Saksham Singh. "Decentralized Blockchain Solutions for Enhanced Document Security in Healthcare." International Journal of Research Publication and Reviews 5, no. 5 (2024): 12647–52. http://dx.doi.org/10.55248/gengpi.5.0524.1446.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Kim, JiHoon, Jong In Lim, and Huy Kang Kim. "Collaborative security response by interworking between multiple security solutions." Journal of the Korea Institute of Information Security and Cryptology 23, no. 1 (2013): 69–79. http://dx.doi.org/10.13089/jkiisc.2013.23.1.069.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Piyushi, Gulati, Kumari Rana Kamini, Raghuvanshi Surabhi, and Anupama Pankaj Dr. "Android Operating System and its Security Issues." Journal of Android and IOS Applications and Testing 4, no. 1 (2019): 1–9. https://doi.org/10.5281/zenodo.2605874.

Texto completo da fonte
Resumo:
<em>Android is a Mobile and Tablet Operating System </em><em>premised on </em><em>the Linux kernel owned by Google. The ultimate innovative feature of Android Operating System is open source due to this anyone can publish their applications freely on the Android market. This openness introduces the broad number of developers which utilize this platform, but it comes with the hazard that user may download malicious software which is written by network hackers and harm to its privacy. This requires the study of the Security Mechanisms for Android and to make it easy and user-friendly to make the
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Malipeddi, Anil Kumar, and Sreekanth Pasunuru. "Securing DevOps CI/CD pipelines with Agent-Based and Agentless Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01319.

Texto completo da fonte
Resumo:
As organizations increasingly adopt containerized applications and Continuous Integration/Continuous Deployment (CI/CD) pipelines, managing and securing secrets becomes critical to maintaining robust security. CI/CD pipelines are critical to modern software development, enabling rapid delivery of software updates. However, these pipelines often handle sensitive secrets such as credentials, API keys, and tokens, making them an attractive target for adversaries. This paper explores two distinct approaches to secrets management in DevOps environments: agent- based solutions, such as CyberArk Cred
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

BS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.

Texto completo da fonte
Resumo:
The process of defending computer networks from cyber attacks or unintended, unauthorized access is known as cyber security. Organizations, businesses, and governments need cyber security solutions because cyber criminals pose a threat to everyone. Artificial intelligence promises to be a great solution for this. Security experts are better able to defend vulnerable networks and data from cyber attackers by combining the strengths of artificial intelligence and cyber security. This paper provides an introduction to the use of artificial intelligence in cyber security. AI-driven cyber security
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Sonali Pandurang Doifode and Vishnukant Madhukar Biradar. "Cybersecurity in the Internet of Things (IoT): Challenges and Solutions." International Journal of Scientific Research in Modern Science and Technology 3, no. 7 (2024): 17–21. http://dx.doi.org/10.59828/ijsrmst.v3i7.222.

Texto completo da fonte
Resumo:
The IOT is changing the way we communicate and interact across businesses, enabling unprecedented productivity, efficiency, and data storage simulation. Development of IOT has brought many benefits but also significant challenges to network security. This article explores the key challenges in securing IoT environments, including device diversity, limited budgets, lack of security protocols, and vulnerability of transmitted information. Evaluate solutions such as the use of lightweight encryption algorithms, zerotrust architectures, and AI driven security systems to assess their potential effe
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

POPESCU, Eliza-Elena. "VoIP Security Threats." International Journal of Information Security and Cybercrime 13, no. 1 (2024): 66–70. http://dx.doi.org/10.19107/ijisc.2024.01.06.

Texto completo da fonte
Resumo:
Nowadays, communication is based on a wide variety of solutions, especially using the real-time ones. People use a lot of online tools that offer them audio-video solutions, and the most important thing is that anyone has access to them, and there are easy to use. VoIP (Voice over IP) is one of the most used solutions today, with which everyone can make calls over the internet. Like any other service that is exposed to the internet, it presents risks for the data violation and administrators or any people that use this service, needs to secure the system.
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Gaurav Malik and Prashasti. "Blockchain security- security challenges and solutions for decentralized systems and cryptocurrencies." International Journal of Science and Research Archive 9, no. 2 (2023): 1074–100. https://doi.org/10.30574/ijsra.2023.9.2.0515.

Texto completo da fonte
Resumo:
Blockchain technology is a chain of blocks formed using cryptography on multiple computers. It keeps a list of distributed transactions and ensures it is transparent, immutable, and hard to manipulate. Blockchain’s inherent security features would strengthen its build, including cryptographic hashing, consensus algorithms, and immutability. However, it is also highly exposed and vulnerable to several threats. In decentralized systems and cryptocurrencies, blockchain security is a crucial point of security to protect from attacks on systems, data breaches, and financial loss. Challenges in the
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Fotiou and Polyzos. "Name-Based Security for Information-Centric Networking Architectures." Future Internet 11, no. 11 (2019): 232. http://dx.doi.org/10.3390/fi11110232.

Texto completo da fonte
Resumo:
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice. For this paper, we designed and evaluated name-based security solutions that satisfy security requirements that are particular to ICN architectures. In order to achieve our goal, we leverage identity-based encryption, identity-based proxy re-encryption, and the emerging paradigm of decentralized identifiers. Our solutions support outsourcing content storage, content integrity protection and content authentication, and pr
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Chen, Qiang, Daoming Li, and Lun Wang. "Network Security in the Internet of Things (IoT) Era." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 36–41. https://doi.org/10.5281/zenodo.12789562.

Texto completo da fonte
Resumo:
The Internet of Things (IoT) represents a significant transformation in how devices communicate and interact, offering unprecedented convenience and efficiency. However, this interconnected environment also introduces substantial security challenges. Traditional network security measures are often inadequate for IoT environments due to their unique characteristics, such as resource constraints and diverse device types. This paper explores the current state of network security in the IoT era, examines the specific challenges posed by IoT environments, and presents innovative solutions and best
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Brown, Michael G., and Paolina Centonze. "Exploiting Flaws in Big Data Systems." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (2016): 6967–75. http://dx.doi.org/10.24297/ijct.v15i8.1498.

Texto completo da fonte
Resumo:
In this journal we discuss the relevant security threats, vulnerabilities and prominent techniques to securing data lake. Over the last few years, Big Data solutions to data processing have made remarkable strides in the how we interpret data. Because of its ubiquitous nature and ability to handle various data types, it has become a valuable tool and asset to many other fields including bioinformatics solutions, marketing solutions, and social media. Ethical infractions also play a role in data processing and because of this, it is critical that comprehensive security solutions are determined
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

N, Dr Chitra Kiran, Mr Suhas Suresh, and Mrs Suchira Suresh. "Vulnerability, threats, and attacks in E-Payments System: Security Solutions." International Journal of Psychosocial Rehabilitation 24, no. 04 (2020): 829–39. http://dx.doi.org/10.37200/ijpr/v24i4/pr201056.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Singh, Dr Shashank. "Enhancing Safety and Security in Autonomous Cars: Challenges and Solutions." International Journal of Research Publication and Reviews 5, no. 2 (2024): 745–49. http://dx.doi.org/10.55248/gengpi.5.0224.0429.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Chhikara, Shashi, Iti Raghav, and Nitasha Hasteer. "Analyzing Security Solutions in Cloud Computing." International Journal of Computer Applications 68, no. 25 (2013): 17–21. http://dx.doi.org/10.5120/11750-7247.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!