Zeitschriftenartikel zum Thema „Security control framework“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Security control framework" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Kumar, Harsh. "Cloud Compliance Security Optimization." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49485.
Der volle Inhalt der QuelleWang, Yu Fei, Tao Zhang, Yuan Yuan Ma, and Bo Zhang. "An Information Security Assessments Framework for Power Control Systems." Advanced Materials Research 805-806 (September 2013): 980–84. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.980.
Der volle Inhalt der QuelleAl Ketbi, Maitha, Khaled Shuaib, Ezedin Barka, and Marton Gergely. "Establishing a Security Control Framework for Blockchain Technology." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 307–30. http://dx.doi.org/10.28945/4837.
Der volle Inhalt der QuelleAbdulrahman, H. Altalhi1 Zailani Mohamed Sidek2 Norjihan Abdul Ghani3 Fazidah Othman4 and Maged Abdelkhaleq Al-Sheshtawil5. "ENHANCING THE SECURITY FRAMEWORK SECURECLOUD WITH THE SWIFT IDENTITY MANAGEMENT FRAMEWORK." International Journal on Cloud Computing: Services and Architecture(IJCCSA) 2, February (2018): 01–07. https://doi.org/10.5281/zenodo.1444289.
Der volle Inhalt der QuelleJi, Kaining, Yitian Liu, and Changju Hu. "Design of Security Control Framework for Power System Microservices." Advances in Engineering Technology Research 13, no. 1 (2025): 777. https://doi.org/10.56028/aetr.13.1.777.2025.
Der volle Inhalt der QuelleKumar, Anurag, and Prof Bibha Kumari. "Implementing Privacy Preserving Techniques in Distributed Big Data Framework on Cloud Computing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem37051.
Der volle Inhalt der QuelleYogesh Kumar Bhardwaj. "Securing Generative AI: Navigating Data Security Challenges in the AI Era." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 147–55. https://doi.org/10.32996/jcsts.2025.7.4.17.
Der volle Inhalt der QuelleAlshammari, Ahmad. "A Novel Security Framework to Mitigate and Avoid Unexpected Security Threats in Saudi Arabia." Engineering, Technology & Applied Science Research 13, no. 4 (2023): 11445–50. http://dx.doi.org/10.48084/etasr.6091.
Der volle Inhalt der QuelleXu, Mudi, Benfeng Chen, Zhizhong Tan, et al. "AHAC: Advanced Network-Hiding Access Control Framework." Applied Sciences 14, no. 13 (2024): 5593. http://dx.doi.org/10.3390/app14135593.
Der volle Inhalt der QuelleKalwani, Seema. "Quality Framework, Principles, control practices, benchmark, internal controls addressing needs of current world." International Journal of Multidisciplinary Research and Growth Evaluation 2, no. 4 (2021): 919–26. https://doi.org/10.54660/.ijmrge.2021.2.4.919-926.
Der volle Inhalt der QuelleTalha, Mohamed, and Anas Abou El Kalam. "Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms." JUCS - Journal of Universal Computer Science 27, no. 12 (2021): 1300–1324. http://dx.doi.org/10.3897/jucs.77046.
Der volle Inhalt der QuelleTalha, Mohamed, and El Kalam Anas Abou. "Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms." JUCS - Journal of Universal Computer Science 27, no. (12) (2021): 1300–1324. https://doi.org/10.3897/jucs.77046.
Der volle Inhalt der QuelleNazmul, Hossain* Md. Alam Hossain Taposh Das Md. Tariqul Islam. "MEASURING THE CYBER SECURITY RISK ASSESSMENT METHODS FOR SCADA SYSTEM." Global Journal of Engineering Science and Research Management 4, no. 7 (2017): 1–12. https://doi.org/10.5281/zenodo.824955.
Der volle Inhalt der QuellePradeep, Kumar. "Vault Security Framework Optimization for Improved Throughput and Security." International Journal of Leading Research Publication 4, no. 4 (2023): 1–29. https://doi.org/10.5281/zenodo.15026485.
Der volle Inhalt der QuelleOladeji, Ifedayo, Ramon Zamora, and Tek Tjing Lie. "An Online Security Prediction and Control Framework for Modern Power Grids." Energies 14, no. 20 (2021): 6639. http://dx.doi.org/10.3390/en14206639.
Der volle Inhalt der QuelleOladeji, Ifedayo, Ramon Zamora, and Tek Tjing Lie. "An Online Security Prediction and Control Framework for Modern Power Grids." Energies 14, no. 20 (2021): 6639. http://dx.doi.org/10.3390/en14206639.
Der volle Inhalt der QuelleLu, Bo, Ruohan Cao, Luyao Tian, Hao Wang, and Yueming Lu. "FMNISCF: Fine-Grained Multi-Domain Network Interconnection Security Control Framework." Applied Sciences 10, no. 1 (2020): 409. http://dx.doi.org/10.3390/app10010409.
Der volle Inhalt der QuellePark, Jong. "USF-PAS : Study on Core Security Technologies for Ubiquitous Security Framework." JUCS - Journal of Universal Computer Science 15, no. (5) (2009): 1065–80. https://doi.org/10.3217/jucs-015-05-1065.
Der volle Inhalt der QuelleKang, Jeong Hwa, and Minhye Seo. "Enhanced Authentication for Decentralized IoT Access Control Architecture." Cryptography 7, no. 3 (2023): 42. http://dx.doi.org/10.3390/cryptography7030042.
Der volle Inhalt der QuelleCHEN, TSUNG-YI. "A MULTIPLE-LAYER KNOWLEDGE MANAGEMENT SYSTEM FRAMEWORK CONSIDERING USER KNOWLEDGE PRIVILEGES." International Journal of Software Engineering and Knowledge Engineering 19, no. 03 (2009): 361–87. http://dx.doi.org/10.1142/s0218194009004192.
Der volle Inhalt der QuelleJamieson, Rodger, and Graham Low. "Local Area Network Operations: A Security, Control and Audit Perspective." Journal of Information Technology 5, no. 2 (1990): 63–72. http://dx.doi.org/10.1177/026839629000500202.
Der volle Inhalt der QuelleAws, Hamed Hamad, Yousif Dawod Adnan, Fakhrulddin Abdulqader Mohammed, Al_Barazanchi Israa, and Muwafaq Gheni Hassan. "A secure sharing control framework supporting elastic mobile cloud computing." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 2270–77. https://doi.org/10.11591/ijece.v13i2.pp2270-2277.
Der volle Inhalt der QuelleDinesh, Thangaraju. "Integrated Security Control Platforms: A Unified Framework for Enterprise Data Protection and Compliance." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–11. https://doi.org/10.5281/zenodo.15087110.
Der volle Inhalt der QuelleWai, Eric, and C. K. M. Lee. "Seamless Industry 4.0 Integration: A Multilayered Cyber-Security Framework for Resilient SCADA Deployments in CPPS." Applied Sciences 13, no. 21 (2023): 12008. http://dx.doi.org/10.3390/app132112008.
Der volle Inhalt der QuelleUgbaja, Unomah Success, Uloma Stella Nwabekee, Wilfred Oseremen Owobu, and Olumese Anthony Abieba. "Conceptual Framework for Role-Based Network Access Management to Minimize Unauthorized Data Exposure Across IT Environments." International Journal of Social Science Exceptional Research 2, no. 1 (2023): 211–21. https://doi.org/10.54660/ijsser.2023.2.1.211-221.
Der volle Inhalt der QuelleAmarendra Reddy, P., Sheikh Gouse, and P. Bhaskara Reddy. "Security and Privacy Mechanisms of Big Data." International Journal of Engineering & Technology 7, no. 4.39 (2018): 730–33. http://dx.doi.org/10.14419/ijet.v7i4.39.26264.
Der volle Inhalt der QuelleMehra, Taresh. "The Evolution of Backup Security: Integrating Zero Trust, Encryption, and Access Control for Data Integrity." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem41976.
Der volle Inhalt der QuelleAruljothi, A., N. Prabhu, and N. M. Mallika. "Network Security Based on Component for Information Network." Asian Journal of Computer Science and Technology 8, S1 (2019): 15–17. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1986.
Der volle Inhalt der QuelleHu, An Ming. "The Application Research of Lightweight J2EE Security Framework." Advanced Materials Research 989-994 (July 2014): 4342–45. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4342.
Der volle Inhalt der QuelleAli, Mohammed H., and Nisreen K. Ali. "IoT based security system and intelligent home automation multi monitoring and control systems." IAES International Journal of Robotics and Automation (IJRA) 8, no. 3 (2019): 205–10. https://doi.org/10.11591/ijra.v8i3.pp205-210.
Der volle Inhalt der QuelleNicho, Mathew, Hussein Fakhry, and Charles Haiber. "An Integrated Security Governance Framework for Effective PCI DSS Implementation." International Journal of Information Security and Privacy 5, no. 3 (2011): 50–67. http://dx.doi.org/10.4018/jisp.2011070104.
Der volle Inhalt der QuelleBinghui, ZHENG, WANG Lijing, LI Hong, and LI Xiaobao. "Technical framework for ecological security control in lakes and reservoirs." Journal of Lake Sciences 26, no. 2 (2014): 169–76. http://dx.doi.org/10.18307/2014.0201.
Der volle Inhalt der QuelleNaoui, Sarra, Mohamed Elhoucine Elhdhili, and Leila Azouz Saidane. "Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security." Wireless Personal Communications 110, no. 4 (2019): 2109–30. http://dx.doi.org/10.1007/s11277-019-06832-x.
Der volle Inhalt der QuellePavlich-Mariscal, Jaime A., Steven A. Demurjian, and Laurent D. Michel. "A framework for security assurance of access control enforcement code." Computers & Security 29, no. 7 (2010): 770–84. http://dx.doi.org/10.1016/j.cose.2010.03.004.
Der volle Inhalt der QuelleEL Yamany, Hany F., Miriam A. M. Capretz, and David S. Allison. "Intelligent security and access control framework for service-oriented architecture." Information and Software Technology 52, no. 2 (2010): 220–36. http://dx.doi.org/10.1016/j.infsof.2009.10.005.
Der volle Inhalt der QuelleDehlaghi-Ghadim, Alireza, Ali Balador, Mahshid Helali Moghadam, Hans Hansson, and Mauro Conti. "ICSSIM — A framework for building industrial control systems security testbeds." Computers in Industry 148 (June 2023): 103906. http://dx.doi.org/10.1016/j.compind.2023.103906.
Der volle Inhalt der QuelleNadia, Razzaq. "SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS." International Journal of Information Technology, Modeling and Computing (IJITMC) 1, August (2018): 01–22. https://doi.org/10.5281/zenodo.1435311.
Der volle Inhalt der QuelleKanobe, Fredrick, SP Sambo, and Billy Mathias Kalema. "Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda." Journal of Innovation Information Technology and Application (JINITA) 4, no. 1 (2022): 82–92. http://dx.doi.org/10.35970/jinita.v4i1.1292.
Der volle Inhalt der QuelleKanobe, Fredrick, SP Sambo, and Billy Mathias Kalema. "Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda." Journal of Innovation Information Technology and Application (JINITA) 4, no. 1 (2022): 82–92. http://dx.doi.org/10.35970/jinita.v4i1.1427.
Der volle Inhalt der QuelleH. Ali, Mohammed, and Nisreen K. Ali. "IoT based security system and intelligent home automation multi monitoring and control systems." IAES International Journal of Robotics and Automation (IJRA) 8, no. 3 (2019): 205. http://dx.doi.org/10.11591/ijra.v8i3.pp205-210.
Der volle Inhalt der QuelleJagdish Jangid. "Secure Microservice Communication in Optical Networks." Journal of Information Systems Engineering and Management 10, no. 21s (2025): 911–26. https://doi.org/10.52783/jisem.v10i21s.3455.
Der volle Inhalt der QuelleYu, Zhi Wei. "A Business Process-Based Risk Evaluation Framework." Advanced Materials Research 230-232 (May 2011): 1024–28. http://dx.doi.org/10.4028/www.scientific.net/amr.230-232.1024.
Der volle Inhalt der QuelleAlrashede, Hamad, Fathy Eassa, Abdullah Marish Ali, Faisal Albalwy, and Hosam Aljihani. "A Blockchain-Based Security Framework for East-West Interface of SDN." Electronics 13, no. 19 (2024): 3799. http://dx.doi.org/10.3390/electronics13193799.
Der volle Inhalt der QuelleTung, Shu Chu, Wu Jeng Li, and Shih Miao Huang. "Home Security Service and Condition Control." Applied Mechanics and Materials 479-480 (December 2013): 661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.661.
Der volle Inhalt der QuellePatel, Subhash Chandra, Sumit Jaiswal, Ravi Shankar Singh, and Jyoti Chauhan. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing." International Journal of Green Computing 9, no. 2 (2018): 1–15. http://dx.doi.org/10.4018/ijgc.2018070101.
Der volle Inhalt der QuelleWang, Chun Lei, Qing Miao, Lan Fang, and Yi Qi Dai. "A Novel Framework for Industrial Control System Malicious Code Analysis." Advanced Materials Research 765-767 (September 2013): 1936–42. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1936.
Der volle Inhalt der QuelleMohajan, Avoy, and Sharmin Jahan. "Embedding Security Awareness into a Blockchain-Based Dynamic Access Control Framework for the Zero Trust Model in Distributed Systems." Electronics 14, no. 6 (2025): 1095. https://doi.org/10.3390/electronics14061095.
Der volle Inhalt der QuelleNarendra Chennupati. "Securing the Automated Enterprise: A Framework for Mitigating Security and Privacy Risks in AI-Driven Workflow Automation." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 624–32. https://doi.org/10.32996/jcsts.2025.7.3.71.
Der volle Inhalt der QuelleRamaswamy, Mithilesh. "Enhancing Security in Bring Your Own Device Environments (BYOD) with Trusted Platform Modules, Continuous Monitoring, and Hardware Security Modules." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem6838.
Der volle Inhalt der QuelleAgboola, Rihanat Bola, Zaharaddeen Salele Iro, Jamilu Awwalu, and Ibrahim Nasir Said. "Database security framework design using tokenization." Dutse Journal of Pure and Applied Sciences 8, no. 1b (2022): 16–26. http://dx.doi.org/10.4314/dujopas.v8i1b.3.
Der volle Inhalt der Quelle