Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Security solutions.

Zeitschriftenartikel zum Thema „Security solutions“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Security solutions" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai und Bhagyashri D. Dangewar. „Cloud Security: Problems and Solutions“. International Journal of Scientific Research 3, Nr. 4 (01.06.2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Xu, Vincent. „Data Security Solutions“. RESEARCH REVIEW International Journal of Multidisciplinary 05, Nr. 07 (15.07.2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Webb, K. W. „Biometric Security Solutions“. IEEE Security and Privacy Magazine 3, Nr. 5 (September 2005): 7. http://dx.doi.org/10.1109/msp.2005.117.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

GOHOREANU, Bogdan, Florin SANDU und Dan-Nicolae ROBU. „SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS“. SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, Nr. 1 (31.07.2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

WEBER, CYNTHIA, und MARK LACY. „Securing by design“. Review of International Studies 37, Nr. 3 (01.03.2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.

Der volle Inhalt der Quelle
Annotation:
AbstractThis article investigates how modern neo-liberal states are ‘securing by design’ – harnessing design to new technologies in order to produce security, safety, and protection. We take a critical view toward ‘securing by design’ and the policy agendas it produces of ‘designing out insecurity’ and ‘designing in protection’ because securing by design strategies rely upon inadequate conceptualisations of security, technology, and design and inadequate understandings of their relationships to produce inadequate ‘security solutions’ to ready-made ‘security problems’. This critique leads us to propose a new research agenda we call Redesigning Security. A Redesigning Security Approach begins from a recognition that the achievement of security is more often than not illusive, which means that the desire for security is itself problematic. Rather than encouraging the design of ‘security solutions’ – a securing by design – a Redesigning Security Approach explores how we mightinsecure securing by design. By acknowledging and then moving beyond the new security studies insight that security often produces insecurity, our approach uses design as a vehicle through which to raise questions about security problems and security solutions by collaborating with political and critical design practitioners to design concrete material objects that themselves embody questions about traditional security and about traditional design practices that use technology to depoliticise how technology is deployed by states and corporations to make us ‘safe’.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Zakarya, Muhammad, Muazzam Ali Khattak, Izaz Ur Rahman und Ayaz Ali Khan. „Grid High Availability and Service Security Issues with Solutions“. International Journal of Engineering and Technology 4, Nr. 6 (2012): 723–29. http://dx.doi.org/10.7763/ijet.2012.v4.472.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

GEANĂ, Ionuţ Cătălin. „Security Solutions for Informatics Systems“. International Journal of Information Security and Cybercrime 1, Nr. 2 (21.12.2012): 17–24. http://dx.doi.org/10.19107/ijisc.2012.02.02.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Dhiman, Deepika. „WLAN Security Issues and Solutions“. IOSR Journal of Computer Engineering 16, Nr. 1 (2014): 67–75. http://dx.doi.org/10.9790/0661-16146775.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Fausett, Crystal M., Megan P. Christovich, Jarod M. Parker, John M. Baker und Joseph R. Keebler. „Telemedicine Security: Challenges and Solutions“. Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, Nr. 1 (Juni 2021): 340–44. http://dx.doi.org/10.1177/2327857921101241.

Der volle Inhalt der Quelle
Annotation:
The proliferation of telemedicine spurred by the COVID-19 pandemic has come with a variety of human factors challenges. Such challenges include mitigating potential risks associated with the quick transition to virtual care. We identify challenges and solutions related to telemedicine security, and analyze our results using Schlarman’s People, Policy, Technology framework (2001). Our systematic literature review synthesizes gray literature (white papers, news articles, and blog posts) in addition to formal (published) literature. This methodology closes the gap between academic research and professional practice and aids in providing timely, practical insights related to cybersecurity and safety in virtual care environments. As the transition from traditional care continues to develop, we seek to better understand emerging vulnerabilities, identify crucial cyber hygiene practices, and provide insights on how to improve the safety of patient data in virtual care. Telemedicine is here to stay, and lessons learned from the pandemic are likely to remain useful.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Trubilin, Alexander Ivanovich, Konstantin Eduardovich Tyupakov und Alexander Alexandrovich Adamenko. „Food security: problems and solutions“. Proceedings of the Kuban State Agrarian University, Nr. 90 (2021): 5–10. http://dx.doi.org/10.21515/1999-1703-90-5-10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Yaacob, Mashkuri, Farhat Anwar, Rashidah Funke Olanrewaju, Burhan Ul Islam Khan und Roohie Naaz Mir. „Scrutinising internet banking security solutions“. International Journal of Information and Computer Security 12, Nr. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.10026783.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Khan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Farhat Anwar, Roohie Naaz Mir und Mashkuri Yaacob. „Scrutinising internet banking security solutions“. International Journal of Information and Computer Security 12, Nr. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.105180.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Smith, Robert E. „Proactive Solutions for Multinetwork Security“. Information Systems Security 3, Nr. 2 (Januar 1994): 47–55. http://dx.doi.org/10.1080/10658989409342456.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Norifusa, Masaya. „Internet security: difficulties and solutions“. International Journal of Medical Informatics 49, Nr. 1 (März 1998): 69–74. http://dx.doi.org/10.1016/s1386-5056(98)00012-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Hancock, Bill. „Network Solutions Re-evaluates Security“. Computers & Security 19, Nr. 5 (Juli 2000): 398–400. http://dx.doi.org/10.1016/s0167-4048(00)05018-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Reid, Linda. „Information Security: Risks and Solutions“. Journal of Information Privacy and Security 2, Nr. 1 (Januar 2006): 1–2. http://dx.doi.org/10.1080/15536548.2006.10855782.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

H.S, Anupama, Anusha M, Aparna Joshi, Apoorva N, N. K. Cauvery und Lingaraju G.M. „Security Solutions Using Brain Signals“. IAES International Journal of Artificial Intelligence (IJ-AI) 7, Nr. 2 (20.04.2018): 105. http://dx.doi.org/10.11591/ijai.v7.i2.pp105-110.

Der volle Inhalt der Quelle
Annotation:
A Brain Computer Interface is a direct neural interface or a brain–machine interface. It provides a communication path between human brain and the computer system. It aims to convey people's intentions to the outside world directly from their thoughts. This paper focuses on current model which uses brain signals for the authentication of users. The Electro- Encephalogram (EEG) signals are recorded from the neuroheadset when a user is shown a key image (signature image). These signals are further processed and are interpreted to obtain the thought pattern of the user to match them to the stored password in the system. Even if other person is presented with the same key image it fails to authenticate as the cortical folds of the brain are unique to each human being just like a fingerprint or DNA.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Potdar, Aarti, Pranav Patil, Raunak Bagla und Rohitashwa Pandey. „Security Solutions for Cloud Computing“. International Journal of Computer Applications 128, Nr. 16 (15.10.2015): 17–21. http://dx.doi.org/10.5120/ijca2015906747.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Phithakkitnukoon, Santi, Ram Dantu und Enkh-Amgalan Baatarjav. „VoIP Security — Attacks and Solutions“. Information Security Journal: A Global Perspective 17, Nr. 3 (29.07.2008): 114–23. http://dx.doi.org/10.1080/19393550802308618.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Barki, Amira, Abdelmadjid Bouabdallah, Said Gharout und Jacques Traore. „M2M Security: Challenges and Solutions“. IEEE Communications Surveys & Tutorials 18, Nr. 2 (2016): 1241–54. http://dx.doi.org/10.1109/comst.2016.2515516.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Kim, JiHoon, Jong In Lim und Huy Kang Kim. „Collaborative security response by interworking between multiple security solutions“. Journal of the Korea Institute of Information Security and Cryptology 23, Nr. 1 (28.02.2013): 69–79. http://dx.doi.org/10.13089/jkiisc.2013.23.1.069.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

N, Dr Chitra Kiran, Mr Suhas Suresh und Mrs Suchira Suresh. „Vulnerability, threats, and attacks in E-Payments System: Security Solutions“. International Journal of Psychosocial Rehabilitation 24, Nr. 04 (28.02.2020): 829–39. http://dx.doi.org/10.37200/ijpr/v24i4/pr201056.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Fotiou und Polyzos. „Name-Based Security for Information-Centric Networking Architectures“. Future Internet 11, Nr. 11 (01.11.2019): 232. http://dx.doi.org/10.3390/fi11110232.

Der volle Inhalt der Quelle
Annotation:
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice. For this paper, we designed and evaluated name-based security solutions that satisfy security requirements that are particular to ICN architectures. In order to achieve our goal, we leverage identity-based encryption, identity-based proxy re-encryption, and the emerging paradigm of decentralized identifiers. Our solutions support outsourcing content storage, content integrity protection and content authentication, and provenance verification, as well as access control. We show that our solutions have tolerable storage and computation overhead, thus proving their feasibility.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Brown, Michael G., und Paolina Centonze. „Exploiting Flaws in Big Data Systems“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, Nr. 8 (17.05.2016): 6967–75. http://dx.doi.org/10.24297/ijct.v15i8.1498.

Der volle Inhalt der Quelle
Annotation:
In this journal we discuss the relevant security threats, vulnerabilities and prominent techniques to securing data lake. Over the last few years, Big Data solutions to data processing have made remarkable strides in the how we interpret data. Because of its ubiquitous nature and ability to handle various data types, it has become a valuable tool and asset to many other fields including bioinformatics solutions, marketing solutions, and social media. Ethical infractions also play a role in data processing and because of this, it is critical that comprehensive security solutions are determined and enforced under the appropriate conditions. Although modern security techniques are well developed, they still leave room for scrutiny as vulnerabilities continue to unfold. In this paper, we will examine and compare modern ethical exploit techniques as well ass techniques to promote greater authentication and overall perimeter security. The scrutinization of the current methods met through exploitation, be it physical or conceptive, is imperative in defining the understanding and verification of definite secure solutions. Â
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Chhikara, Shashi, Iti Raghav und Nitasha Hasteer. „Analyzing Security Solutions in Cloud Computing“. International Journal of Computer Applications 68, Nr. 25 (18.04.2013): 17–21. http://dx.doi.org/10.5120/11750-7247.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Dhingra, Madhavi. „BYOD SECURITY AND ITS POSSIBLE SOLUTIONS“. International Journal of Engineering Technologies and Management Research 5, Nr. 2 (27.04.2020): 101–6. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.620.

Der volle Inhalt der Quelle
Annotation:
BYOD (Bring your own Device) is a piece of its bigger pattern consumerization, in which purchaser programming and equipment are being brought into the undertaking. BYOT (bring your own particular innovation) alludes to the utilization of customer gadgets and applications in the workplace. A powerful BYOD procedure can prompt various advantages for organizations, including enhanced representative employment fulfillment, expanded occupation proficiency and adaptability. BYOD can likewise give cost reserve funds from starting gadget buy to on-going use and IT helpdesk bolster as representatives put resources into their own gadgets. Despite worries about Bring Your Own Device (BYOD) security dangers, representatives over the previous years have appreciated the different advantages of BYOD. So too have businesses, who are far-fetched ever to prevent staff from conveying their own particular gadgets to work or utilizing them remotely for work purposes. The test stays to distinguish security dangers related with BYOD and locate the most fitting answers for alleviate these risks. By recognizing potential dangers, the framework can settle on an astute choice in the matter of how to react. This paper manages the security dangers related with it and the conceivable answers for it.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Rosaire, Senou Mahugnon, und Degila Jules. „Smart Contracts Security Threats and Solutions“. International Journal of Information Technology and Web Engineering 17, Nr. 1 (01.01.2022): 1–30. http://dx.doi.org/10.4018/ijitwe.304048.

Der volle Inhalt der Quelle
Annotation:
Blockchain-enabled smart contracts are subjected to several issues leading to vigorous attacks such as the decentralized autonomous organization (DAO) and the ParitySig bug on the Ethereum platform with disastrous consequences. Several solutions have been proposed. However, new threats are identified as technology evolves and new solutions are produced, while some older threats remain unsolved. Thus, the need to fill the gap with a more comprehensive survey on existing issues and solutions for researchers and practitioners arises. The resulting updated database will become an essential means for choosing a particular solution for a specific subject. In this review, the authors embrace mainly codifying security privacy and performance issues and their respective solutions. Each problem is attached to its corresponding solutions when they exist. A summary of the threats and solutions is provided as well as the relationship between threat importance and the given answers. They finally enumerate some directives for future works.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Trabelsi, Zouheir, und Wassim El Hajj. „On investigating ARP spoofing security solutions“. International Journal of Internet Protocol Technology 5, Nr. 1/2 (2010): 92. http://dx.doi.org/10.1504/ijipt.2010.032618.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

STEFAN, HENRY, und LIAKAT ALI Md. „CLOUD COMPUTING SECURITY THREATS AND SOLUTIONS“. i-manager’s Journal on Cloud Computing 4, Nr. 2 (2017): 1. http://dx.doi.org/10.26634/jcc.4.2.14249.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Eljialy, A. E. M. „Proposed Solutions of Oracle Sysdba Security“. Journal of Industrial and Intelligent Information 1, Nr. 1 (2013): 68–71. http://dx.doi.org/10.12720/jiii.1.1.68-71.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

CAZACU, Andrei-Robert. „IoT Security: Threats and Possible Solutions“. Informatica Economica 26, Nr. 2/2022 (30.06.2022): 57–64. http://dx.doi.org/10.24818/issn14531305/26.2.2022.06.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Fortov, V. E., A. A. Makarov und T. A. Mitrova. „Global energy security: Problems and solutions“. Herald of the Russian Academy of Sciences 77, Nr. 1 (Februar 2007): 7–14. http://dx.doi.org/10.1134/s1019331607010029.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Herath, Tejaswini C., Hemantha S. B. Herath und John D'Arcy. „Organizational Adoption of Information Security Solutions“. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 51, Nr. 2 (13.05.2020): 12–35. http://dx.doi.org/10.1145/3400043.3400046.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Shoham, O. „IP@SS - integrated passenger security solutions“. IEEE Aerospace and Electronic Systems Magazine 18, Nr. 3 (März 2003): 16–21. http://dx.doi.org/10.1109/maes.2003.1193714.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Blatchford, Clive W. „The Fight for International Security Solutions“. Information Systems Security 2, Nr. 3 (Januar 1993): 23–27. http://dx.doi.org/10.1080/19393559308551363.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Flater, David. „Bad Security Metrics Part 2: Solutions“. IT Professional 20, Nr. 2 (März 2018): 76–79. http://dx.doi.org/10.1109/mitp.2018.021921653.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Ogiela, Marek R. „Cognitive solutions for security and cryptography“. Cognitive Systems Research 55 (Juni 2019): 258–61. http://dx.doi.org/10.1016/j.cogsys.2019.02.006.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

S., Dr Arunkumar. „Cryptography based Security Solutions to IOT Enabled Health Care Monitoring System“. Journal of Advanced Research in Dynamical and Control Systems 12, Nr. 7 (20.07.2020): 265–72. http://dx.doi.org/10.5373/jardcs/v12i7/20202008.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Darji, Dhara N., und Nita B. Thakkar. „Challenges in Mobile Ad Hoc Networks: Security Threats and its Solutions“. Indian Journal of Applied Research 3, Nr. 1 (01.10.2011): 72–74. http://dx.doi.org/10.15373/2249555x/jan2013/29.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

MAREȘ, Marian-Sorin. „Solutions to Secure a Network“. International Journal of Information Security and Cybercrime 7, Nr. 2 (29.12.2018): 41–51. http://dx.doi.org/10.19107/ijisc.2018.02.05.

Der volle Inhalt der Quelle
Annotation:
Security is a very difficult topic. Everyone has a different idea of what "security" is, and what levels of risk are acceptable. Network security describes the policies and procedures implemented by a network administrator to avoid and keep track of unauthorized access, exploitation, modification, or denial of the network and network resources. Security implemented in a network helps protect users' data; it reduces the risk of legal action from data theft. This paper presents the methods used for having a secure network, how you can secure your network.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Zanoon, Nabeel, Nashat Albdour, Hatem S. A. Hamatta und Rasha Moh'd Al-Tarawneh. „Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security Solutions“. International Journal of Network Security & Its Applications 7, Nr. 3 (30.05.2015): 01–13. http://dx.doi.org/10.5121/ijnsa.2015.7301.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Michelberger, Pál, und Ágnes Kemendi. „DATA, INFORMATION AND IT SECURITY - SOFTWARE SUPPORT FOR SECURITY ACTIVITIES“. Problems of Management in the 21st Century 15, Nr. 2 (10.12.2020): 108–24. http://dx.doi.org/10.33225/pmc/20.15.108.

Der volle Inhalt der Quelle
Annotation:
Data protection, information and IT security became number one priorities in these fast- paced days that top management needs to focus on. A number of IT solutions have been developed on the market to address the security challenges that require prompt actions. These solutions contribute to a control environment that is robust and stand the potential threats. This research describes the framework of governance, risk and compliance and provides an integrated, holistic approach which helps to increase process performance and to ensure that the organization follows its own rules, risk appetite, and complies with external regulations. These systems fulfil a core role in the enterprise’s defense system. This research reviews the features of security packages relevant to IT GRC and provides an overview of the security elements and describes their main characteristics. This review covers the configuration database related to the enterprise business model; the business impact analysis; the risk management-, governance and compliance functions; the data security; the data protection and GDPR; the business continuity management; the network -, IoT - and industrial control system safety, the access - and log management. Embedding these solutions to the business and operations processes strengthens the response of an organization to the various risks and requirements that it faces and reduces the likelihood of major non-compliance or security gaps. Keywords: data protection, GRC software solutions, information security
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh und Suresh Shanmugasundaram. „Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks“. International Journal of Applied Metaheuristic Computing 10, Nr. 4 (Oktober 2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.

Der volle Inhalt der Quelle
Annotation:
Software defined networking (SDN), a new attempt in addressing the existing challenges in the legacy network architecture, is lime-lighted due to its simplified approach in managing the networks and its capability of programmability. In progressing with software defined networks implementation, security remains a high priority focus. The advantage of SDN itself opens a wide ground in posing new security threats and challenges. Focusing on the security of the SDN is a prime factor as it reflects on the growth of SDN technology implementation. This article focuses on the various existing security solutions available for SDN and the real challenge in securing the SDN providing the researchers a paved platform to work on further securing the networks. This article is designed with an introduction on SDN, its architecture, the available security solutions for the network, the leveraging threats and type of attack possibilities in SDN. This article concludes with the requirements of security factors and schemes in SDN.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Mohan, Madan, Aadarsh Malviya und Anuranjan Mishra. „Big Data Security Problem and Its Solutions“. International Journal of Engineering and Advanced Technology 11, Nr. 1 (30.10.2021): 34–36. http://dx.doi.org/10.35940/ijeat.a3130.1011121.

Der volle Inhalt der Quelle
Annotation:
Big Data is the way to go especially for the large companies which keep a lot of information on the systems. This paper delves into the new challenges associated with big data. It points out safety challenges on Big Data as the main issues that organizations seek to address on a day-to-day basis. These challenges include securing the trusted environments, sufficient access management, performing due diligence, combating AVI vulnerabilities, and security automation. They can be solved by maintaining strict access strategies that only allow their esteemed and responsible employees to login and also set the systems in such a way that they can detect abnormalities and allow for investigations while there is still time. The paper has addressed big data challenges as well as their solutions which are always be considered in the case of the organization as they have long-term consequences if not put into consideration.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Tawalbeh, Lo’ai, Fadi Muheidat, Mais Tawalbeh und Muhannad Quwaider. „IoT Privacy and Security: Challenges and Solutions“. Applied Sciences 10, Nr. 12 (15.06.2020): 4102. http://dx.doi.org/10.3390/app10124102.

Der volle Inhalt der Quelle
Annotation:
Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT is facing. In this work, we are exploring the background of IoT systems and security measures, and identifying (a) different security and privacy issues, (b) approaches used to secure the components of IoT-based environments and systems, (c) existing security solutions, and (d) the best privacy models necessary and suitable for different layers of IoT driven applications. In this work, we proposed a new IoT layered model: generic and stretched with the privacy and security components and layers identification. The proposed cloud/edge supported IoT system is implemented and evaluated. The lower layer represented by the IoT nodes generated from the Amazon Web Service (AWS) as Virtual Machines. The middle layer (edge) implemented as a Raspberry Pi 4 hardware kit with support of the Greengrass Edge Environment in AWS. We used the cloud-enabled IoT environment in AWS to implement the top layer (the cloud). The security protocols and critical management sessions were between each of these layers to ensure the privacy of the users’ information. We implemented security certificates to allow data transfer between the layers of the proposed cloud/edge enabled IoT model. Not only is the proposed system model eliminating possible security vulnerabilities, but it also can be used along with the best security techniques to countermeasure the cybersecurity threats facing each one of the layers; cloud, edge, and IoT.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Sharma, Ravi, und Nonita Sharma. „Attacks on Resource-Constrained IoT Devices and Security Solutions“. International Journal of Software Science and Computational Intelligence 14, Nr. 1 (01.01.2022): 1–21. http://dx.doi.org/10.4018/ijssci.310943.

Der volle Inhalt der Quelle
Annotation:
An IoT is a complex system of interconnected electronic devices that exchange data over the network. Due to the sensitive nature of the data involved in this new technological paradigm, security measures must be taken with great care. Researchers can better understand the threats and weaknesses of the IoT if attacks are categorized to facilitate the development of a more robust defense system. This study discusses various attacks and statistical data related to IoT. These attacks are divided into two categories: physical and cyber-attacks. Based on the literature review, the authors found that social engineering and DoS are the most common attacks in the physical and cyber categories. This study demonstrates the security solutions inherent to securing the IoT environment. Cryptography, blockchain, software-defined networks, and machine learning techniques were reviewed. They also discussed steps that should be taken to make a safe IoT environment.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Ramanauskaitė, Simona, Anatoly Shein, Antanas Čenys und Justinas Rastenis. „Security Ontology Structure for Formalization of Security Document Knowledge“. Electronics 11, Nr. 7 (31.03.2022): 1103. http://dx.doi.org/10.3390/electronics11071103.

Der volle Inhalt der Quelle
Annotation:
Cybersecurity solutions are highly based on data analysis. Currently, it is not enough to make an automated decision; it also has to be explainable. The decision-making logic traceability should be provided in addition to justification by referencing different data sources and evidence. However, the existing security ontologies, used for the implementation of expert systems and serving as a knowledge base, lack interconnectivity between different data sources and computer-readable linking to the data source. Therefore, this paper aims to increase the possibilities of ontology-based cyber intelligence solutions, by presenting a security ontology structure for data storage to the ontology from different text-based data sources, supporting the knowledge traceability and relationship estimation between different security documents. The proposed ontology structure is tested by storing data of three text-based data sources, and its application possibilities are provided. The study shows that the structure is adaptable for different text data sources and provides an additional value related to security area extension.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Karimkulov, Kurbonkul Mavlankulovich, Ikromjon Esanboyevich Uzohkov und Madraim Khasanovich Sarikulov. „Food security in Uzbekistan: Problems and solutions“. South Asian Journal of Marketing & Management Research 10, Nr. 11 (2020): 115–23. http://dx.doi.org/10.5958/2249-877x.2020.00080.6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Levashov, Viktor, und Viliam Sarian. „The digitalization and security: problems and solutions“. Social novelties and Social sciences, Nr. 1 (2020): 37–46. http://dx.doi.org/10.31249/snsn/2020.01.03.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Ibn Minar, Nateq Be Nazir. „Bluetooth Security Threats And Solutions: A Survey“. International Journal of Distributed and Parallel systems 3, Nr. 1 (31.01.2012): 127–48. http://dx.doi.org/10.5121/ijdps.2012.3110.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie