Journal articles on the topic 'Security-aware application'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security-aware application.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Iyer, Ravishankar, Zbigniew Kalbarczyk, Karthik Pattabiraman, William Healey, Wen-mei Hwu, Peter Klemperer, and Reza Farivar. "Toward Application-Aware Security and Reliability." IEEE Security and Privacy Magazine 5, no. 1 (January 2007): 57–62. http://dx.doi.org/10.1109/msp.2007.23.
Full textLozano-Rizk, Jose E., Jose E. Gonzalez-Trejo, Raul Rivera-Rodriguez, Andrei Tchernykh, Salvador Villarreal-Reyes, and Alejandro Galaviz-Mosqueda. "Application-Aware Flow Forwarding Service for SDN-Based Data Centers." Electronics 11, no. 23 (November 24, 2022): 3882. http://dx.doi.org/10.3390/electronics11233882.
Full textDirin, Amir, Teemu H. Laine, and Ari Alamäki. "Managing Emotional Requirements in a Context-Aware Mobile Application for Tourists." International Journal of Interactive Mobile Technologies (iJIM) 12, no. 2 (March 29, 2018): 177. http://dx.doi.org/10.3991/ijim.v12i2.7933.
Full textRosendo, Miguel, and Jorge Granjal. "Energy-Aware Security Adaptation for Low-Power IoT Applications." Network 2, no. 1 (January 14, 2022): 36–52. http://dx.doi.org/10.3390/network2010003.
Full textArudkar, Archna, and Vimla Jethani. "RBAC+: Protecting Web Databases With Access Control Mechanism." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 2, no. 1 (November 27, 2012): 24–30. http://dx.doi.org/10.24297/ijmit.v2i1.1407.
Full textDoriguzzi-Corin, Roberto, Sandra Scott-Hayward, Domenico Siracusa, Marco Savi, and Elio Salvadori. "Dynamic and Application-Aware Provisioning of Chained Virtual Security Network Functions." IEEE Transactions on Network and Service Management 17, no. 1 (March 2020): 294–307. http://dx.doi.org/10.1109/tnsm.2019.2941128.
Full textKhan, M. Fahim Ferdous, and Ken Sakamura. "The Context-Security Nexus in Ubiquitous Computing." International Journal of Adaptive, Resilient and Autonomic Systems 5, no. 3 (July 2014): 61–81. http://dx.doi.org/10.4018/ijaras.2014070104.
Full textHuang, Binbin, Yuanyuan Xiang, Dongjin Yu, Jiaojiao Wang, Zhongjin Li, and Shangguang Wang. "Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing." Security and Communication Networks 2021 (May 25, 2021): 1–13. http://dx.doi.org/10.1155/2021/5532410.
Full textAsuncion, Vernon, Khaled M. khan, Abdelkarim Erradi, and Saleh Alhazbi. "Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming." International Journal of Cooperative Information Systems 25, no. 01 (March 2016): 1650003. http://dx.doi.org/10.1142/s0218843016500039.
Full textSingh, Shubham, Pranju Mishra, Samruddhi Kshirsagar, Shubham Bharadia, and Narendra Joshi. "SQL Injection and Areas of Security Concern." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 60–66. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.006.
Full textThete, Prof Sharda, Siddheshwar Midgule, Nikesh Konde, and Suraj Kale. "Malware Detection Using Machine Learning and Deep Learning." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (November 30, 2022): 1942–45. http://dx.doi.org/10.22214/ijraset.2022.47682.
Full textZawoad, Shams, Marjan Mernik, and Ragib Hasan. "Towards building a forensics aware language for secure logging." Computer Science and Information Systems 11, no. 4 (2014): 1291–314. http://dx.doi.org/10.2298/csis131201051z.
Full textYang, Yuli, Xinguang Peng, and Xiaohong Wan. "Security-aware data replica selection strategy for Bag-of-Tasks application in cloud computing." Journal of High Speed Networks 21, no. 4 (November 25, 2015): 299–311. http://dx.doi.org/10.3233/jhs-150527.
Full textPrabowo, Maraghi Agil, Ucuk Darusalam, and Sari Ningsih. "Perancangan Keamanan Server Linux Dengan Metode Hardening Pada Layer 1 dan Layer 7." JURNAL MEDIA INFORMATIKA BUDIDARMA 4, no. 3 (July 20, 2020): 591. http://dx.doi.org/10.30865/mib.v4i3.2157.
Full textChen, Aiguo, Guoming Lu, Hanwen Xing, Yuan Xie, and Shunwei Yuan. "Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772092177. http://dx.doi.org/10.1177/1550147720921778.
Full textVakilinia, Shahin, Mohammadhossein Alvandi, Mohammadreza Khalili Shoja, and Iman Vakilinia. "Cross-Layered Secure and QoS Aware Design of VOIP over Wireless Ad-Hoc Networks." International Journal of Business Data Communications and Networking 9, no. 4 (October 2013): 23–45. http://dx.doi.org/10.4018/ijbdcn.2013100102.
Full textMbuguah, Samwel Mungai, and Tobias Okumu Otibine. "A Survey of Awareness of Social Engineering Attacks to Information Security Management Systems: The Case of Kibabii University Kenya." International Journal of Computer Applications Technology and Research 11, no. 06 (June 2022): 187–92. http://dx.doi.org/10.7753/ijcatr1106.1003.
Full textRosli, Athirah, Abidah Mat Taib, Wan Nor Ashiqin Wan Ali, and Ros Syamsul Hamid. "Application of Grounded Theory in Determining Required Elements for IPv6 Risk Assessment Equation." MATEC Web of Conferences 150 (2018): 06005. http://dx.doi.org/10.1051/matecconf/201815006005.
Full textAzhari, Firman. "Quick detection of NFC vulnerability." Information Management & Computer Security 22, no. 2 (June 3, 2014): 134–40. http://dx.doi.org/10.1108/imcs-09-2013-0067.
Full textTang, Jia. "RFID Technology and Structure of Internet of Things." Applied Mechanics and Materials 427-429 (September 2013): 2818–21. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2818.
Full textWang, Ziheng, Heng Chen, and Weiguo Wu. "Client-Aware Negotiation for Secure and Efficient Data Transmission." Energies 13, no. 21 (November 4, 2020): 5777. http://dx.doi.org/10.3390/en13215777.
Full textHaider, Shahab, Ziaul Haq Abbas, Ghulam Abbas, Muhammad Waqas, Shanshan Tu, and Wei Zhao. "A Novel Cross-Layer V2V Architecture for Direction-Aware Cooperative Collision Avoidance." Electronics 9, no. 7 (July 8, 2020): 1112. http://dx.doi.org/10.3390/electronics9071112.
Full textHaoxiang, Dr Wang, and Dr. S. Smys. "Secure and Optimized Cloud-Based Cyber-Physical Systems with Memory-Aware Scheduling Scheme." Journal of Trends in Computer Science and Smart Technology 2, no. 3 (July 23, 2020): 141–47. http://dx.doi.org/10.36548/jtcsst.2020.3.003.
Full textOrdoñez-Quintero, Cristian-Camilo, Hugo-Armando Ordoñez-Eraso, and Jose-Armando Ordoñez-Córdoba. "Information Management Security Vulnerabilities in Smartphones Used by University Students: A Case Study in the Southwest of Colombia." Revista Facultad de Ingeniería 31, no. 59 (March 14, 2022): e13957. http://dx.doi.org/10.19053/01211129.v31.n59.2022.13957.
Full textKathole, Atul B., Jayashree Katti, Dharmesh Dhabliya, Vivek Deshpande, Anand Singh Rajawat, S. B. Goyal, Maria Simona Raboaca, Traian Candin Mihaltan, Chaman Verma, and George Suciu. "Energy-Aware UAV Based on Blockchain Model Using IoE Application in 6G Network-Driven Cybertwin." Energies 15, no. 21 (November 7, 2022): 8304. http://dx.doi.org/10.3390/en15218304.
Full textKumbhar, Ajay, Madhav Godale, Payal Jagtap, Amruta Misal, and Mr Abhijeet Cholke. "Instant and Secure Messaging Platform Based on Blockchain." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 1515–18. http://dx.doi.org/10.22214/ijraset.2022.48222.
Full textOzturk, Metin, Mona Jaber, and Muhammad A. Imran. "Energy-Aware Smart Connectivity for IoT Networks: Enabling Smart Ports." Wireless Communications and Mobile Computing 2018 (June 28, 2018): 1–11. http://dx.doi.org/10.1155/2018/5379326.
Full textXiao, Shiyu, Yuhang Ye, Nadia Kanwal, Thomas Newe, and Brian Lee. "SoK: Context and Risk Aware Access Control for Zero Trust Systems." Security and Communication Networks 2022 (June 30, 2022): 1–20. http://dx.doi.org/10.1155/2022/7026779.
Full textNagarjuna Reddy, Tella, and K. Annapurani Panaiyappan. "Intrusion Detection on Software Defined Networking." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 330. http://dx.doi.org/10.14419/ijet.v7i3.12.16052.
Full textLiu, Muhua, and Ping Zhang. "An Adaptively Secure Functional Encryption for Randomized Functions." Computer Journal 63, no. 8 (August 2020): 1247–58. http://dx.doi.org/10.1093/comjnl/bxz154.
Full textShahid, Arsalan, Thien-An Ngoc Nguyen, and M.-Tahar Kechadi. "Big Data Warehouse for Healthcare-Sensitive Data Applications." Sensors 21, no. 7 (March 28, 2021): 2353. http://dx.doi.org/10.3390/s21072353.
Full textMashat, Arwa, and Aliaa M. Alabdali. "QoS-Aware Smart Phone-Based User Tracking Application to Prevent Outbreak of COVID-19 in Saudi Arabia." Computational Intelligence and Neuroscience 2022 (April 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/2273910.
Full textThompson, Aderonke F., Oghenerukevwe E. Oyinloye, Matthew T. David, and Boniface K. Alese. "A Secured System for Internet Enabled Host Devices." Network and Communication Technologies 5, no. 1 (February 6, 2020): 26. http://dx.doi.org/10.5539/nct.v5n1p26.
Full textFan, Long, He Huang, and Wei Kang. "Design and Implementation of Role and Group Based Access Control with Context in Document Access Control System." Applied Mechanics and Materials 427-429 (September 2013): 2795–99. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2795.
Full textJara, Antonio J., David Fernandez, Pablo Lopez, Miguel A. Zamora, and Antonio F. Skarmeta. "Lightweight MIPv6 with IPSec Support." Mobile Information Systems 10, no. 1 (2014): 37–77. http://dx.doi.org/10.1155/2014/563274.
Full textQin, Qin, Yong-qiang He, and Li-ming Nie. "Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism." Journal of Electrical and Computer Engineering 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/128691.
Full textMoura, Pedro, Paulo Fazendeiro, Pedro R. M. Inácio, Pedro Vieira-Marques, and Ana Ferreira. "Assessing Access Control Risk for mHealth: A Delphi Study to Categorize Security of Health Data and Provide Risk Assessment for Mobile Apps." Journal of Healthcare Engineering 2020 (January 17, 2020): 1–14. http://dx.doi.org/10.1155/2020/5601068.
Full textHe, Yuanhang, Daochao Huang, Lei Chen, Yi Ni, and Xiangjie Ma. "A Survey on Zero Trust Architecture: Challenges and Future Trends." Wireless Communications and Mobile Computing 2022 (June 15, 2022): 1–13. http://dx.doi.org/10.1155/2022/6476274.
Full textBhardwaj, Akashdeep, and Sam Goundar. "Unique Taxonomy for Evaluating Fog Computing Services." International Journal of E-Business Research 14, no. 4 (October 2018): 78–90. http://dx.doi.org/10.4018/ijebr.2018100105.
Full textM., Duraipandian, and Vinothkanna R. "MACHINE LEARNING BASED AUTOMATIC PERMISSION GRANTING AND MALWARE IDENTIFICATION." December 2019 01, no. 02 (December 23, 2019): 96–107. http://dx.doi.org/10.36548/jitdw.2019.2.005.
Full textLohitha, N. Sai, and M. Pounambal. "A Novel Hybrid Spotted Hyena-Swarm Optimization (HS-FFO) Framework for Effective Feature Selection in IOT Based Cloud Security Data." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1s (December 14, 2022): 290–302. http://dx.doi.org/10.17762/ijritcc.v10i1s.5851.
Full textB D, Deebak, Fadi Al-Turjman, and Leonardo Mostarda. "A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems." Sensors 19, no. 18 (September 4, 2019): 3821. http://dx.doi.org/10.3390/s19183821.
Full textLi, Wei, Yuan Jiang, Xiaoliang Zhang, Fangfang Dang, Feng Gao, Haomin Wang, and Qi Fan. "Reliability Assurance Dynamic SSC Placement Using Reinforcement Learning." Information 13, no. 2 (January 21, 2022): 53. http://dx.doi.org/10.3390/info13020053.
Full textDeng, Libing, Guoqi Xie, Hong Liu, Yunbo Han, Renfa Li, and Keqin Li. "A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN." ACM Computing Surveys 55, no. 2 (March 31, 2023): 1–36. http://dx.doi.org/10.1145/3487330.
Full textBoutekkouk, Fateh. "Application of a Fuzzy MCDM Method to Select the Best Operating System for an Efficient Security-Aware Design of Embedded Systems." International Journal of Applied Evolutionary Computation 12, no. 3 (July 2021): 1–20. http://dx.doi.org/10.4018/ijaec.2021070101.
Full textKamarudin, Nur Khairani, Nur Syafiqa Bismi, Nurul Hidayah Ahmad Zukri, Mohd Faris Mohd Fuzi, and Rashidah Ramle. "Network Security Performance Analysis of Mobile Voice Over Ip Application (mVoIP): Kakao Talk, WhatsApp, Telegram and Facebook Messenger." Journal of Computing Research and Innovation 5, no. 2 (October 12, 2020): 21–27. http://dx.doi.org/10.24191/jcrinn.v5i2.136.
Full textChaganti, Rajasekhar, Vijayakumar Varadarajan, Venkata Subbarao Gorantla, Thippa Reddy Gadekallu, and Vinayakumar Ravi. "Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture." Future Internet 14, no. 9 (August 24, 2022): 250. http://dx.doi.org/10.3390/fi14090250.
Full textMurry, Jeanette. "Job Applications Using the Internet." Australian Journal of Career Development 6, no. 3 (October 1997): 22–24. http://dx.doi.org/10.1177/103841629700600308.
Full textNovianto, Fanny. "EVALUATION OF E-GOVERNMENT INFORMATION SECURITY USING THE DEFENSE IN DEPTH MODEL." Cyber Security dan Forensik Digital 3, no. 1 (July 23, 2020): 14–19. http://dx.doi.org/10.14421/csecurity.2020.3.1.1962.
Full textKayes, A. S. M., Rudri Kalaria, Iqbal H. Sarker, Md Saiful Islam, Paul A. Watters, Alex Ng, Mohammad Hammoudeh, Shahriar Badsha, and Indika Kumara. "A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues." Sensors 20, no. 9 (April 27, 2020): 2464. http://dx.doi.org/10.3390/s20092464.
Full text