Journal articles on the topic 'Security orchestration and automation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security orchestration and automation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Tembhurne, Omprakash, Sonali Milmile, Ganesh R. Pathak, Atul O. Thakare, and Abhijeet Thakare. "An Orchestrator." International Journal of Open Source Software and Processes 13, no. 1 (January 1, 2022): 1–17. http://dx.doi.org/10.4018/ijossp.308792.
Full textKinyua, Johnson, and Lawrence Awuah. "AI/ML in Security Orchestration, Automation and Response: Future Research Directions." Intelligent Automation & Soft Computing 28, no. 2 (2021): 527–45. http://dx.doi.org/10.32604/iasc.2021.016240.
Full textChara Eddine, Meftah Mohammed. "A Comparative Study of Formal Approaches for Web Service Oriented Architecture." Network and Communication Technologies 5, no. 2 (December 31, 2020): 15. http://dx.doi.org/10.5539/nct.v5n2p15.
Full textLee, Minkyung, Julian Jang-Jaccard, and Jin Kwak. "Novel Architecture of Security Orchestration, Automation and Response in營nternet of Blended Environment." Computers, Materials & Continua 73, no. 1 (2022): 199–223. http://dx.doi.org/10.32604/cmc.2022.028495.
Full textChen, Shichao, and Mengchu Zhou. "Evolving Container to Unikernel for Edge Computing and Applications in Process Industry." Processes 9, no. 2 (February 14, 2021): 351. http://dx.doi.org/10.3390/pr9020351.
Full textOhmori, Motoyuki. "On Automation and Orchestration of an Initial Computer Security Incident Response by Introducing Centralized Incident Tracking System." Journal of Information Processing 27 (2019): 564–73. http://dx.doi.org/10.2197/ipsjjip.27.564.
Full textSierra, Rodrigo, and Hubert Odziemczyk. "Readying CERN for connected device era." EPJ Web of Conferences 245 (2020): 07015. http://dx.doi.org/10.1051/epjconf/202024507015.
Full textSarkar, Sirshak, Gaurav Choudhary, Shishir Kumar Shandilya, Azath Hussain, and Hwankuk Kim. "Security of Zero Trust Networks in Cloud Computing: A Comparative Review." Sustainability 14, no. 18 (September 7, 2022): 11213. http://dx.doi.org/10.3390/su141811213.
Full textGoutam, Aradhana, Raj Kamal, and Maya Ingle. "Specification for security Orchestration." Procedia Engineering 38 (2012): 429–41. http://dx.doi.org/10.1016/j.proeng.2012.06.053.
Full textPotter, Bruce. "Security automation." Network Security 2007, no. 9 (September 2007): 18–19. http://dx.doi.org/10.1016/s1353-4858(07)70084-3.
Full textMolina Zarca, Alejandro, Miloud Bagaa, Jorge Bernal Bernabe, Tarik Taleb, and Antonio F. Skarmeta. "Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems." Sensors 20, no. 13 (June 27, 2020): 3622. http://dx.doi.org/10.3390/s20133622.
Full textPapadakis-Vlachopapadopoulos, Konstantinos, Ioannis Dimolitsas, Dimitrios Dechouniotis, Eirini Eleni Tsiropoulou, Ioanna Roussaki, and Symeon Papavassiliou. "On Blockchain-Based Cross-Service Communication and Resource Orchestration on Edge Clouds." Informatics 8, no. 1 (February 26, 2021): 13. http://dx.doi.org/10.3390/informatics8010013.
Full textKlose, Anselm, Julius Lorenz, Lukas Bittorf, Katharina Stark, Mario Hoernicke, Andreas Stutz, Hannes Weinhold, et al. "Orchestration of modular plants." atp magazin 63, no. 9 (August 12, 2022): 68–77. http://dx.doi.org/10.17560/atp.v63i9.2599.
Full textQadeer, Arslan, Asad Waqar Malik, Anis Ur Rahman, Hamayun Mian Muhammad, and Arsalan Ahmad. "Virtual Infrastructure Orchestration For Cloud Service Deployment." Computer Journal 63, no. 2 (December 5, 2019): 295–307. http://dx.doi.org/10.1093/comjnl/bxz125.
Full textHighland, HaroldJoseph. "Office automation security." Computers & Security 6, no. 6 (December 1987): 452–57. http://dx.doi.org/10.1016/0167-4048(87)90023-x.
Full textStutz, Andreas, Alexander Fay, Mike Barth, and Mathias Maurmaier. "Orchestration vs. Choreography Functional Association for Future Automation Systems." IFAC-PapersOnLine 53, no. 2 (2020): 8268–75. http://dx.doi.org/10.1016/j.ifacol.2020.12.1961.
Full textPokhrel, Shiva Raj. "Software Defined Internet of Vehicles for Automation and Orchestration." IEEE Transactions on Intelligent Transportation Systems 22, no. 6 (June 2021): 3890–99. http://dx.doi.org/10.1109/tits.2021.3077363.
Full textWang, Shuyi, and Longxiang Yang. "Securing Dynamic Service Function Chain Orchestration in EC-IoT Using Federated Learning." Sensors 22, no. 23 (November 22, 2022): 9041. http://dx.doi.org/10.3390/s22239041.
Full textSlawomir Kuklinski, Lechoslaw Tomaszewski, Robert Kolakowski, Anne-Marie Bosneag, Ashima Chawla, Adlen Ksentini, Sabra Ben Saad, et al. "AI-driven predictive and scalable management and orchestration of network slices." ITU Journal on Future and Evolving Technologies 3, no. 3 (November 16, 2022): 570–88. http://dx.doi.org/10.52953/ipui5221.
Full textIslam, Chadni, Muhammad Ali Babar, and Surya Nepal. "A Multi-Vocal Review of Security Orchestration." ACM Computing Surveys 52, no. 2 (May 31, 2019): 1–45. http://dx.doi.org/10.1145/3305268.
Full textHwang, J., K. Bai, M. Tacci, M. Vukovic, and N. Anerousis. "Automation and orchestration framework for large-scale enterprise cloud migration." IBM Journal of Research and Development 60, no. 2-3 (March 2016): 1:1–1:12. http://dx.doi.org/10.1147/jrd.2015.2511810.
Full textShemyakinskaya, Anastasia Sergeevna, and Igor Valerevich Nikiforov. "Hard drives monitoring automation approach for Kubernetes container orchestration system." Proceedings of the Institute for System Programming of the RAS 32, no. 2 (2020): 99–106. http://dx.doi.org/10.15514/ispras-2020-32(2)-8.
Full textWilliams, Adam D. "Multilayered Network Models for Security: Enhancing System Security Engineering with Orchestration." INSIGHT 25, no. 2 (June 2022): 44–48. http://dx.doi.org/10.1002/inst.12385.
Full textRunde, Markus, Walter Speth, Thomas Steffen, and Christoph Thiell. "Automation Security Risk Assessment." atp edition 58 (January 1, 2016): 48. http://dx.doi.org/10.17560/atp.v58i01-02.551.
Full textKothiyal, Sonakshi. "Automation in Cyber-Security." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (May 31, 2019): 581–84. http://dx.doi.org/10.22214/ijraset.2019.5098.
Full textWong, Ken. "Security and Office Automation." EDPACS 15, no. 3 (September 1987): 5–11. http://dx.doi.org/10.1080/07366988709452219.
Full textWong, Ken. "Security and office automation." Computers & Security 7, no. 1 (February 1988): 106–7. http://dx.doi.org/10.1016/0167-4048(88)90548-2.
Full textSinde, Sai Priya, Bhavika Thakkalapally, Meghamala Ramidi, and Sowmya Veeramalla. "Continuous Integration and Deployment Automation in AWS Cloud Infrastructure." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 1305–9. http://dx.doi.org/10.22214/ijraset.2022.44106.
Full textRadack, Shirley, and Rick Kuhn. "Managing Security: The Security Content Automation Protocol." IT Professional 13, no. 1 (January 2011): 9–11. http://dx.doi.org/10.1109/mitp.2011.11.
Full textMoubayed, Abdallah, Abdallah Shami, and Anwer Al-Dulaimi. "On End-to-End Intelligent Automation of 6G Networks." Future Internet 14, no. 6 (May 29, 2022): 165. http://dx.doi.org/10.3390/fi14060165.
Full textLi, Wei, Yuan Jiang, Xiaoliang Zhang, Fangfang Dang, Feng Gao, Haomin Wang, and Qi Fan. "Reliability Assurance Dynamic SSC Placement Using Reinforcement Learning." Information 13, no. 2 (January 21, 2022): 53. http://dx.doi.org/10.3390/info13020053.
Full textPriyadharsini, S. "Home Automation and Security System." International Journal for Research in Applied Science and Engineering Technology V, no. III (March 28, 2017): 1174–79. http://dx.doi.org/10.22214/ijraset.2017.3215.
Full textKaur, Surinder, Rashmi Singh, Neha Khairwal, and Pratyk Jain. "HOME AUTOMATION AND SECURITY SYSTEM." Advanced Computational Intelligence: An International Journal (ACII) 3, no. 3 (July 30, 2016): 17–23. http://dx.doi.org/10.5121/acii.2016.3303.
Full textMathew, Alex. "Cybersecurity Infrastructure and Security Automation." Advanced Computing: An International Journal 10, no. 6 (November 30, 2019): 1–7. http://dx.doi.org/10.5121/acij.2019.10601.
Full textChien, Ting-Li, Kuo-Lan Su, and Jr-Hung Guo. "Intelligent Home-Automation Security System." International Journal of Automation Technology 3, no. 2 (March 5, 2009): 121–29. http://dx.doi.org/10.20965/ijat.2009.p0123.
Full textGranzer, Wolfgang, Fritz Praus, and Wolfgang Kastner. "Security in Building Automation Systems." IEEE Transactions on Industrial Electronics 57, no. 11 (November 2010): 3622–30. http://dx.doi.org/10.1109/tie.2009.2036033.
Full textG, SHYAMALA, Ronith Gowda, Sashikiran Gavanivari, Suvith K S, and Vishwamohan Narendra. "Home Automation Security Using Blockchain." International Journal of Computer Science and Engineering 7, no. 7 (July 25, 2020): 63–68. http://dx.doi.org/10.14445/23488387/ijcse-v7i7p111.
Full textMarsh, P. "Beyond control [automation system security]." Information Professional 2, no. 2 (April 1, 2005): 12–16. http://dx.doi.org/10.1049/inp:20050202.
Full textMoradi, Niloofar, Alireza Shameli-Sendi, and Alireza Khajouei. "A Scalable Stateful Approach for Virtual Security Functions Orchestration." IEEE Transactions on Parallel and Distributed Systems 32, no. 6 (June 1, 2021): 1383–94. http://dx.doi.org/10.1109/tpds.2021.3049804.
Full textPierantoni, Gabriele, Tamas Kiss, Gabor Terstyanszky, James DesLauriers, Gregoire Gesmier, and Hai-Van Dang. "Describing and Processing Topology and Quality of Service Parameters of Applications in the Cloud." Journal of Grid Computing 18, no. 4 (June 15, 2020): 761–78. http://dx.doi.org/10.1007/s10723-020-09524-0.
Full textValera, A., J. Gomez-Moreno, A. Sánchez, C. Ricolfe-Viala, R. Zotovic, and M. Vallés. "Industrial Robot Programming and UPnP Services Orchestration for the Automation of Factories." International Journal of Advanced Robotic Systems 9, no. 4 (January 2012): 123. http://dx.doi.org/10.5772/51373.
Full textŠimek, Dalibor, and Roman Šperka. "How Robot/human Orchestration Can Help in an HR Department: A Case Study From a Pilot Implementation." Organizacija 52, no. 3 (August 1, 2019): 204–17. http://dx.doi.org/10.2478/orga-2019-0013.
Full textBadewi, Amgad, Essam Shehab, Jing Zeng, and Mostafa Mohamad. "ERP benefits capability framework: orchestration theory perspective." Business Process Management Journal 24, no. 1 (February 2, 2018): 266–94. http://dx.doi.org/10.1108/bpmj-11-2015-0162.
Full textHermosilla, Ana, Alejandro Molina Zarca, Jorge Bernal Bernabe, Jordi Ortiz, and Antonio Skarmeta. "Security Orchestration and Enforcement in NFV/SDN-Aware UAV Deployments." IEEE Access 8 (2020): 131779–95. http://dx.doi.org/10.1109/access.2020.3010209.
Full textBen Said, Najah, and Ioana Cristescu. "End-to-end information flow security for web services orchestration." Science of Computer Programming 187 (February 2020): 102376. http://dx.doi.org/10.1016/j.scico.2019.102376.
Full textChen, Liang, Xiao Jun Zuo, and Yu Fei Wang. "Research on Information Security Test Bed and Evaluation Framework for Distribution Automation System." Applied Mechanics and Materials 737 (March 2015): 210–13. http://dx.doi.org/10.4028/www.scientific.net/amm.737.210.
Full textLiu, Fang. "Social Security Research under Automation Control." Applied Mechanics and Materials 340 (July 2013): 621–25. http://dx.doi.org/10.4028/www.scientific.net/amm.340.621.
Full textSingh, Er Dhananjali, Satyendra Kumar Singh, and Jitendra Kumar Yadav. "Home Automation and Security Using IOT." IJARCCE 8, no. 5 (May 30, 2019): 52–56. http://dx.doi.org/10.17148/ijarcce.2019.8512.
Full textKirubakaran, B., K. Baveena, M. Keerthana, and R. Ramya. "Automation Based StairBOT for Security Application." DJ Journal of Advances in Electronics and Communication Engineering 4, no. 2 (May 26, 2018): 17–21. http://dx.doi.org/10.18831/djece.org/2018021003.
Full textTreytl, Albert, Peter Palensky, and Thilo Sauter. "SECURITY CONSIDERATIONS FOR ENERGY AUTOMATION NETWORKS." IFAC Proceedings Volumes 38, no. 2 (2005): 158–65. http://dx.doi.org/10.3182/20051114-2-mx-3901.00023.
Full text