Artículos de revistas sobre el tema "Security-aware application"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Security-aware application".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Iyer, Ravishankar, Zbigniew Kalbarczyk, Karthik Pattabiraman, William Healey, Wen-mei Hwu, Peter Klemperer y Reza Farivar. "Toward Application-Aware Security and Reliability". IEEE Security and Privacy Magazine 5, n.º 1 (enero de 2007): 57–62. http://dx.doi.org/10.1109/msp.2007.23.
Texto completoLozano-Rizk, Jose E., Jose E. Gonzalez-Trejo, Raul Rivera-Rodriguez, Andrei Tchernykh, Salvador Villarreal-Reyes y Alejandro Galaviz-Mosqueda. "Application-Aware Flow Forwarding Service for SDN-Based Data Centers". Electronics 11, n.º 23 (24 de noviembre de 2022): 3882. http://dx.doi.org/10.3390/electronics11233882.
Texto completoDirin, Amir, Teemu H. Laine y Ari Alamäki. "Managing Emotional Requirements in a Context-Aware Mobile Application for Tourists". International Journal of Interactive Mobile Technologies (iJIM) 12, n.º 2 (29 de marzo de 2018): 177. http://dx.doi.org/10.3991/ijim.v12i2.7933.
Texto completoRosendo, Miguel y Jorge Granjal. "Energy-Aware Security Adaptation for Low-Power IoT Applications". Network 2, n.º 1 (14 de enero de 2022): 36–52. http://dx.doi.org/10.3390/network2010003.
Texto completoArudkar, Archna y Vimla Jethani. "RBAC+: Protecting Web Databases With Access Control Mechanism". INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 2, n.º 1 (27 de noviembre de 2012): 24–30. http://dx.doi.org/10.24297/ijmit.v2i1.1407.
Texto completoDoriguzzi-Corin, Roberto, Sandra Scott-Hayward, Domenico Siracusa, Marco Savi y Elio Salvadori. "Dynamic and Application-Aware Provisioning of Chained Virtual Security Network Functions". IEEE Transactions on Network and Service Management 17, n.º 1 (marzo de 2020): 294–307. http://dx.doi.org/10.1109/tnsm.2019.2941128.
Texto completoKhan, M. Fahim Ferdous y Ken Sakamura. "The Context-Security Nexus in Ubiquitous Computing". International Journal of Adaptive, Resilient and Autonomic Systems 5, n.º 3 (julio de 2014): 61–81. http://dx.doi.org/10.4018/ijaras.2014070104.
Texto completoHuang, Binbin, Yuanyuan Xiang, Dongjin Yu, Jiaojiao Wang, Zhongjin Li y Shangguang Wang. "Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing". Security and Communication Networks 2021 (25 de mayo de 2021): 1–13. http://dx.doi.org/10.1155/2021/5532410.
Texto completoAsuncion, Vernon, Khaled M. khan, Abdelkarim Erradi y Saleh Alhazbi. "Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming". International Journal of Cooperative Information Systems 25, n.º 01 (marzo de 2016): 1650003. http://dx.doi.org/10.1142/s0218843016500039.
Texto completoSingh, Shubham, Pranju Mishra, Samruddhi Kshirsagar, Shubham Bharadia y Narendra Joshi. "SQL Injection and Areas of Security Concern". International Journal of Computer Science and Mobile Computing 10, n.º 5 (30 de mayo de 2021): 60–66. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.006.
Texto completoThete, Prof Sharda, Siddheshwar Midgule, Nikesh Konde y Suraj Kale. "Malware Detection Using Machine Learning and Deep Learning". International Journal for Research in Applied Science and Engineering Technology 10, n.º 11 (30 de noviembre de 2022): 1942–45. http://dx.doi.org/10.22214/ijraset.2022.47682.
Texto completoZawoad, Shams, Marjan Mernik y Ragib Hasan. "Towards building a forensics aware language for secure logging". Computer Science and Information Systems 11, n.º 4 (2014): 1291–314. http://dx.doi.org/10.2298/csis131201051z.
Texto completoYang, Yuli, Xinguang Peng y Xiaohong Wan. "Security-aware data replica selection strategy for Bag-of-Tasks application in cloud computing". Journal of High Speed Networks 21, n.º 4 (25 de noviembre de 2015): 299–311. http://dx.doi.org/10.3233/jhs-150527.
Texto completoPrabowo, Maraghi Agil, Ucuk Darusalam y Sari Ningsih. "Perancangan Keamanan Server Linux Dengan Metode Hardening Pada Layer 1 dan Layer 7". JURNAL MEDIA INFORMATIKA BUDIDARMA 4, n.º 3 (20 de julio de 2020): 591. http://dx.doi.org/10.30865/mib.v4i3.2157.
Texto completoChen, Aiguo, Guoming Lu, Hanwen Xing, Yuan Xie y Shunwei Yuan. "Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments". International Journal of Distributed Sensor Networks 16, n.º 5 (mayo de 2020): 155014772092177. http://dx.doi.org/10.1177/1550147720921778.
Texto completoVakilinia, Shahin, Mohammadhossein Alvandi, Mohammadreza Khalili Shoja y Iman Vakilinia. "Cross-Layered Secure and QoS Aware Design of VOIP over Wireless Ad-Hoc Networks". International Journal of Business Data Communications and Networking 9, n.º 4 (octubre de 2013): 23–45. http://dx.doi.org/10.4018/ijbdcn.2013100102.
Texto completoMbuguah, Samwel Mungai y Tobias Okumu Otibine. "A Survey of Awareness of Social Engineering Attacks to Information Security Management Systems: The Case of Kibabii University Kenya". International Journal of Computer Applications Technology and Research 11, n.º 06 (junio de 2022): 187–92. http://dx.doi.org/10.7753/ijcatr1106.1003.
Texto completoRosli, Athirah, Abidah Mat Taib, Wan Nor Ashiqin Wan Ali y Ros Syamsul Hamid. "Application of Grounded Theory in Determining Required Elements for IPv6 Risk Assessment Equation". MATEC Web of Conferences 150 (2018): 06005. http://dx.doi.org/10.1051/matecconf/201815006005.
Texto completoAzhari, Firman. "Quick detection of NFC vulnerability". Information Management & Computer Security 22, n.º 2 (3 de junio de 2014): 134–40. http://dx.doi.org/10.1108/imcs-09-2013-0067.
Texto completoTang, Jia. "RFID Technology and Structure of Internet of Things". Applied Mechanics and Materials 427-429 (septiembre de 2013): 2818–21. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2818.
Texto completoWang, Ziheng, Heng Chen y Weiguo Wu. "Client-Aware Negotiation for Secure and Efficient Data Transmission". Energies 13, n.º 21 (4 de noviembre de 2020): 5777. http://dx.doi.org/10.3390/en13215777.
Texto completoHaider, Shahab, Ziaul Haq Abbas, Ghulam Abbas, Muhammad Waqas, Shanshan Tu y Wei Zhao. "A Novel Cross-Layer V2V Architecture for Direction-Aware Cooperative Collision Avoidance". Electronics 9, n.º 7 (8 de julio de 2020): 1112. http://dx.doi.org/10.3390/electronics9071112.
Texto completoHaoxiang, Dr Wang y Dr. S. Smys. "Secure and Optimized Cloud-Based Cyber-Physical Systems with Memory-Aware Scheduling Scheme". Journal of Trends in Computer Science and Smart Technology 2, n.º 3 (23 de julio de 2020): 141–47. http://dx.doi.org/10.36548/jtcsst.2020.3.003.
Texto completoOrdoñez-Quintero, Cristian-Camilo, Hugo-Armando Ordoñez-Eraso y Jose-Armando Ordoñez-Córdoba. "Information Management Security Vulnerabilities in Smartphones Used by University Students: A Case Study in the Southwest of Colombia". Revista Facultad de Ingeniería 31, n.º 59 (14 de marzo de 2022): e13957. http://dx.doi.org/10.19053/01211129.v31.n59.2022.13957.
Texto completoKathole, Atul B., Jayashree Katti, Dharmesh Dhabliya, Vivek Deshpande, Anand Singh Rajawat, S. B. Goyal, Maria Simona Raboaca, Traian Candin Mihaltan, Chaman Verma y George Suciu. "Energy-Aware UAV Based on Blockchain Model Using IoE Application in 6G Network-Driven Cybertwin". Energies 15, n.º 21 (7 de noviembre de 2022): 8304. http://dx.doi.org/10.3390/en15218304.
Texto completoKumbhar, Ajay, Madhav Godale, Payal Jagtap, Amruta Misal y Mr Abhijeet Cholke. "Instant and Secure Messaging Platform Based on Blockchain". International Journal for Research in Applied Science and Engineering Technology 10, n.º 12 (31 de diciembre de 2022): 1515–18. http://dx.doi.org/10.22214/ijraset.2022.48222.
Texto completoOzturk, Metin, Mona Jaber y Muhammad A. Imran. "Energy-Aware Smart Connectivity for IoT Networks: Enabling Smart Ports". Wireless Communications and Mobile Computing 2018 (28 de junio de 2018): 1–11. http://dx.doi.org/10.1155/2018/5379326.
Texto completoXiao, Shiyu, Yuhang Ye, Nadia Kanwal, Thomas Newe y Brian Lee. "SoK: Context and Risk Aware Access Control for Zero Trust Systems". Security and Communication Networks 2022 (30 de junio de 2022): 1–20. http://dx.doi.org/10.1155/2022/7026779.
Texto completoNagarjuna Reddy, Tella y K. Annapurani Panaiyappan. "Intrusion Detection on Software Defined Networking". International Journal of Engineering & Technology 7, n.º 3.12 (20 de julio de 2018): 330. http://dx.doi.org/10.14419/ijet.v7i3.12.16052.
Texto completoLiu, Muhua y Ping Zhang. "An Adaptively Secure Functional Encryption for Randomized Functions". Computer Journal 63, n.º 8 (agosto de 2020): 1247–58. http://dx.doi.org/10.1093/comjnl/bxz154.
Texto completoShahid, Arsalan, Thien-An Ngoc Nguyen y M.-Tahar Kechadi. "Big Data Warehouse for Healthcare-Sensitive Data Applications". Sensors 21, n.º 7 (28 de marzo de 2021): 2353. http://dx.doi.org/10.3390/s21072353.
Texto completoMashat, Arwa y Aliaa M. Alabdali. "QoS-Aware Smart Phone-Based User Tracking Application to Prevent Outbreak of COVID-19 in Saudi Arabia". Computational Intelligence and Neuroscience 2022 (11 de abril de 2022): 1–12. http://dx.doi.org/10.1155/2022/2273910.
Texto completoThompson, Aderonke F., Oghenerukevwe E. Oyinloye, Matthew T. David y Boniface K. Alese. "A Secured System for Internet Enabled Host Devices". Network and Communication Technologies 5, n.º 1 (6 de febrero de 2020): 26. http://dx.doi.org/10.5539/nct.v5n1p26.
Texto completoFan, Long, He Huang y Wei Kang. "Design and Implementation of Role and Group Based Access Control with Context in Document Access Control System". Applied Mechanics and Materials 427-429 (septiembre de 2013): 2795–99. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2795.
Texto completoJara, Antonio J., David Fernandez, Pablo Lopez, Miguel A. Zamora y Antonio F. Skarmeta. "Lightweight MIPv6 with IPSec Support". Mobile Information Systems 10, n.º 1 (2014): 37–77. http://dx.doi.org/10.1155/2014/563274.
Texto completoQin, Qin, Yong-qiang He y Li-ming Nie. "Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism". Journal of Electrical and Computer Engineering 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/128691.
Texto completoMoura, Pedro, Paulo Fazendeiro, Pedro R. M. Inácio, Pedro Vieira-Marques y Ana Ferreira. "Assessing Access Control Risk for mHealth: A Delphi Study to Categorize Security of Health Data and Provide Risk Assessment for Mobile Apps". Journal of Healthcare Engineering 2020 (17 de enero de 2020): 1–14. http://dx.doi.org/10.1155/2020/5601068.
Texto completoHe, Yuanhang, Daochao Huang, Lei Chen, Yi Ni y Xiangjie Ma. "A Survey on Zero Trust Architecture: Challenges and Future Trends". Wireless Communications and Mobile Computing 2022 (15 de junio de 2022): 1–13. http://dx.doi.org/10.1155/2022/6476274.
Texto completoBhardwaj, Akashdeep y Sam Goundar. "Unique Taxonomy for Evaluating Fog Computing Services". International Journal of E-Business Research 14, n.º 4 (octubre de 2018): 78–90. http://dx.doi.org/10.4018/ijebr.2018100105.
Texto completoM., Duraipandian y Vinothkanna R. "MACHINE LEARNING BASED AUTOMATIC PERMISSION GRANTING AND MALWARE IDENTIFICATION". December 2019 01, n.º 02 (23 de diciembre de 2019): 96–107. http://dx.doi.org/10.36548/jitdw.2019.2.005.
Texto completoLohitha, N. Sai y M. Pounambal. "A Novel Hybrid Spotted Hyena-Swarm Optimization (HS-FFO) Framework for Effective Feature Selection in IOT Based Cloud Security Data". International Journal on Recent and Innovation Trends in Computing and Communication 10, n.º 1s (14 de diciembre de 2022): 290–302. http://dx.doi.org/10.17762/ijritcc.v10i1s.5851.
Texto completoB D, Deebak, Fadi Al-Turjman y Leonardo Mostarda. "A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems". Sensors 19, n.º 18 (4 de septiembre de 2019): 3821. http://dx.doi.org/10.3390/s19183821.
Texto completoLi, Wei, Yuan Jiang, Xiaoliang Zhang, Fangfang Dang, Feng Gao, Haomin Wang y Qi Fan. "Reliability Assurance Dynamic SSC Placement Using Reinforcement Learning". Information 13, n.º 2 (21 de enero de 2022): 53. http://dx.doi.org/10.3390/info13020053.
Texto completoDeng, Libing, Guoqi Xie, Hong Liu, Yunbo Han, Renfa Li y Keqin Li. "A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN". ACM Computing Surveys 55, n.º 2 (31 de marzo de 2023): 1–36. http://dx.doi.org/10.1145/3487330.
Texto completoBoutekkouk, Fateh. "Application of a Fuzzy MCDM Method to Select the Best Operating System for an Efficient Security-Aware Design of Embedded Systems". International Journal of Applied Evolutionary Computation 12, n.º 3 (julio de 2021): 1–20. http://dx.doi.org/10.4018/ijaec.2021070101.
Texto completoKamarudin, Nur Khairani, Nur Syafiqa Bismi, Nurul Hidayah Ahmad Zukri, Mohd Faris Mohd Fuzi y Rashidah Ramle. "Network Security Performance Analysis of Mobile Voice Over Ip Application (mVoIP): Kakao Talk, WhatsApp, Telegram and Facebook Messenger". Journal of Computing Research and Innovation 5, n.º 2 (12 de octubre de 2020): 21–27. http://dx.doi.org/10.24191/jcrinn.v5i2.136.
Texto completoChaganti, Rajasekhar, Vijayakumar Varadarajan, Venkata Subbarao Gorantla, Thippa Reddy Gadekallu y Vinayakumar Ravi. "Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture". Future Internet 14, n.º 9 (24 de agosto de 2022): 250. http://dx.doi.org/10.3390/fi14090250.
Texto completoMurry, Jeanette. "Job Applications Using the Internet". Australian Journal of Career Development 6, n.º 3 (octubre de 1997): 22–24. http://dx.doi.org/10.1177/103841629700600308.
Texto completoNovianto, Fanny. "EVALUATION OF E-GOVERNMENT INFORMATION SECURITY USING THE DEFENSE IN DEPTH MODEL". Cyber Security dan Forensik Digital 3, n.º 1 (23 de julio de 2020): 14–19. http://dx.doi.org/10.14421/csecurity.2020.3.1.1962.
Texto completoKayes, A. S. M., Rudri Kalaria, Iqbal H. Sarker, Md Saiful Islam, Paul A. Watters, Alex Ng, Mohammad Hammoudeh, Shahriar Badsha y Indika Kumara. "A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues". Sensors 20, n.º 9 (27 de abril de 2020): 2464. http://dx.doi.org/10.3390/s20092464.
Texto completo