Artículos de revistas sobre el tema "Security solutions"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Security solutions".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai, and Bhagyashri D. Dangewar. "Cloud Security: Problems and Solutions." International Journal of Scientific Research 3, no. 4 (June 1, 2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.
Texto completoXu, Vincent. "Data Security Solutions." RESEARCH REVIEW International Journal of Multidisciplinary 05, no. 07 (July 15, 2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.
Texto completoWebb, K. W. "Biometric Security Solutions." IEEE Security and Privacy Magazine 3, no. 5 (September 2005): 7. http://dx.doi.org/10.1109/msp.2005.117.
Texto completoGOHOREANU, Bogdan, Florin SANDU, and Dan-Nicolae ROBU. "SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 1 (July 31, 2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.
Texto completoNanuru Yagamurthy, Deepak, and Rajesh Azmeera. "Security Challenges and Solutions in Cloud Computing." International Journal of Science and Research (IJSR) 7, no. 8 (August 5, 2018): 1690–93. http://dx.doi.org/10.21275/sr24517174709.
Texto completoLi, Daoming, Qiang Chen, and Lun Wang. "Cloud Security: Challenges and Solutions." Journal of Industrial Engineering and Applied Science 2, no. 4 (August 1, 2024): 42–47. https://doi.org/10.5281/zenodo.12789566.
Texto completoAnupama.H.S, M. Anusha, Joshi Aparna, N. Apoorva, K.Cauvery N., and Lingaraju.G.M. "Security Solutions Using Brain Signals." International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (June 1, 2018): 105–10. https://doi.org/10.11591/ijai.v7.i2.pp105-110.
Texto completoKenny, Peter. "Security and risk appraisal — EDIFACT security solutions." EDI in Finance 1991, no. 2 (February 1991): 4–7. https://doi.org/10.1016/0960-4634(91)90090-3.
Texto completoRanjana, Patel, and Arakh Rajendra. "Cyber Security Challenges & Their Solutions in India." International Journal of Trend in Research and Development 9, no. 1 (January 20, 2022): 616–20. https://doi.org/10.5281/zenodo.6345325.
Texto completoGolchha, Prakhar, Rajesh Deshmukh, and Palak Lunia. "A Review on Network Security Threats and Solutions." International Journal of Scientific Engineering and Research 3, no. 4 (April 27, 2015): 21–24. https://doi.org/10.70729/ijser1567.
Texto completoSingh Gurjit Singh, Sahibdeep. "Microservices Security Challenges and Solutions in Cloud Environment." International Journal of Science and Research (IJSR) 13, no. 3 (March 5, 2024): 201–5. http://dx.doi.org/10.21275/sr24303144734.
Texto completoNabeel, Zanoon, Albdour Nashat, S. A. Hamatta Hatem, and Al-Tarawneh RashaMoh'd. "SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND SECURITY SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (May 27, 2015): 01–13. https://doi.org/10.5281/zenodo.8162659.
Texto completoWEBER, CYNTHIA, and MARK LACY. "Securing by design." Review of International Studies 37, no. 3 (March 1, 2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.
Texto completoMittal, Himani. "Software security: Threats, solutions and challenges." Computer Software and Media Applications 6, no. 1 (February 21, 2024): 3769. http://dx.doi.org/10.24294/csma.v6i1.3769.
Texto completoMadhavi, Dhingra. "BYOD SECURITY AND ITS POSSIBLE SOLUTIONS." INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH 5, no. 2 :SE (February 28, 2018): 101–6. https://doi.org/10.5281/zenodo.1200272.
Texto completoGEANĂ, Ionuţ Cătălin. "Security Solutions for Informatics Systems." International Journal of Information Security and Cybercrime 1, no. 2 (December 21, 2012): 17–24. http://dx.doi.org/10.19107/ijisc.2012.02.02.
Texto completoDhiman, Deepika. "WLAN Security Issues and Solutions." IOSR Journal of Computer Engineering 16, no. 1 (2014): 67–75. http://dx.doi.org/10.9790/0661-16146775.
Texto completoFausett, Crystal M., Megan P. Christovich, Jarod M. Parker, John M. Baker, and Joseph R. Keebler. "Telemedicine Security: Challenges and Solutions." Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, no. 1 (June 2021): 340–44. http://dx.doi.org/10.1177/2327857921101241.
Texto completoTrubilin, Alexander Ivanovich, Konstantin Eduardovich Tyupakov, and Alexander Alexandrovich Adamenko. "Food security: problems and solutions." Proceedings of the Kuban State Agrarian University, no. 90 (2021): 5–10. http://dx.doi.org/10.21515/1999-1703-90-5-10.
Texto completoYaacob, Mashkuri, Farhat Anwar, Rashidah Funke Olanrewaju, Burhan Ul Islam Khan, and Roohie Naaz Mir. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.10026783.
Texto completoKhan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Farhat Anwar, Roohie Naaz Mir, and Mashkuri Yaacob. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.105180.
Texto completoSmith, Robert E. "Proactive Solutions for Multinetwork Security." Information Systems Security 3, no. 2 (January 1994): 47–55. http://dx.doi.org/10.1080/10658989409342456.
Texto completoNorifusa, Masaya. "Internet security: difficulties and solutions." International Journal of Medical Informatics 49, no. 1 (March 1998): 69–74. http://dx.doi.org/10.1016/s1386-5056(98)00012-4.
Texto completoHancock, Bill. "Network Solutions Re-evaluates Security." Computers & Security 19, no. 5 (July 2000): 398–400. http://dx.doi.org/10.1016/s0167-4048(00)05018-5.
Texto completoReid, Linda. "Information Security: Risks and Solutions." Journal of Information Privacy and Security 2, no. 1 (January 2006): 1–2. http://dx.doi.org/10.1080/15536548.2006.10855782.
Texto completoH.S, Anupama, Anusha M, Aparna Joshi, Apoorva N, N. K. Cauvery, and Lingaraju G.M. "Security Solutions Using Brain Signals." IAES International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (April 20, 2018): 105. http://dx.doi.org/10.11591/ijai.v7.i2.pp105-110.
Texto completoPotdar, Aarti, Pranav Patil, Raunak Bagla, and Rohitashwa Pandey. "Security Solutions for Cloud Computing." International Journal of Computer Applications 128, no. 16 (October 15, 2015): 17–21. http://dx.doi.org/10.5120/ijca2015906747.
Texto completoPhithakkitnukoon, Santi, Ram Dantu, and Enkh-Amgalan Baatarjav. "VoIP Security — Attacks and Solutions." Information Security Journal: A Global Perspective 17, no. 3 (July 29, 2008): 114–23. http://dx.doi.org/10.1080/19393550802308618.
Texto completoBarki, Amira, Abdelmadjid Bouabdallah, Said Gharout, and Jacques Traore. "M2M Security: Challenges and Solutions." IEEE Communications Surveys & Tutorials 18, no. 2 (2016): 1241–54. http://dx.doi.org/10.1109/comst.2016.2515516.
Texto completoPuri, Kunal Pradeep. "Cyber Security Challenges and Solutions." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (January 31, 2024): 49–50. http://dx.doi.org/10.22214/ijraset.2024.57793.
Texto completoPuri, Kunal Pradeep. "Cyber Security Challenges and Solutions." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (January 31, 2024): 49–50. http://dx.doi.org/10.22214/ijraset.2023.57793.
Texto completoZidanšek, Aleksander. "Creative Solutions for Human Security." Science, Art and Religion 3, no. 1--2 (March 27, 2024): 62–65. http://dx.doi.org/10.5005/jp-journals-11005-0069.
Texto completoZamir, Islomovich Jumakulov. "FOOD SECURITY: PROBLEMS AND SOLUTIONS." INTERNATIONAL BULLETIN OF APPLIED SCIENCE AND TECHNOLOGY 3, no. 5 (May 5, 2023): 178–82. https://doi.org/10.5281/zenodo.7898608.
Texto completoTiwari, Aniket Rajkumar. "Securing the Cloud: Overcoming Challenges and Implementing Solutions for Effective Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (May 31, 2024): 5100–5111. http://dx.doi.org/10.22214/ijraset.2024.62772.
Texto completoManohar Ghag, Omkar. "Firmware Security in Connected Electric Vehicles: Challenges and Solutions." International Journal of Science and Research (IJSR) 12, no. 10 (October 27, 2023): 2137–39. https://doi.org/10.21275/sr24302010944.
Texto completoZakarya, Muhammad, Muazzam Ali Khattak, Izaz Ur Rahman, and Ayaz Ali Khan. "Grid High Availability and Service Security Issues with Solutions." International Journal of Engineering and Technology 4, no. 6 (2012): 723–29. http://dx.doi.org/10.7763/ijet.2012.v4.472.
Texto completoSingh, Mandeep, Rajat Tyagi, Shivam Rathore, Pratyaksh Yadav, and Saksham Singh. "Decentralized Blockchain Solutions for Enhanced Document Security in Healthcare." International Journal of Research Publication and Reviews 5, no. 5 (May 26, 2024): 12647–52. http://dx.doi.org/10.55248/gengpi.5.0524.1446.
Texto completoKim, JiHoon, Jong In Lim, and Huy Kang Kim. "Collaborative security response by interworking between multiple security solutions." Journal of the Korea Institute of Information Security and Cryptology 23, no. 1 (February 28, 2013): 69–79. http://dx.doi.org/10.13089/jkiisc.2013.23.1.069.
Texto completoMalipeddi, Anil Kumar, and Sreekanth Pasunuru. "Securing DevOps CI/CD pipelines with Agent-Based and Agentless Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (December 30, 2024): 1–7. https://doi.org/10.55041/isjem01319.
Texto completoPiyushi, Gulati, Kumari Rana Kamini, Raghuvanshi Surabhi, and Anupama Pankaj Dr. "Android Operating System and its Security Issues." Journal of Android and IOS Applications and Testing 4, no. 1 (March 26, 2019): 1–9. https://doi.org/10.5281/zenodo.2605874.
Texto completoBS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.
Texto completoSonali Pandurang Doifode and Vishnukant Madhukar Biradar. "Cybersecurity in the Internet of Things (IoT): Challenges and Solutions." International Journal of Scientific Research in Modern Science and Technology 3, no. 7 (July 29, 2024): 17–21. http://dx.doi.org/10.59828/ijsrmst.v3i7.222.
Texto completoPOPESCU, Eliza-Elena. "VoIP Security Threats." International Journal of Information Security and Cybercrime 13, no. 1 (June 28, 2024): 66–70. http://dx.doi.org/10.19107/ijisc.2024.01.06.
Texto completoGaurav Malik and Prashasti. "Blockchain security- security challenges and solutions for decentralized systems and cryptocurrencies." International Journal of Science and Research Archive 9, no. 2 (August 30, 2023): 1074–100. https://doi.org/10.30574/ijsra.2023.9.2.0515.
Texto completoFotiou and Polyzos. "Name-Based Security for Information-Centric Networking Architectures." Future Internet 11, no. 11 (November 1, 2019): 232. http://dx.doi.org/10.3390/fi11110232.
Texto completoChen, Qiang, Daoming Li, and Lun Wang. "Network Security in the Internet of Things (IoT) Era." Journal of Industrial Engineering and Applied Science 2, no. 4 (August 1, 2024): 36–41. https://doi.org/10.5281/zenodo.12789562.
Texto completoBrown, Michael G., and Paolina Centonze. "Exploiting Flaws in Big Data Systems." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (May 17, 2016): 6967–75. http://dx.doi.org/10.24297/ijct.v15i8.1498.
Texto completoN, Dr Chitra Kiran, Mr Suhas Suresh, and Mrs Suchira Suresh. "Vulnerability, threats, and attacks in E-Payments System: Security Solutions." International Journal of Psychosocial Rehabilitation 24, no. 04 (February 28, 2020): 829–39. http://dx.doi.org/10.37200/ijpr/v24i4/pr201056.
Texto completoSingh, Dr Shashank. "Enhancing Safety and Security in Autonomous Cars: Challenges and Solutions." International Journal of Research Publication and Reviews 5, no. 2 (February 2024): 745–49. http://dx.doi.org/10.55248/gengpi.5.0224.0429.
Texto completoChhikara, Shashi, Iti Raghav, and Nitasha Hasteer. "Analyzing Security Solutions in Cloud Computing." International Journal of Computer Applications 68, no. 25 (April 18, 2013): 17–21. http://dx.doi.org/10.5120/11750-7247.
Texto completo