Artículos de revistas sobre el tema "Security solutions"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Security solutions".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai y Bhagyashri D. Dangewar. "Cloud Security: Problems and Solutions". International Journal of Scientific Research 3, n.º 4 (1 de junio de 2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.
Texto completoXu, Vincent. "Data Security Solutions". RESEARCH REVIEW International Journal of Multidisciplinary 05, n.º 07 (15 de julio de 2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.
Texto completoWebb, K. W. "Biometric Security Solutions". IEEE Security and Privacy Magazine 3, n.º 5 (septiembre de 2005): 7. http://dx.doi.org/10.1109/msp.2005.117.
Texto completoGOHOREANU, Bogdan, Florin SANDU y Dan-Nicolae ROBU. "SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS". SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, n.º 1 (31 de julio de 2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.
Texto completoWEBER, CYNTHIA y MARK LACY. "Securing by design". Review of International Studies 37, n.º 3 (1 de marzo de 2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.
Texto completoZakarya, Muhammad, Muazzam Ali Khattak, Izaz Ur Rahman y Ayaz Ali Khan. "Grid High Availability and Service Security Issues with Solutions". International Journal of Engineering and Technology 4, n.º 6 (2012): 723–29. http://dx.doi.org/10.7763/ijet.2012.v4.472.
Texto completoGEANĂ, Ionuţ Cătălin. "Security Solutions for Informatics Systems". International Journal of Information Security and Cybercrime 1, n.º 2 (21 de diciembre de 2012): 17–24. http://dx.doi.org/10.19107/ijisc.2012.02.02.
Texto completoDhiman, Deepika. "WLAN Security Issues and Solutions". IOSR Journal of Computer Engineering 16, n.º 1 (2014): 67–75. http://dx.doi.org/10.9790/0661-16146775.
Texto completoFausett, Crystal M., Megan P. Christovich, Jarod M. Parker, John M. Baker y Joseph R. Keebler. "Telemedicine Security: Challenges and Solutions". Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, n.º 1 (junio de 2021): 340–44. http://dx.doi.org/10.1177/2327857921101241.
Texto completoTrubilin, Alexander Ivanovich, Konstantin Eduardovich Tyupakov y Alexander Alexandrovich Adamenko. "Food security: problems and solutions". Proceedings of the Kuban State Agrarian University, n.º 90 (2021): 5–10. http://dx.doi.org/10.21515/1999-1703-90-5-10.
Texto completoYaacob, Mashkuri, Farhat Anwar, Rashidah Funke Olanrewaju, Burhan Ul Islam Khan y Roohie Naaz Mir. "Scrutinising internet banking security solutions". International Journal of Information and Computer Security 12, n.º 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.10026783.
Texto completoKhan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Farhat Anwar, Roohie Naaz Mir y Mashkuri Yaacob. "Scrutinising internet banking security solutions". International Journal of Information and Computer Security 12, n.º 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.105180.
Texto completoSmith, Robert E. "Proactive Solutions for Multinetwork Security". Information Systems Security 3, n.º 2 (enero de 1994): 47–55. http://dx.doi.org/10.1080/10658989409342456.
Texto completoNorifusa, Masaya. "Internet security: difficulties and solutions". International Journal of Medical Informatics 49, n.º 1 (marzo de 1998): 69–74. http://dx.doi.org/10.1016/s1386-5056(98)00012-4.
Texto completoHancock, Bill. "Network Solutions Re-evaluates Security". Computers & Security 19, n.º 5 (julio de 2000): 398–400. http://dx.doi.org/10.1016/s0167-4048(00)05018-5.
Texto completoReid, Linda. "Information Security: Risks and Solutions". Journal of Information Privacy and Security 2, n.º 1 (enero de 2006): 1–2. http://dx.doi.org/10.1080/15536548.2006.10855782.
Texto completoH.S, Anupama, Anusha M, Aparna Joshi, Apoorva N, N. K. Cauvery y Lingaraju G.M. "Security Solutions Using Brain Signals". IAES International Journal of Artificial Intelligence (IJ-AI) 7, n.º 2 (20 de abril de 2018): 105. http://dx.doi.org/10.11591/ijai.v7.i2.pp105-110.
Texto completoPotdar, Aarti, Pranav Patil, Raunak Bagla y Rohitashwa Pandey. "Security Solutions for Cloud Computing". International Journal of Computer Applications 128, n.º 16 (15 de octubre de 2015): 17–21. http://dx.doi.org/10.5120/ijca2015906747.
Texto completoPhithakkitnukoon, Santi, Ram Dantu y Enkh-Amgalan Baatarjav. "VoIP Security — Attacks and Solutions". Information Security Journal: A Global Perspective 17, n.º 3 (29 de julio de 2008): 114–23. http://dx.doi.org/10.1080/19393550802308618.
Texto completoBarki, Amira, Abdelmadjid Bouabdallah, Said Gharout y Jacques Traore. "M2M Security: Challenges and Solutions". IEEE Communications Surveys & Tutorials 18, n.º 2 (2016): 1241–54. http://dx.doi.org/10.1109/comst.2016.2515516.
Texto completoKim, JiHoon, Jong In Lim y Huy Kang Kim. "Collaborative security response by interworking between multiple security solutions". Journal of the Korea Institute of Information Security and Cryptology 23, n.º 1 (28 de febrero de 2013): 69–79. http://dx.doi.org/10.13089/jkiisc.2013.23.1.069.
Texto completoN, Dr Chitra Kiran, Mr Suhas Suresh y Mrs Suchira Suresh. "Vulnerability, threats, and attacks in E-Payments System: Security Solutions". International Journal of Psychosocial Rehabilitation 24, n.º 04 (28 de febrero de 2020): 829–39. http://dx.doi.org/10.37200/ijpr/v24i4/pr201056.
Texto completoFotiou y Polyzos. "Name-Based Security for Information-Centric Networking Architectures". Future Internet 11, n.º 11 (1 de noviembre de 2019): 232. http://dx.doi.org/10.3390/fi11110232.
Texto completoBrown, Michael G. y Paolina Centonze. "Exploiting Flaws in Big Data Systems". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, n.º 8 (17 de mayo de 2016): 6967–75. http://dx.doi.org/10.24297/ijct.v15i8.1498.
Texto completoChhikara, Shashi, Iti Raghav y Nitasha Hasteer. "Analyzing Security Solutions in Cloud Computing". International Journal of Computer Applications 68, n.º 25 (18 de abril de 2013): 17–21. http://dx.doi.org/10.5120/11750-7247.
Texto completoDhingra, Madhavi. "BYOD SECURITY AND ITS POSSIBLE SOLUTIONS". International Journal of Engineering Technologies and Management Research 5, n.º 2 (27 de abril de 2020): 101–6. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.620.
Texto completoRosaire, Senou Mahugnon y Degila Jules. "Smart Contracts Security Threats and Solutions". International Journal of Information Technology and Web Engineering 17, n.º 1 (1 de enero de 2022): 1–30. http://dx.doi.org/10.4018/ijitwe.304048.
Texto completoTrabelsi, Zouheir y Wassim El Hajj. "On investigating ARP spoofing security solutions". International Journal of Internet Protocol Technology 5, n.º 1/2 (2010): 92. http://dx.doi.org/10.1504/ijipt.2010.032618.
Texto completoSTEFAN, HENRY y LIAKAT ALI Md. "CLOUD COMPUTING SECURITY THREATS AND SOLUTIONS". i-manager’s Journal on Cloud Computing 4, n.º 2 (2017): 1. http://dx.doi.org/10.26634/jcc.4.2.14249.
Texto completoEljialy, A. E. M. "Proposed Solutions of Oracle Sysdba Security". Journal of Industrial and Intelligent Information 1, n.º 1 (2013): 68–71. http://dx.doi.org/10.12720/jiii.1.1.68-71.
Texto completoCAZACU, Andrei-Robert. "IoT Security: Threats and Possible Solutions". Informatica Economica 26, n.º 2/2022 (30 de junio de 2022): 57–64. http://dx.doi.org/10.24818/issn14531305/26.2.2022.06.
Texto completoFortov, V. E., A. A. Makarov y T. A. Mitrova. "Global energy security: Problems and solutions". Herald of the Russian Academy of Sciences 77, n.º 1 (febrero de 2007): 7–14. http://dx.doi.org/10.1134/s1019331607010029.
Texto completoHerath, Tejaswini C., Hemantha S. B. Herath y John D'Arcy. "Organizational Adoption of Information Security Solutions". ACM SIGMIS Database: the DATABASE for Advances in Information Systems 51, n.º 2 (13 de mayo de 2020): 12–35. http://dx.doi.org/10.1145/3400043.3400046.
Texto completoShoham, O. "IP@SS - integrated passenger security solutions". IEEE Aerospace and Electronic Systems Magazine 18, n.º 3 (marzo de 2003): 16–21. http://dx.doi.org/10.1109/maes.2003.1193714.
Texto completoBlatchford, Clive W. "The Fight for International Security Solutions". Information Systems Security 2, n.º 3 (enero de 1993): 23–27. http://dx.doi.org/10.1080/19393559308551363.
Texto completoFlater, David. "Bad Security Metrics Part 2: Solutions". IT Professional 20, n.º 2 (marzo de 2018): 76–79. http://dx.doi.org/10.1109/mitp.2018.021921653.
Texto completoOgiela, Marek R. "Cognitive solutions for security and cryptography". Cognitive Systems Research 55 (junio de 2019): 258–61. http://dx.doi.org/10.1016/j.cogsys.2019.02.006.
Texto completoS., Dr Arunkumar. "Cryptography based Security Solutions to IOT Enabled Health Care Monitoring System". Journal of Advanced Research in Dynamical and Control Systems 12, n.º 7 (20 de julio de 2020): 265–72. http://dx.doi.org/10.5373/jardcs/v12i7/20202008.
Texto completoDarji, Dhara N. y Nita B. Thakkar. "Challenges in Mobile Ad Hoc Networks: Security Threats and its Solutions". Indian Journal of Applied Research 3, n.º 1 (1 de octubre de 2011): 72–74. http://dx.doi.org/10.15373/2249555x/jan2013/29.
Texto completoMAREȘ, Marian-Sorin. "Solutions to Secure a Network". International Journal of Information Security and Cybercrime 7, n.º 2 (29 de diciembre de 2018): 41–51. http://dx.doi.org/10.19107/ijisc.2018.02.05.
Texto completoZanoon, Nabeel, Nashat Albdour, Hatem S. A. Hamatta y Rasha Moh'd Al-Tarawneh. "Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security Solutions". International Journal of Network Security & Its Applications 7, n.º 3 (30 de mayo de 2015): 01–13. http://dx.doi.org/10.5121/ijnsa.2015.7301.
Texto completoMichelberger, Pál y Ágnes Kemendi. "DATA, INFORMATION AND IT SECURITY - SOFTWARE SUPPORT FOR SECURITY ACTIVITIES". Problems of Management in the 21st Century 15, n.º 2 (10 de diciembre de 2020): 108–24. http://dx.doi.org/10.33225/pmc/20.15.108.
Texto completoKaliyamurthy, Nitheesh Murugan, Swapnesh Taterh y Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks". International Journal of Applied Metaheuristic Computing 10, n.º 4 (octubre de 2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.
Texto completoMohan, Madan, Aadarsh Malviya y Anuranjan Mishra. "Big Data Security Problem and Its Solutions". International Journal of Engineering and Advanced Technology 11, n.º 1 (30 de octubre de 2021): 34–36. http://dx.doi.org/10.35940/ijeat.a3130.1011121.
Texto completoTawalbeh, Lo’ai, Fadi Muheidat, Mais Tawalbeh y Muhannad Quwaider. "IoT Privacy and Security: Challenges and Solutions". Applied Sciences 10, n.º 12 (15 de junio de 2020): 4102. http://dx.doi.org/10.3390/app10124102.
Texto completoSharma, Ravi y Nonita Sharma. "Attacks on Resource-Constrained IoT Devices and Security Solutions". International Journal of Software Science and Computational Intelligence 14, n.º 1 (1 de enero de 2022): 1–21. http://dx.doi.org/10.4018/ijssci.310943.
Texto completoRamanauskaitė, Simona, Anatoly Shein, Antanas Čenys y Justinas Rastenis. "Security Ontology Structure for Formalization of Security Document Knowledge". Electronics 11, n.º 7 (31 de marzo de 2022): 1103. http://dx.doi.org/10.3390/electronics11071103.
Texto completoKarimkulov, Kurbonkul Mavlankulovich, Ikromjon Esanboyevich Uzohkov y Madraim Khasanovich Sarikulov. "Food security in Uzbekistan: Problems and solutions". South Asian Journal of Marketing & Management Research 10, n.º 11 (2020): 115–23. http://dx.doi.org/10.5958/2249-877x.2020.00080.6.
Texto completoLevashov, Viktor y Viliam Sarian. "The digitalization and security: problems and solutions". Social novelties and Social sciences, n.º 1 (2020): 37–46. http://dx.doi.org/10.31249/snsn/2020.01.03.
Texto completoIbn Minar, Nateq Be Nazir. "Bluetooth Security Threats And Solutions: A Survey". International Journal of Distributed and Parallel systems 3, n.º 1 (31 de enero de 2012): 127–48. http://dx.doi.org/10.5121/ijdps.2012.3110.
Texto completo