Siga este enlace para ver otros tipos de publicaciones sobre el tema: Security solutions.

Artículos de revistas sobre el tema "Security solutions"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Security solutions".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai, and Bhagyashri D. Dangewar. "Cloud Security: Problems and Solutions." International Journal of Scientific Research 3, no. 4 (June 1, 2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Xu, Vincent. "Data Security Solutions." RESEARCH REVIEW International Journal of Multidisciplinary 05, no. 07 (July 15, 2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Webb, K. W. "Biometric Security Solutions." IEEE Security and Privacy Magazine 3, no. 5 (September 2005): 7. http://dx.doi.org/10.1109/msp.2005.117.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

GOHOREANU, Bogdan, Florin SANDU, and Dan-Nicolae ROBU. "SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 1 (July 31, 2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Nanuru Yagamurthy, Deepak, and Rajesh Azmeera. "Security Challenges and Solutions in Cloud Computing." International Journal of Science and Research (IJSR) 7, no. 8 (August 5, 2018): 1690–93. http://dx.doi.org/10.21275/sr24517174709.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Li, Daoming, Qiang Chen, and Lun Wang. "Cloud Security: Challenges and Solutions." Journal of Industrial Engineering and Applied Science 2, no. 4 (August 1, 2024): 42–47. https://doi.org/10.5281/zenodo.12789566.

Texto completo
Resumen
As cloud computing continues to grow and become integral to business operations, securing cloud environments has emerged as a critical concern. This paper explores the multifaceted challenges of cloud security and proposes solutions to mitigate these risks. We discuss the inherent vulnerabilities of cloud infrastructure, the complexities of data protection, and the difficulties in maintaining compliance and governance. Specifically, we address issues such as data breaches, insider threats, and the lack of visibility and control in cloud environments. Through comprehensive analysis and experimental data, we demonstrate the effectiveness of various security measures, including encryption, access control, Security Information and Event Management (SIEM) systems, and automated compliance management tools, in enhancing cloud security. The findings highlight best practices and strategies to safeguard cloud environments against evolving cyber threats, ensuring data integrity, confidentiality, and regulatory compliance.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Anupama.H.S, M. Anusha, Joshi Aparna, N. Apoorva, K.Cauvery N., and Lingaraju.G.M. "Security Solutions Using Brain Signals." International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (June 1, 2018): 105–10. https://doi.org/10.11591/ijai.v7.i2.pp105-110.

Texto completo
Resumen
A brain computer interface is a direct neural interface or a brain–machine interface. It provides a communication path between human brain and the computer system. It aims to convey people's intentions to the outside world directly from their thoughts. This paper focuses on current model which uses brain signals for the authentication of users. The Electro-encephalogram (EEG) signals are recorded from the neuroheadset when a user is shown a key image (signature image). These signals are further processed and are interpreted to obtain the thought pattern of the user to match them to the stored password in the system. Even if other person is presented with the same key image it fails to authenticate as the cortical folds of the brain are unique to each human being just like a fingerprint or DNA.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Kenny, Peter. "Security and risk appraisal — EDIFACT security solutions." EDI in Finance 1991, no. 2 (February 1991): 4–7. https://doi.org/10.1016/0960-4634(91)90090-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Ranjana, Patel, and Arakh Rajendra. "Cyber Security Challenges & Their Solutions in India." International Journal of Trend in Research and Development 9, no. 1 (January 20, 2022): 616–20. https://doi.org/10.5281/zenodo.6345325.

Texto completo
Resumen
<strong><em>Abstract: </em></strong>Because the general population becomes increasingly progressively more and a lot of refined in their understanding and use of computers and because the technologies related to computing become more powerful, there&#39;s a robust chance that cybercrimes can become a lot of common. India is rated collectively of the countries with the very best levels of e-crime activities. Despite years of enhancements to the usability of interactive, end user facing security systems aboard a fast and sustained growth of law breaking, several of those security systems stay underutilized. It is, however, turning into more and more necessary that security are some things end users actively utilize and interact with. While a cyber security breach these days may represent loss, embarrassment and therefore the loss of holding, it would tomorrow constitute loss of management over our homes, cars and bodies. One drawback is that whereas the usability of security systems has improved, attitudes regarding the importance of end user security has not the awareness of security threats and out there defenses, the motivation to utilize counseled security tools and behaviors, and therefore the data of the way to use counseled security tools and behaviors stay low. How will we tend to smart and intelligent systems that encourage higher cyber security behaviors?&nbsp; It is a most challenging goal in front of Indian Government.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Golchha, Prakhar, Rajesh Deshmukh, and Palak Lunia. "A Review on Network Security Threats and Solutions." International Journal of Scientific Engineering and Research 3, no. 4 (April 27, 2015): 21–24. https://doi.org/10.70729/ijser1567.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Singh Gurjit Singh, Sahibdeep. "Microservices Security Challenges and Solutions in Cloud Environment." International Journal of Science and Research (IJSR) 13, no. 3 (March 5, 2024): 201–5. http://dx.doi.org/10.21275/sr24303144734.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Nabeel, Zanoon, Albdour Nashat, S. A. Hamatta Hatem, and Al-Tarawneh RashaMoh'd. "SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND SECURITY SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (May 27, 2015): 01–13. https://doi.org/10.5281/zenodo.8162659.

Texto completo
Resumen
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute challenges and weaknesses before the security progress in MANET network. It causes weakness in security, which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between them will be concluded and architectural security solutions in MANET will beproposed. &nbsp;
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

WEBER, CYNTHIA, and MARK LACY. "Securing by design." Review of International Studies 37, no. 3 (March 1, 2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.

Texto completo
Resumen
AbstractThis article investigates how modern neo-liberal states are ‘securing by design’ – harnessing design to new technologies in order to produce security, safety, and protection. We take a critical view toward ‘securing by design’ and the policy agendas it produces of ‘designing out insecurity’ and ‘designing in protection’ because securing by design strategies rely upon inadequate conceptualisations of security, technology, and design and inadequate understandings of their relationships to produce inadequate ‘security solutions’ to ready-made ‘security problems’. This critique leads us to propose a new research agenda we call Redesigning Security. A Redesigning Security Approach begins from a recognition that the achievement of security is more often than not illusive, which means that the desire for security is itself problematic. Rather than encouraging the design of ‘security solutions’ – a securing by design – a Redesigning Security Approach explores how we mightinsecure securing by design. By acknowledging and then moving beyond the new security studies insight that security often produces insecurity, our approach uses design as a vehicle through which to raise questions about security problems and security solutions by collaborating with political and critical design practitioners to design concrete material objects that themselves embody questions about traditional security and about traditional design practices that use technology to depoliticise how technology is deployed by states and corporations to make us ‘safe’.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Mittal, Himani. "Software security: Threats, solutions and challenges." Computer Software and Media Applications 6, no. 1 (February 21, 2024): 3769. http://dx.doi.org/10.24294/csma.v6i1.3769.

Texto completo
Resumen
Software security is of great concern as computers have entered almost all walks of life and people at large have become dependent on technology for not only entertainment and communication but for performing tasks involving money and a lot of stake. Software security not only involves securing the software but also user data and communication media. This paper states the several types of security threats that exist since the time networking has evolved, namely, malware, Trojans, viruses, denial of service attacks, and many more. This paper reviews several measures to address these threats. It includes logging, anti-malware, network security methods, and encryption methods. It has been identified that a lot of work has been done to deal with security threats, and it is not only limited to the protection of software but also extends to the protection of data and networks. The existing methods make extensive use of artificial intelligence, and it is identified that there is a need to develop a model that is able to identify known as well as unknown threats. There is a huge scope for research in this area.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Madhavi, Dhingra. "BYOD SECURITY AND ITS POSSIBLE SOLUTIONS." INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH 5, no. 2 :SE (February 28, 2018): 101–6. https://doi.org/10.5281/zenodo.1200272.

Texto completo
Resumen
BYOD (Bring your own Device) is a piece of its bigger pattern consumerization, in which purchaser programming and equipment are being brought into the undertaking. BYOT (bring your own particular innovation) alludes to the utilization of customer gadgets and applications in the workplace. An powerful BYOD procedure can prompt various advantages for organizations, including enhanced representative employment fulfillment, expanded occupation proficiency and adaptability. BYOD can likewise give cost reserve funds from starting gadget buy to on-going use and IT helpdesk bolster as representatives put resources into their own gadgets. Despite worries about Bring Your Own Device (BYOD) security dangers, representatives over the previous years have appreciated the different advantages of BYOD. So too have businesses, who are far-fetched ever to prevent staff from conveying their own particular gadgets to work or utilizing them remotely for work purposes. The test stays to distinguish security dangers related with BYOD and locate the most fitting answers for alleviate these risks. By recognizing potential dangers, the framework can settle on an astute choice in the matter of how to react. This paper manages the security dangers related with it and the conceivable answers for it.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

GEANĂ, Ionuţ Cătălin. "Security Solutions for Informatics Systems." International Journal of Information Security and Cybercrime 1, no. 2 (December 21, 2012): 17–24. http://dx.doi.org/10.19107/ijisc.2012.02.02.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Dhiman, Deepika. "WLAN Security Issues and Solutions." IOSR Journal of Computer Engineering 16, no. 1 (2014): 67–75. http://dx.doi.org/10.9790/0661-16146775.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Fausett, Crystal M., Megan P. Christovich, Jarod M. Parker, John M. Baker, and Joseph R. Keebler. "Telemedicine Security: Challenges and Solutions." Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, no. 1 (June 2021): 340–44. http://dx.doi.org/10.1177/2327857921101241.

Texto completo
Resumen
The proliferation of telemedicine spurred by the COVID-19 pandemic has come with a variety of human factors challenges. Such challenges include mitigating potential risks associated with the quick transition to virtual care. We identify challenges and solutions related to telemedicine security, and analyze our results using Schlarman’s People, Policy, Technology framework (2001). Our systematic literature review synthesizes gray literature (white papers, news articles, and blog posts) in addition to formal (published) literature. This methodology closes the gap between academic research and professional practice and aids in providing timely, practical insights related to cybersecurity and safety in virtual care environments. As the transition from traditional care continues to develop, we seek to better understand emerging vulnerabilities, identify crucial cyber hygiene practices, and provide insights on how to improve the safety of patient data in virtual care. Telemedicine is here to stay, and lessons learned from the pandemic are likely to remain useful.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Trubilin, Alexander Ivanovich, Konstantin Eduardovich Tyupakov, and Alexander Alexandrovich Adamenko. "Food security: problems and solutions." Proceedings of the Kuban State Agrarian University, no. 90 (2021): 5–10. http://dx.doi.org/10.21515/1999-1703-90-5-10.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Yaacob, Mashkuri, Farhat Anwar, Rashidah Funke Olanrewaju, Burhan Ul Islam Khan, and Roohie Naaz Mir. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.10026783.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Khan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Farhat Anwar, Roohie Naaz Mir, and Mashkuri Yaacob. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.105180.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Smith, Robert E. "Proactive Solutions for Multinetwork Security." Information Systems Security 3, no. 2 (January 1994): 47–55. http://dx.doi.org/10.1080/10658989409342456.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Norifusa, Masaya. "Internet security: difficulties and solutions." International Journal of Medical Informatics 49, no. 1 (March 1998): 69–74. http://dx.doi.org/10.1016/s1386-5056(98)00012-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Hancock, Bill. "Network Solutions Re-evaluates Security." Computers & Security 19, no. 5 (July 2000): 398–400. http://dx.doi.org/10.1016/s0167-4048(00)05018-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Reid, Linda. "Information Security: Risks and Solutions." Journal of Information Privacy and Security 2, no. 1 (January 2006): 1–2. http://dx.doi.org/10.1080/15536548.2006.10855782.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

H.S, Anupama, Anusha M, Aparna Joshi, Apoorva N, N. K. Cauvery, and Lingaraju G.M. "Security Solutions Using Brain Signals." IAES International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (April 20, 2018): 105. http://dx.doi.org/10.11591/ijai.v7.i2.pp105-110.

Texto completo
Resumen
A Brain Computer Interface is a direct neural interface or a brain–machine interface. It provides a communication path between human brain and the computer system. It aims to convey people's intentions to the outside world directly from their thoughts. This paper focuses on current model which uses brain signals for the authentication of users. The Electro- Encephalogram (EEG) signals are recorded from the neuroheadset when a user is shown a key image (signature image). These signals are further processed and are interpreted to obtain the thought pattern of the user to match them to the stored password in the system. Even if other person is presented with the same key image it fails to authenticate as the cortical folds of the brain are unique to each human being just like a fingerprint or DNA.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Potdar, Aarti, Pranav Patil, Raunak Bagla, and Rohitashwa Pandey. "Security Solutions for Cloud Computing." International Journal of Computer Applications 128, no. 16 (October 15, 2015): 17–21. http://dx.doi.org/10.5120/ijca2015906747.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Phithakkitnukoon, Santi, Ram Dantu, and Enkh-Amgalan Baatarjav. "VoIP Security — Attacks and Solutions." Information Security Journal: A Global Perspective 17, no. 3 (July 29, 2008): 114–23. http://dx.doi.org/10.1080/19393550802308618.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Barki, Amira, Abdelmadjid Bouabdallah, Said Gharout, and Jacques Traore. "M2M Security: Challenges and Solutions." IEEE Communications Surveys & Tutorials 18, no. 2 (2016): 1241–54. http://dx.doi.org/10.1109/comst.2016.2515516.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Puri, Kunal Pradeep. "Cyber Security Challenges and Solutions." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (January 31, 2024): 49–50. http://dx.doi.org/10.22214/ijraset.2024.57793.

Texto completo
Resumen
Abstract: This article discusses the challenges and opportunities in the field of Cyber Physical Systems (CPSs). It highlights the integration of the physical and digital realms in CPSs and the increasing importance of security in this context. The article provides an overview of the challenges faced by CPSs and suggests potential solutions to address them. It emphasizes the need for preventive measures, coordination, lightweight solutions, and early-stage verification to enhance the security and effectiveness of CPSs.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Puri, Kunal Pradeep. "Cyber Security Challenges and Solutions." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (January 31, 2024): 49–50. http://dx.doi.org/10.22214/ijraset.2023.57793.

Texto completo
Resumen
Abstract: This article discusses the challenges and opportunities in the field of Cyber Physical Systems (CPSs). It highlights the integration of the physical and digital realms in CPSs and the increasing importance of security in this context. The article provides an overview of the challenges faced by CPSs and suggests potential solutions to address them. It emphasizes the need for preventive measures, coordination, lightweight solutions, and early-stage verification to enhance the security and effectiveness of CPSs.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Zidanšek, Aleksander. "Creative Solutions for Human Security." Science, Art and Religion 3, no. 1--2 (March 27, 2024): 62–65. http://dx.doi.org/10.5005/jp-journals-11005-0069.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Zamir, Islomovich Jumakulov. "FOOD SECURITY: PROBLEMS AND SOLUTIONS." INTERNATIONAL BULLETIN OF APPLIED SCIENCE AND TECHNOLOGY 3, no. 5 (May 5, 2023): 178–82. https://doi.org/10.5281/zenodo.7898608.

Texto completo
Resumen
Today, environmental and other problems such as drought, desertification and water scarcity threaten food security throughout the planet. The article focuses on the essence of the concept of food safety and the main directions of state policy to ensure it.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Tiwari, Aniket Rajkumar. "Securing the Cloud: Overcoming Challenges and Implementing Solutions for Effective Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (May 31, 2024): 5100–5111. http://dx.doi.org/10.22214/ijraset.2024.62772.

Texto completo
Resumen
Abstract: “This research paper provides a sufficient overview of security challenges in cloud computing and corresponding solutions. Challenges include data breaches, compliance issues, and insider threats, while solutions encompass robust access controls, encryption, and API security measures. By implementing these solutions, organizations can mitigate risks and securely harness the advantages of cloud computing.”
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Manohar Ghag, Omkar. "Firmware Security in Connected Electric Vehicles: Challenges and Solutions." International Journal of Science and Research (IJSR) 12, no. 10 (October 27, 2023): 2137–39. https://doi.org/10.21275/sr24302010944.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Zakarya, Muhammad, Muazzam Ali Khattak, Izaz Ur Rahman, and Ayaz Ali Khan. "Grid High Availability and Service Security Issues with Solutions." International Journal of Engineering and Technology 4, no. 6 (2012): 723–29. http://dx.doi.org/10.7763/ijet.2012.v4.472.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Singh, Mandeep, Rajat Tyagi, Shivam Rathore, Pratyaksh Yadav, and Saksham Singh. "Decentralized Blockchain Solutions for Enhanced Document Security in Healthcare." International Journal of Research Publication and Reviews 5, no. 5 (May 26, 2024): 12647–52. http://dx.doi.org/10.55248/gengpi.5.0524.1446.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Kim, JiHoon, Jong In Lim, and Huy Kang Kim. "Collaborative security response by interworking between multiple security solutions." Journal of the Korea Institute of Information Security and Cryptology 23, no. 1 (February 28, 2013): 69–79. http://dx.doi.org/10.13089/jkiisc.2013.23.1.069.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Malipeddi, Anil Kumar, and Sreekanth Pasunuru. "Securing DevOps CI/CD pipelines with Agent-Based and Agentless Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (December 30, 2024): 1–7. https://doi.org/10.55041/isjem01319.

Texto completo
Resumen
As organizations increasingly adopt containerized applications and Continuous Integration/Continuous Deployment (CI/CD) pipelines, managing and securing secrets becomes critical to maintaining robust security. CI/CD pipelines are critical to modern software development, enabling rapid delivery of software updates. However, these pipelines often handle sensitive secrets such as credentials, API keys, and tokens, making them an attractive target for adversaries. This paper explores two distinct approaches to secrets management in DevOps environments: agent- based solutions, such as CyberArk Credential Providers, and agentless solutions, such as centralized credential providers. We also examine the use of CyberArk Conjur for securing secrets in containerized applications and CI/CD tools like Jenkins. By comparing these approaches and presenting best practices, this paper highlights their roles in enhancing security, operational efficiency, and compliance in DevOps pipelines. Keywords: DevOps, Secrets Management, CyberArk Conjur, CI/CD Security, Credential Providers, CCP, Agent- Based Solutions, Agentless Solutions, Jenkins, Container Security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Piyushi, Gulati, Kumari Rana Kamini, Raghuvanshi Surabhi, and Anupama Pankaj Dr. "Android Operating System and its Security Issues." Journal of Android and IOS Applications and Testing 4, no. 1 (March 26, 2019): 1–9. https://doi.org/10.5281/zenodo.2605874.

Texto completo
Resumen
<em>Android is a Mobile and Tablet Operating System </em><em>premised on </em><em>the Linux kernel owned by Google. The ultimate innovative feature of Android Operating System is open source due to this anyone can publish their applications freely on the Android market. This openness introduces the broad number of developers which utilize this platform, but it comes with the hazard that user may download malicious software which is written by network hackers and harm to its privacy. This requires the study of the Security Mechanisms for Android and to make it easy and user-friendly to make the user aware of areas where he has to be cautious. This paper gives an idea about the architecture of the Android operating system, security features of an android, security issues faced by the Android and solutions for security issues of the Android operating system.</em>
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

BS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.

Texto completo
Resumen
The process of defending computer networks from cyber attacks or unintended, unauthorized access is known as cyber security. Organizations, businesses, and governments need cyber security solutions because cyber criminals pose a threat to everyone. Artificial intelligence promises to be a great solution for this. Security experts are better able to defend vulnerable networks and data from cyber attackers by combining the strengths of artificial intelligence and cyber security. This paper provides an introduction to the use of artificial intelligence in cyber security. AI-driven cyber security refers to the use of artificial intelligence and machine learning technologies to enhance the protection of computer systems and networks from cyber threats such as hacking, malware, phishing, and other forms of cyberattacks. AI-powered security solutions are designed to automate the process of detecting, analyzing, and responding to security incidents in real-time, thereby improving the efficiency and effectiveness of cyber defense. These solutions can analyze large amounts of data, identify patterns and anomalies, and make decisions faster and more accurately than humans alone, enabling organizations to stay ahead of evolving cyber threats.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Sonali Pandurang Doifode and Vishnukant Madhukar Biradar. "Cybersecurity in the Internet of Things (IoT): Challenges and Solutions." International Journal of Scientific Research in Modern Science and Technology 3, no. 7 (July 29, 2024): 17–21. http://dx.doi.org/10.59828/ijsrmst.v3i7.222.

Texto completo
Resumen
The IOT is changing the way we communicate and interact across businesses, enabling unprecedented productivity, efficiency, and data storage simulation. Development of IOT has brought many benefits but also significant challenges to network security. This article explores the key challenges in securing IoT environments, including device diversity, limited budgets, lack of security protocols, and vulnerability of transmitted information. Evaluate solutions such as the use of lightweight encryption algorithms, zerotrust architectures, and AI driven security systems to assess their potential effectiveness. The findings of this study highlight requirement of a multilayered and adaptive approach to securing the IoT ecosystem that can counter current and emerging threats.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

POPESCU, Eliza-Elena. "VoIP Security Threats." International Journal of Information Security and Cybercrime 13, no. 1 (June 28, 2024): 66–70. http://dx.doi.org/10.19107/ijisc.2024.01.06.

Texto completo
Resumen
Nowadays, communication is based on a wide variety of solutions, especially using the real-time ones. People use a lot of online tools that offer them audio-video solutions, and the most important thing is that anyone has access to them, and there are easy to use. VoIP (Voice over IP) is one of the most used solutions today, with which everyone can make calls over the internet. Like any other service that is exposed to the internet, it presents risks for the data violation and administrators or any people that use this service, needs to secure the system.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Gaurav Malik and Prashasti. "Blockchain security- security challenges and solutions for decentralized systems and cryptocurrencies." International Journal of Science and Research Archive 9, no. 2 (August 30, 2023): 1074–100. https://doi.org/10.30574/ijsra.2023.9.2.0515.

Texto completo
Resumen
Blockchain technology is a chain of blocks formed using cryptography on multiple computers. It keeps a list of distributed transactions and ensures it is transparent, immutable, and hard to manipulate. Blockchain’s inherent security features would strengthen its build, including cryptographic hashing, consensus algorithms, and immutability. However, it is also highly exposed and vulnerable to several threats. In decentralized systems and cryptocurrencies, blockchain security is a crucial point of security to protect from attacks on systems, data breaches, and financial loss. Challenges in the Security of Blockchain Networks. This paper explores 51% of attacks in blockchain networks, vulnerabilities in smart contracts, and privacy issues faced by blockchain networks. Since blockchain is decentralized, these challenges are among the reasons its nature is inherently more secure than any traditional centralized system, as they cannot allow a single point of failure. A key element for secure blockchain transactions is security mechanisms like cryptography, proof of work, proof of stake, and multi-signature solutions. However, this is somewhat stifled by the fact that blockchain applications have expanded far beyond cryptos, such as healthcare, supply chains, and systems, such as voting, and the requirement for robust security grows. To address these issues, blockchain security must continuously adopt innovation in blockchain security practice, such as developing decentralized security solutions and post-quantum cryptography, up to a comprehensive security framework. Security in the blockchain is the key to securing digital assets, privacy protection, and trust on the decentralized networks mentioned in this paper. To solve the new and evolving threats that will become a menace to blockchain security in the future, we will combine the new technologies of artificial intelligence, quantum-resistant cryptography, and decentralized identity management.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Fotiou and Polyzos. "Name-Based Security for Information-Centric Networking Architectures." Future Internet 11, no. 11 (November 1, 2019): 232. http://dx.doi.org/10.3390/fi11110232.

Texto completo
Resumen
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice. For this paper, we designed and evaluated name-based security solutions that satisfy security requirements that are particular to ICN architectures. In order to achieve our goal, we leverage identity-based encryption, identity-based proxy re-encryption, and the emerging paradigm of decentralized identifiers. Our solutions support outsourcing content storage, content integrity protection and content authentication, and provenance verification, as well as access control. We show that our solutions have tolerable storage and computation overhead, thus proving their feasibility.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Chen, Qiang, Daoming Li, and Lun Wang. "Network Security in the Internet of Things (IoT) Era." Journal of Industrial Engineering and Applied Science 2, no. 4 (August 1, 2024): 36–41. https://doi.org/10.5281/zenodo.12789562.

Texto completo
Resumen
The Internet of Things (IoT) represents a significant transformation in how devices communicate and interact, offering unprecedented convenience and efficiency. However, this interconnected environment also introduces substantial security challenges. Traditional network security measures are often inadequate for IoT environments due to their unique characteristics, such as resource constraints and diverse device types. This paper explores the current state of network security in the IoT era, examines the specific challenges posed by IoT environments, and presents innovative solutions and best practices for securing IoT networks. Through comprehensive analysis and experimental data, we demonstrate the effectiveness of these solutions in mitigating security risks associated with IoT.Specifically, we investigate the implementation of lightweight cryptography for resource-constrained devices, the use of blockchain technology for secure and decentralized authentication, the application of machine learning algorithms for anomaly detection, and the integration of fog computing to enhance real-time security services. Experimental results indicate significant improvements in security posture and performance, validating the proposed methodologies as viable solutions for IoT security challenges.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Brown, Michael G., and Paolina Centonze. "Exploiting Flaws in Big Data Systems." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (May 17, 2016): 6967–75. http://dx.doi.org/10.24297/ijct.v15i8.1498.

Texto completo
Resumen
In this journal we discuss the relevant security threats, vulnerabilities and prominent techniques to securing data lake. Over the last few years, Big Data solutions to data processing have made remarkable strides in the how we interpret data. Because of its ubiquitous nature and ability to handle various data types, it has become a valuable tool and asset to many other fields including bioinformatics solutions, marketing solutions, and social media. Ethical infractions also play a role in data processing and because of this, it is critical that comprehensive security solutions are determined and enforced under the appropriate conditions. Although modern security techniques are well developed, they still leave room for scrutiny as vulnerabilities continue to unfold. In this paper, we will examine and compare modern ethical exploit techniques as well ass techniques to promote greater authentication and overall perimeter security. The scrutinization of the current methods met through exploitation, be it physical or conceptive, is imperative in defining the understanding and verification of definite secure solutions. Â
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

N, Dr Chitra Kiran, Mr Suhas Suresh, and Mrs Suchira Suresh. "Vulnerability, threats, and attacks in E-Payments System: Security Solutions." International Journal of Psychosocial Rehabilitation 24, no. 04 (February 28, 2020): 829–39. http://dx.doi.org/10.37200/ijpr/v24i4/pr201056.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Singh, Dr Shashank. "Enhancing Safety and Security in Autonomous Cars: Challenges and Solutions." International Journal of Research Publication and Reviews 5, no. 2 (February 2024): 745–49. http://dx.doi.org/10.55248/gengpi.5.0224.0429.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Chhikara, Shashi, Iti Raghav, and Nitasha Hasteer. "Analyzing Security Solutions in Cloud Computing." International Journal of Computer Applications 68, no. 25 (April 18, 2013): 17–21. http://dx.doi.org/10.5120/11750-7247.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía