Articoli di riviste sul tema "Security solutions"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Security solutions".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai e Bhagyashri D. Dangewar. "Cloud Security: Problems and Solutions". International Journal of Scientific Research 3, n. 4 (1 giugno 2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.
Testo completoXu, Vincent. "Data Security Solutions". RESEARCH REVIEW International Journal of Multidisciplinary 05, n. 07 (15 luglio 2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.
Testo completoWebb, K. W. "Biometric Security Solutions". IEEE Security and Privacy Magazine 3, n. 5 (settembre 2005): 7. http://dx.doi.org/10.1109/msp.2005.117.
Testo completoGOHOREANU, Bogdan, Florin SANDU e Dan-Nicolae ROBU. "SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS". SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, n. 1 (31 luglio 2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.
Testo completoWEBER, CYNTHIA, e MARK LACY. "Securing by design". Review of International Studies 37, n. 3 (1 marzo 2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.
Testo completoZakarya, Muhammad, Muazzam Ali Khattak, Izaz Ur Rahman e Ayaz Ali Khan. "Grid High Availability and Service Security Issues with Solutions". International Journal of Engineering and Technology 4, n. 6 (2012): 723–29. http://dx.doi.org/10.7763/ijet.2012.v4.472.
Testo completoGEANĂ, Ionuţ Cătălin. "Security Solutions for Informatics Systems". International Journal of Information Security and Cybercrime 1, n. 2 (21 dicembre 2012): 17–24. http://dx.doi.org/10.19107/ijisc.2012.02.02.
Testo completoDhiman, Deepika. "WLAN Security Issues and Solutions". IOSR Journal of Computer Engineering 16, n. 1 (2014): 67–75. http://dx.doi.org/10.9790/0661-16146775.
Testo completoFausett, Crystal M., Megan P. Christovich, Jarod M. Parker, John M. Baker e Joseph R. Keebler. "Telemedicine Security: Challenges and Solutions". Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, n. 1 (giugno 2021): 340–44. http://dx.doi.org/10.1177/2327857921101241.
Testo completoTrubilin, Alexander Ivanovich, Konstantin Eduardovich Tyupakov e Alexander Alexandrovich Adamenko. "Food security: problems and solutions". Proceedings of the Kuban State Agrarian University, n. 90 (2021): 5–10. http://dx.doi.org/10.21515/1999-1703-90-5-10.
Testo completoYaacob, Mashkuri, Farhat Anwar, Rashidah Funke Olanrewaju, Burhan Ul Islam Khan e Roohie Naaz Mir. "Scrutinising internet banking security solutions". International Journal of Information and Computer Security 12, n. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.10026783.
Testo completoKhan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Farhat Anwar, Roohie Naaz Mir e Mashkuri Yaacob. "Scrutinising internet banking security solutions". International Journal of Information and Computer Security 12, n. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.105180.
Testo completoSmith, Robert E. "Proactive Solutions for Multinetwork Security". Information Systems Security 3, n. 2 (gennaio 1994): 47–55. http://dx.doi.org/10.1080/10658989409342456.
Testo completoNorifusa, Masaya. "Internet security: difficulties and solutions". International Journal of Medical Informatics 49, n. 1 (marzo 1998): 69–74. http://dx.doi.org/10.1016/s1386-5056(98)00012-4.
Testo completoHancock, Bill. "Network Solutions Re-evaluates Security". Computers & Security 19, n. 5 (luglio 2000): 398–400. http://dx.doi.org/10.1016/s0167-4048(00)05018-5.
Testo completoReid, Linda. "Information Security: Risks and Solutions". Journal of Information Privacy and Security 2, n. 1 (gennaio 2006): 1–2. http://dx.doi.org/10.1080/15536548.2006.10855782.
Testo completoH.S, Anupama, Anusha M, Aparna Joshi, Apoorva N, N. K. Cauvery e Lingaraju G.M. "Security Solutions Using Brain Signals". IAES International Journal of Artificial Intelligence (IJ-AI) 7, n. 2 (20 aprile 2018): 105. http://dx.doi.org/10.11591/ijai.v7.i2.pp105-110.
Testo completoPotdar, Aarti, Pranav Patil, Raunak Bagla e Rohitashwa Pandey. "Security Solutions for Cloud Computing". International Journal of Computer Applications 128, n. 16 (15 ottobre 2015): 17–21. http://dx.doi.org/10.5120/ijca2015906747.
Testo completoPhithakkitnukoon, Santi, Ram Dantu e Enkh-Amgalan Baatarjav. "VoIP Security — Attacks and Solutions". Information Security Journal: A Global Perspective 17, n. 3 (29 luglio 2008): 114–23. http://dx.doi.org/10.1080/19393550802308618.
Testo completoBarki, Amira, Abdelmadjid Bouabdallah, Said Gharout e Jacques Traore. "M2M Security: Challenges and Solutions". IEEE Communications Surveys & Tutorials 18, n. 2 (2016): 1241–54. http://dx.doi.org/10.1109/comst.2016.2515516.
Testo completoKim, JiHoon, Jong In Lim e Huy Kang Kim. "Collaborative security response by interworking between multiple security solutions". Journal of the Korea Institute of Information Security and Cryptology 23, n. 1 (28 febbraio 2013): 69–79. http://dx.doi.org/10.13089/jkiisc.2013.23.1.069.
Testo completoN, Dr Chitra Kiran, Mr Suhas Suresh e Mrs Suchira Suresh. "Vulnerability, threats, and attacks in E-Payments System: Security Solutions". International Journal of Psychosocial Rehabilitation 24, n. 04 (28 febbraio 2020): 829–39. http://dx.doi.org/10.37200/ijpr/v24i4/pr201056.
Testo completoFotiou e Polyzos. "Name-Based Security for Information-Centric Networking Architectures". Future Internet 11, n. 11 (1 novembre 2019): 232. http://dx.doi.org/10.3390/fi11110232.
Testo completoBrown, Michael G., e Paolina Centonze. "Exploiting Flaws in Big Data Systems". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, n. 8 (17 maggio 2016): 6967–75. http://dx.doi.org/10.24297/ijct.v15i8.1498.
Testo completoChhikara, Shashi, Iti Raghav e Nitasha Hasteer. "Analyzing Security Solutions in Cloud Computing". International Journal of Computer Applications 68, n. 25 (18 aprile 2013): 17–21. http://dx.doi.org/10.5120/11750-7247.
Testo completoDhingra, Madhavi. "BYOD SECURITY AND ITS POSSIBLE SOLUTIONS". International Journal of Engineering Technologies and Management Research 5, n. 2 (27 aprile 2020): 101–6. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.620.
Testo completoRosaire, Senou Mahugnon, e Degila Jules. "Smart Contracts Security Threats and Solutions". International Journal of Information Technology and Web Engineering 17, n. 1 (1 gennaio 2022): 1–30. http://dx.doi.org/10.4018/ijitwe.304048.
Testo completoTrabelsi, Zouheir, e Wassim El Hajj. "On investigating ARP spoofing security solutions". International Journal of Internet Protocol Technology 5, n. 1/2 (2010): 92. http://dx.doi.org/10.1504/ijipt.2010.032618.
Testo completoSTEFAN, HENRY, e LIAKAT ALI Md. "CLOUD COMPUTING SECURITY THREATS AND SOLUTIONS". i-manager’s Journal on Cloud Computing 4, n. 2 (2017): 1. http://dx.doi.org/10.26634/jcc.4.2.14249.
Testo completoEljialy, A. E. M. "Proposed Solutions of Oracle Sysdba Security". Journal of Industrial and Intelligent Information 1, n. 1 (2013): 68–71. http://dx.doi.org/10.12720/jiii.1.1.68-71.
Testo completoCAZACU, Andrei-Robert. "IoT Security: Threats and Possible Solutions". Informatica Economica 26, n. 2/2022 (30 giugno 2022): 57–64. http://dx.doi.org/10.24818/issn14531305/26.2.2022.06.
Testo completoFortov, V. E., A. A. Makarov e T. A. Mitrova. "Global energy security: Problems and solutions". Herald of the Russian Academy of Sciences 77, n. 1 (febbraio 2007): 7–14. http://dx.doi.org/10.1134/s1019331607010029.
Testo completoHerath, Tejaswini C., Hemantha S. B. Herath e John D'Arcy. "Organizational Adoption of Information Security Solutions". ACM SIGMIS Database: the DATABASE for Advances in Information Systems 51, n. 2 (13 maggio 2020): 12–35. http://dx.doi.org/10.1145/3400043.3400046.
Testo completoShoham, O. "IP@SS - integrated passenger security solutions". IEEE Aerospace and Electronic Systems Magazine 18, n. 3 (marzo 2003): 16–21. http://dx.doi.org/10.1109/maes.2003.1193714.
Testo completoBlatchford, Clive W. "The Fight for International Security Solutions". Information Systems Security 2, n. 3 (gennaio 1993): 23–27. http://dx.doi.org/10.1080/19393559308551363.
Testo completoFlater, David. "Bad Security Metrics Part 2: Solutions". IT Professional 20, n. 2 (marzo 2018): 76–79. http://dx.doi.org/10.1109/mitp.2018.021921653.
Testo completoOgiela, Marek R. "Cognitive solutions for security and cryptography". Cognitive Systems Research 55 (giugno 2019): 258–61. http://dx.doi.org/10.1016/j.cogsys.2019.02.006.
Testo completoS., Dr Arunkumar. "Cryptography based Security Solutions to IOT Enabled Health Care Monitoring System". Journal of Advanced Research in Dynamical and Control Systems 12, n. 7 (20 luglio 2020): 265–72. http://dx.doi.org/10.5373/jardcs/v12i7/20202008.
Testo completoDarji, Dhara N., e Nita B. Thakkar. "Challenges in Mobile Ad Hoc Networks: Security Threats and its Solutions". Indian Journal of Applied Research 3, n. 1 (1 ottobre 2011): 72–74. http://dx.doi.org/10.15373/2249555x/jan2013/29.
Testo completoMAREȘ, Marian-Sorin. "Solutions to Secure a Network". International Journal of Information Security and Cybercrime 7, n. 2 (29 dicembre 2018): 41–51. http://dx.doi.org/10.19107/ijisc.2018.02.05.
Testo completoZanoon, Nabeel, Nashat Albdour, Hatem S. A. Hamatta e Rasha Moh'd Al-Tarawneh. "Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security Solutions". International Journal of Network Security & Its Applications 7, n. 3 (30 maggio 2015): 01–13. http://dx.doi.org/10.5121/ijnsa.2015.7301.
Testo completoMichelberger, Pál, e Ágnes Kemendi. "DATA, INFORMATION AND IT SECURITY - SOFTWARE SUPPORT FOR SECURITY ACTIVITIES". Problems of Management in the 21st Century 15, n. 2 (10 dicembre 2020): 108–24. http://dx.doi.org/10.33225/pmc/20.15.108.
Testo completoKaliyamurthy, Nitheesh Murugan, Swapnesh Taterh e Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks". International Journal of Applied Metaheuristic Computing 10, n. 4 (ottobre 2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.
Testo completoMohan, Madan, Aadarsh Malviya e Anuranjan Mishra. "Big Data Security Problem and Its Solutions". International Journal of Engineering and Advanced Technology 11, n. 1 (30 ottobre 2021): 34–36. http://dx.doi.org/10.35940/ijeat.a3130.1011121.
Testo completoTawalbeh, Lo’ai, Fadi Muheidat, Mais Tawalbeh e Muhannad Quwaider. "IoT Privacy and Security: Challenges and Solutions". Applied Sciences 10, n. 12 (15 giugno 2020): 4102. http://dx.doi.org/10.3390/app10124102.
Testo completoSharma, Ravi, e Nonita Sharma. "Attacks on Resource-Constrained IoT Devices and Security Solutions". International Journal of Software Science and Computational Intelligence 14, n. 1 (1 gennaio 2022): 1–21. http://dx.doi.org/10.4018/ijssci.310943.
Testo completoRamanauskaitė, Simona, Anatoly Shein, Antanas Čenys e Justinas Rastenis. "Security Ontology Structure for Formalization of Security Document Knowledge". Electronics 11, n. 7 (31 marzo 2022): 1103. http://dx.doi.org/10.3390/electronics11071103.
Testo completoKarimkulov, Kurbonkul Mavlankulovich, Ikromjon Esanboyevich Uzohkov e Madraim Khasanovich Sarikulov. "Food security in Uzbekistan: Problems and solutions". South Asian Journal of Marketing & Management Research 10, n. 11 (2020): 115–23. http://dx.doi.org/10.5958/2249-877x.2020.00080.6.
Testo completoLevashov, Viktor, e Viliam Sarian. "The digitalization and security: problems and solutions". Social novelties and Social sciences, n. 1 (2020): 37–46. http://dx.doi.org/10.31249/snsn/2020.01.03.
Testo completoIbn Minar, Nateq Be Nazir. "Bluetooth Security Threats And Solutions: A Survey". International Journal of Distributed and Parallel systems 3, n. 1 (31 gennaio 2012): 127–48. http://dx.doi.org/10.5121/ijdps.2012.3110.
Testo completo