Статті в журналах з теми "Security-aware application"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security-aware application".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Iyer, Ravishankar, Zbigniew Kalbarczyk, Karthik Pattabiraman, William Healey, Wen-mei Hwu, Peter Klemperer, and Reza Farivar. "Toward Application-Aware Security and Reliability." IEEE Security and Privacy Magazine 5, no. 1 (January 2007): 57–62. http://dx.doi.org/10.1109/msp.2007.23.
Повний текст джерелаLozano-Rizk, Jose E., Jose E. Gonzalez-Trejo, Raul Rivera-Rodriguez, Andrei Tchernykh, Salvador Villarreal-Reyes, and Alejandro Galaviz-Mosqueda. "Application-Aware Flow Forwarding Service for SDN-Based Data Centers." Electronics 11, no. 23 (November 24, 2022): 3882. http://dx.doi.org/10.3390/electronics11233882.
Повний текст джерелаDirin, Amir, Teemu H. Laine, and Ari Alamäki. "Managing Emotional Requirements in a Context-Aware Mobile Application for Tourists." International Journal of Interactive Mobile Technologies (iJIM) 12, no. 2 (March 29, 2018): 177. http://dx.doi.org/10.3991/ijim.v12i2.7933.
Повний текст джерелаRosendo, Miguel, and Jorge Granjal. "Energy-Aware Security Adaptation for Low-Power IoT Applications." Network 2, no. 1 (January 14, 2022): 36–52. http://dx.doi.org/10.3390/network2010003.
Повний текст джерелаArudkar, Archna, and Vimla Jethani. "RBAC+: Protecting Web Databases With Access Control Mechanism." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 2, no. 1 (November 27, 2012): 24–30. http://dx.doi.org/10.24297/ijmit.v2i1.1407.
Повний текст джерелаDoriguzzi-Corin, Roberto, Sandra Scott-Hayward, Domenico Siracusa, Marco Savi, and Elio Salvadori. "Dynamic and Application-Aware Provisioning of Chained Virtual Security Network Functions." IEEE Transactions on Network and Service Management 17, no. 1 (March 2020): 294–307. http://dx.doi.org/10.1109/tnsm.2019.2941128.
Повний текст джерелаKhan, M. Fahim Ferdous, and Ken Sakamura. "The Context-Security Nexus in Ubiquitous Computing." International Journal of Adaptive, Resilient and Autonomic Systems 5, no. 3 (July 2014): 61–81. http://dx.doi.org/10.4018/ijaras.2014070104.
Повний текст джерелаHuang, Binbin, Yuanyuan Xiang, Dongjin Yu, Jiaojiao Wang, Zhongjin Li, and Shangguang Wang. "Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing." Security and Communication Networks 2021 (May 25, 2021): 1–13. http://dx.doi.org/10.1155/2021/5532410.
Повний текст джерелаAsuncion, Vernon, Khaled M. khan, Abdelkarim Erradi, and Saleh Alhazbi. "Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming." International Journal of Cooperative Information Systems 25, no. 01 (March 2016): 1650003. http://dx.doi.org/10.1142/s0218843016500039.
Повний текст джерелаSingh, Shubham, Pranju Mishra, Samruddhi Kshirsagar, Shubham Bharadia, and Narendra Joshi. "SQL Injection and Areas of Security Concern." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 60–66. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.006.
Повний текст джерелаThete, Prof Sharda, Siddheshwar Midgule, Nikesh Konde, and Suraj Kale. "Malware Detection Using Machine Learning and Deep Learning." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (November 30, 2022): 1942–45. http://dx.doi.org/10.22214/ijraset.2022.47682.
Повний текст джерелаZawoad, Shams, Marjan Mernik, and Ragib Hasan. "Towards building a forensics aware language for secure logging." Computer Science and Information Systems 11, no. 4 (2014): 1291–314. http://dx.doi.org/10.2298/csis131201051z.
Повний текст джерелаYang, Yuli, Xinguang Peng, and Xiaohong Wan. "Security-aware data replica selection strategy for Bag-of-Tasks application in cloud computing." Journal of High Speed Networks 21, no. 4 (November 25, 2015): 299–311. http://dx.doi.org/10.3233/jhs-150527.
Повний текст джерелаPrabowo, Maraghi Agil, Ucuk Darusalam, and Sari Ningsih. "Perancangan Keamanan Server Linux Dengan Metode Hardening Pada Layer 1 dan Layer 7." JURNAL MEDIA INFORMATIKA BUDIDARMA 4, no. 3 (July 20, 2020): 591. http://dx.doi.org/10.30865/mib.v4i3.2157.
Повний текст джерелаChen, Aiguo, Guoming Lu, Hanwen Xing, Yuan Xie, and Shunwei Yuan. "Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772092177. http://dx.doi.org/10.1177/1550147720921778.
Повний текст джерелаVakilinia, Shahin, Mohammadhossein Alvandi, Mohammadreza Khalili Shoja, and Iman Vakilinia. "Cross-Layered Secure and QoS Aware Design of VOIP over Wireless Ad-Hoc Networks." International Journal of Business Data Communications and Networking 9, no. 4 (October 2013): 23–45. http://dx.doi.org/10.4018/ijbdcn.2013100102.
Повний текст джерелаMbuguah, Samwel Mungai, and Tobias Okumu Otibine. "A Survey of Awareness of Social Engineering Attacks to Information Security Management Systems: The Case of Kibabii University Kenya." International Journal of Computer Applications Technology and Research 11, no. 06 (June 2022): 187–92. http://dx.doi.org/10.7753/ijcatr1106.1003.
Повний текст джерелаRosli, Athirah, Abidah Mat Taib, Wan Nor Ashiqin Wan Ali, and Ros Syamsul Hamid. "Application of Grounded Theory in Determining Required Elements for IPv6 Risk Assessment Equation." MATEC Web of Conferences 150 (2018): 06005. http://dx.doi.org/10.1051/matecconf/201815006005.
Повний текст джерелаAzhari, Firman. "Quick detection of NFC vulnerability." Information Management & Computer Security 22, no. 2 (June 3, 2014): 134–40. http://dx.doi.org/10.1108/imcs-09-2013-0067.
Повний текст джерелаTang, Jia. "RFID Technology and Structure of Internet of Things." Applied Mechanics and Materials 427-429 (September 2013): 2818–21. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2818.
Повний текст джерелаWang, Ziheng, Heng Chen, and Weiguo Wu. "Client-Aware Negotiation for Secure and Efficient Data Transmission." Energies 13, no. 21 (November 4, 2020): 5777. http://dx.doi.org/10.3390/en13215777.
Повний текст джерелаHaider, Shahab, Ziaul Haq Abbas, Ghulam Abbas, Muhammad Waqas, Shanshan Tu, and Wei Zhao. "A Novel Cross-Layer V2V Architecture for Direction-Aware Cooperative Collision Avoidance." Electronics 9, no. 7 (July 8, 2020): 1112. http://dx.doi.org/10.3390/electronics9071112.
Повний текст джерелаHaoxiang, Dr Wang, and Dr. S. Smys. "Secure and Optimized Cloud-Based Cyber-Physical Systems with Memory-Aware Scheduling Scheme." Journal of Trends in Computer Science and Smart Technology 2, no. 3 (July 23, 2020): 141–47. http://dx.doi.org/10.36548/jtcsst.2020.3.003.
Повний текст джерелаOrdoñez-Quintero, Cristian-Camilo, Hugo-Armando Ordoñez-Eraso, and Jose-Armando Ordoñez-Córdoba. "Information Management Security Vulnerabilities in Smartphones Used by University Students: A Case Study in the Southwest of Colombia." Revista Facultad de Ingeniería 31, no. 59 (March 14, 2022): e13957. http://dx.doi.org/10.19053/01211129.v31.n59.2022.13957.
Повний текст джерелаKathole, Atul B., Jayashree Katti, Dharmesh Dhabliya, Vivek Deshpande, Anand Singh Rajawat, S. B. Goyal, Maria Simona Raboaca, Traian Candin Mihaltan, Chaman Verma, and George Suciu. "Energy-Aware UAV Based on Blockchain Model Using IoE Application in 6G Network-Driven Cybertwin." Energies 15, no. 21 (November 7, 2022): 8304. http://dx.doi.org/10.3390/en15218304.
Повний текст джерелаKumbhar, Ajay, Madhav Godale, Payal Jagtap, Amruta Misal, and Mr Abhijeet Cholke. "Instant and Secure Messaging Platform Based on Blockchain." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 1515–18. http://dx.doi.org/10.22214/ijraset.2022.48222.
Повний текст джерелаOzturk, Metin, Mona Jaber, and Muhammad A. Imran. "Energy-Aware Smart Connectivity for IoT Networks: Enabling Smart Ports." Wireless Communications and Mobile Computing 2018 (June 28, 2018): 1–11. http://dx.doi.org/10.1155/2018/5379326.
Повний текст джерелаXiao, Shiyu, Yuhang Ye, Nadia Kanwal, Thomas Newe, and Brian Lee. "SoK: Context and Risk Aware Access Control for Zero Trust Systems." Security and Communication Networks 2022 (June 30, 2022): 1–20. http://dx.doi.org/10.1155/2022/7026779.
Повний текст джерелаNagarjuna Reddy, Tella, and K. Annapurani Panaiyappan. "Intrusion Detection on Software Defined Networking." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 330. http://dx.doi.org/10.14419/ijet.v7i3.12.16052.
Повний текст джерелаLiu, Muhua, and Ping Zhang. "An Adaptively Secure Functional Encryption for Randomized Functions." Computer Journal 63, no. 8 (August 2020): 1247–58. http://dx.doi.org/10.1093/comjnl/bxz154.
Повний текст джерелаShahid, Arsalan, Thien-An Ngoc Nguyen, and M.-Tahar Kechadi. "Big Data Warehouse for Healthcare-Sensitive Data Applications." Sensors 21, no. 7 (March 28, 2021): 2353. http://dx.doi.org/10.3390/s21072353.
Повний текст джерелаMashat, Arwa, and Aliaa M. Alabdali. "QoS-Aware Smart Phone-Based User Tracking Application to Prevent Outbreak of COVID-19 in Saudi Arabia." Computational Intelligence and Neuroscience 2022 (April 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/2273910.
Повний текст джерелаThompson, Aderonke F., Oghenerukevwe E. Oyinloye, Matthew T. David, and Boniface K. Alese. "A Secured System for Internet Enabled Host Devices." Network and Communication Technologies 5, no. 1 (February 6, 2020): 26. http://dx.doi.org/10.5539/nct.v5n1p26.
Повний текст джерелаFan, Long, He Huang, and Wei Kang. "Design and Implementation of Role and Group Based Access Control with Context in Document Access Control System." Applied Mechanics and Materials 427-429 (September 2013): 2795–99. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2795.
Повний текст джерелаJara, Antonio J., David Fernandez, Pablo Lopez, Miguel A. Zamora, and Antonio F. Skarmeta. "Lightweight MIPv6 with IPSec Support." Mobile Information Systems 10, no. 1 (2014): 37–77. http://dx.doi.org/10.1155/2014/563274.
Повний текст джерелаQin, Qin, Yong-qiang He, and Li-ming Nie. "Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism." Journal of Electrical and Computer Engineering 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/128691.
Повний текст джерелаMoura, Pedro, Paulo Fazendeiro, Pedro R. M. Inácio, Pedro Vieira-Marques, and Ana Ferreira. "Assessing Access Control Risk for mHealth: A Delphi Study to Categorize Security of Health Data and Provide Risk Assessment for Mobile Apps." Journal of Healthcare Engineering 2020 (January 17, 2020): 1–14. http://dx.doi.org/10.1155/2020/5601068.
Повний текст джерелаHe, Yuanhang, Daochao Huang, Lei Chen, Yi Ni, and Xiangjie Ma. "A Survey on Zero Trust Architecture: Challenges and Future Trends." Wireless Communications and Mobile Computing 2022 (June 15, 2022): 1–13. http://dx.doi.org/10.1155/2022/6476274.
Повний текст джерелаBhardwaj, Akashdeep, and Sam Goundar. "Unique Taxonomy for Evaluating Fog Computing Services." International Journal of E-Business Research 14, no. 4 (October 2018): 78–90. http://dx.doi.org/10.4018/ijebr.2018100105.
Повний текст джерелаM., Duraipandian, and Vinothkanna R. "MACHINE LEARNING BASED AUTOMATIC PERMISSION GRANTING AND MALWARE IDENTIFICATION." December 2019 01, no. 02 (December 23, 2019): 96–107. http://dx.doi.org/10.36548/jitdw.2019.2.005.
Повний текст джерелаLohitha, N. Sai, and M. Pounambal. "A Novel Hybrid Spotted Hyena-Swarm Optimization (HS-FFO) Framework for Effective Feature Selection in IOT Based Cloud Security Data." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1s (December 14, 2022): 290–302. http://dx.doi.org/10.17762/ijritcc.v10i1s.5851.
Повний текст джерелаB D, Deebak, Fadi Al-Turjman, and Leonardo Mostarda. "A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems." Sensors 19, no. 18 (September 4, 2019): 3821. http://dx.doi.org/10.3390/s19183821.
Повний текст джерелаLi, Wei, Yuan Jiang, Xiaoliang Zhang, Fangfang Dang, Feng Gao, Haomin Wang, and Qi Fan. "Reliability Assurance Dynamic SSC Placement Using Reinforcement Learning." Information 13, no. 2 (January 21, 2022): 53. http://dx.doi.org/10.3390/info13020053.
Повний текст джерелаDeng, Libing, Guoqi Xie, Hong Liu, Yunbo Han, Renfa Li, and Keqin Li. "A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN." ACM Computing Surveys 55, no. 2 (March 31, 2023): 1–36. http://dx.doi.org/10.1145/3487330.
Повний текст джерелаBoutekkouk, Fateh. "Application of a Fuzzy MCDM Method to Select the Best Operating System for an Efficient Security-Aware Design of Embedded Systems." International Journal of Applied Evolutionary Computation 12, no. 3 (July 2021): 1–20. http://dx.doi.org/10.4018/ijaec.2021070101.
Повний текст джерелаKamarudin, Nur Khairani, Nur Syafiqa Bismi, Nurul Hidayah Ahmad Zukri, Mohd Faris Mohd Fuzi, and Rashidah Ramle. "Network Security Performance Analysis of Mobile Voice Over Ip Application (mVoIP): Kakao Talk, WhatsApp, Telegram and Facebook Messenger." Journal of Computing Research and Innovation 5, no. 2 (October 12, 2020): 21–27. http://dx.doi.org/10.24191/jcrinn.v5i2.136.
Повний текст джерелаChaganti, Rajasekhar, Vijayakumar Varadarajan, Venkata Subbarao Gorantla, Thippa Reddy Gadekallu, and Vinayakumar Ravi. "Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture." Future Internet 14, no. 9 (August 24, 2022): 250. http://dx.doi.org/10.3390/fi14090250.
Повний текст джерелаMurry, Jeanette. "Job Applications Using the Internet." Australian Journal of Career Development 6, no. 3 (October 1997): 22–24. http://dx.doi.org/10.1177/103841629700600308.
Повний текст джерелаNovianto, Fanny. "EVALUATION OF E-GOVERNMENT INFORMATION SECURITY USING THE DEFENSE IN DEPTH MODEL." Cyber Security dan Forensik Digital 3, no. 1 (July 23, 2020): 14–19. http://dx.doi.org/10.14421/csecurity.2020.3.1.1962.
Повний текст джерелаKayes, A. S. M., Rudri Kalaria, Iqbal H. Sarker, Md Saiful Islam, Paul A. Watters, Alex Ng, Mohammad Hammoudeh, Shahriar Badsha, and Indika Kumara. "A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues." Sensors 20, no. 9 (April 27, 2020): 2464. http://dx.doi.org/10.3390/s20092464.
Повний текст джерела