Статті в журналах з теми "Security orchestration and automation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security orchestration and automation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Tembhurne, Omprakash, Sonali Milmile, Ganesh R. Pathak, Atul O. Thakare, and Abhijeet Thakare. "An Orchestrator." International Journal of Open Source Software and Processes 13, no. 1 (January 1, 2022): 1–17. http://dx.doi.org/10.4018/ijossp.308792.
Повний текст джерелаKinyua, Johnson, and Lawrence Awuah. "AI/ML in Security Orchestration, Automation and Response: Future Research Directions." Intelligent Automation & Soft Computing 28, no. 2 (2021): 527–45. http://dx.doi.org/10.32604/iasc.2021.016240.
Повний текст джерелаChara Eddine, Meftah Mohammed. "A Comparative Study of Formal Approaches for Web Service Oriented Architecture." Network and Communication Technologies 5, no. 2 (December 31, 2020): 15. http://dx.doi.org/10.5539/nct.v5n2p15.
Повний текст джерелаLee, Minkyung, Julian Jang-Jaccard та Jin Kwak. "Novel Architecture of Security Orchestration, Automation and Response in營nternet of Blended Environment". Computers, Materials & Continua 73, № 1 (2022): 199–223. http://dx.doi.org/10.32604/cmc.2022.028495.
Повний текст джерелаChen, Shichao, and Mengchu Zhou. "Evolving Container to Unikernel for Edge Computing and Applications in Process Industry." Processes 9, no. 2 (February 14, 2021): 351. http://dx.doi.org/10.3390/pr9020351.
Повний текст джерелаOhmori, Motoyuki. "On Automation and Orchestration of an Initial Computer Security Incident Response by Introducing Centralized Incident Tracking System." Journal of Information Processing 27 (2019): 564–73. http://dx.doi.org/10.2197/ipsjjip.27.564.
Повний текст джерелаSierra, Rodrigo, and Hubert Odziemczyk. "Readying CERN for connected device era." EPJ Web of Conferences 245 (2020): 07015. http://dx.doi.org/10.1051/epjconf/202024507015.
Повний текст джерелаSarkar, Sirshak, Gaurav Choudhary, Shishir Kumar Shandilya, Azath Hussain, and Hwankuk Kim. "Security of Zero Trust Networks in Cloud Computing: A Comparative Review." Sustainability 14, no. 18 (September 7, 2022): 11213. http://dx.doi.org/10.3390/su141811213.
Повний текст джерелаGoutam, Aradhana, Raj Kamal, and Maya Ingle. "Specification for security Orchestration." Procedia Engineering 38 (2012): 429–41. http://dx.doi.org/10.1016/j.proeng.2012.06.053.
Повний текст джерелаPotter, Bruce. "Security automation." Network Security 2007, no. 9 (September 2007): 18–19. http://dx.doi.org/10.1016/s1353-4858(07)70084-3.
Повний текст джерелаMolina Zarca, Alejandro, Miloud Bagaa, Jorge Bernal Bernabe, Tarik Taleb, and Antonio F. Skarmeta. "Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems." Sensors 20, no. 13 (June 27, 2020): 3622. http://dx.doi.org/10.3390/s20133622.
Повний текст джерелаPapadakis-Vlachopapadopoulos, Konstantinos, Ioannis Dimolitsas, Dimitrios Dechouniotis, Eirini Eleni Tsiropoulou, Ioanna Roussaki, and Symeon Papavassiliou. "On Blockchain-Based Cross-Service Communication and Resource Orchestration on Edge Clouds." Informatics 8, no. 1 (February 26, 2021): 13. http://dx.doi.org/10.3390/informatics8010013.
Повний текст джерелаKlose, Anselm, Julius Lorenz, Lukas Bittorf, Katharina Stark, Mario Hoernicke, Andreas Stutz, Hannes Weinhold, et al. "Orchestration of modular plants." atp magazin 63, no. 9 (August 12, 2022): 68–77. http://dx.doi.org/10.17560/atp.v63i9.2599.
Повний текст джерелаQadeer, Arslan, Asad Waqar Malik, Anis Ur Rahman, Hamayun Mian Muhammad, and Arsalan Ahmad. "Virtual Infrastructure Orchestration For Cloud Service Deployment." Computer Journal 63, no. 2 (December 5, 2019): 295–307. http://dx.doi.org/10.1093/comjnl/bxz125.
Повний текст джерелаHighland, HaroldJoseph. "Office automation security." Computers & Security 6, no. 6 (December 1987): 452–57. http://dx.doi.org/10.1016/0167-4048(87)90023-x.
Повний текст джерелаStutz, Andreas, Alexander Fay, Mike Barth, and Mathias Maurmaier. "Orchestration vs. Choreography Functional Association for Future Automation Systems." IFAC-PapersOnLine 53, no. 2 (2020): 8268–75. http://dx.doi.org/10.1016/j.ifacol.2020.12.1961.
Повний текст джерелаPokhrel, Shiva Raj. "Software Defined Internet of Vehicles for Automation and Orchestration." IEEE Transactions on Intelligent Transportation Systems 22, no. 6 (June 2021): 3890–99. http://dx.doi.org/10.1109/tits.2021.3077363.
Повний текст джерелаWang, Shuyi, and Longxiang Yang. "Securing Dynamic Service Function Chain Orchestration in EC-IoT Using Federated Learning." Sensors 22, no. 23 (November 22, 2022): 9041. http://dx.doi.org/10.3390/s22239041.
Повний текст джерелаSlawomir Kuklinski, Lechoslaw Tomaszewski, Robert Kolakowski, Anne-Marie Bosneag, Ashima Chawla, Adlen Ksentini, Sabra Ben Saad, et al. "AI-driven predictive and scalable management and orchestration of network slices." ITU Journal on Future and Evolving Technologies 3, no. 3 (November 16, 2022): 570–88. http://dx.doi.org/10.52953/ipui5221.
Повний текст джерелаIslam, Chadni, Muhammad Ali Babar, and Surya Nepal. "A Multi-Vocal Review of Security Orchestration." ACM Computing Surveys 52, no. 2 (May 31, 2019): 1–45. http://dx.doi.org/10.1145/3305268.
Повний текст джерелаHwang, J., K. Bai, M. Tacci, M. Vukovic, and N. Anerousis. "Automation and orchestration framework for large-scale enterprise cloud migration." IBM Journal of Research and Development 60, no. 2-3 (March 2016): 1:1–1:12. http://dx.doi.org/10.1147/jrd.2015.2511810.
Повний текст джерелаShemyakinskaya, Anastasia Sergeevna, and Igor Valerevich Nikiforov. "Hard drives monitoring automation approach for Kubernetes container orchestration system." Proceedings of the Institute for System Programming of the RAS 32, no. 2 (2020): 99–106. http://dx.doi.org/10.15514/ispras-2020-32(2)-8.
Повний текст джерелаWilliams, Adam D. "Multilayered Network Models for Security: Enhancing System Security Engineering with Orchestration." INSIGHT 25, no. 2 (June 2022): 44–48. http://dx.doi.org/10.1002/inst.12385.
Повний текст джерелаRunde, Markus, Walter Speth, Thomas Steffen, and Christoph Thiell. "Automation Security Risk Assessment." atp edition 58 (January 1, 2016): 48. http://dx.doi.org/10.17560/atp.v58i01-02.551.
Повний текст джерелаKothiyal, Sonakshi. "Automation in Cyber-Security." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (May 31, 2019): 581–84. http://dx.doi.org/10.22214/ijraset.2019.5098.
Повний текст джерелаWong, Ken. "Security and Office Automation." EDPACS 15, no. 3 (September 1987): 5–11. http://dx.doi.org/10.1080/07366988709452219.
Повний текст джерелаWong, Ken. "Security and office automation." Computers & Security 7, no. 1 (February 1988): 106–7. http://dx.doi.org/10.1016/0167-4048(88)90548-2.
Повний текст джерелаSinde, Sai Priya, Bhavika Thakkalapally, Meghamala Ramidi, and Sowmya Veeramalla. "Continuous Integration and Deployment Automation in AWS Cloud Infrastructure." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 1305–9. http://dx.doi.org/10.22214/ijraset.2022.44106.
Повний текст джерелаRadack, Shirley, and Rick Kuhn. "Managing Security: The Security Content Automation Protocol." IT Professional 13, no. 1 (January 2011): 9–11. http://dx.doi.org/10.1109/mitp.2011.11.
Повний текст джерелаMoubayed, Abdallah, Abdallah Shami, and Anwer Al-Dulaimi. "On End-to-End Intelligent Automation of 6G Networks." Future Internet 14, no. 6 (May 29, 2022): 165. http://dx.doi.org/10.3390/fi14060165.
Повний текст джерелаLi, Wei, Yuan Jiang, Xiaoliang Zhang, Fangfang Dang, Feng Gao, Haomin Wang, and Qi Fan. "Reliability Assurance Dynamic SSC Placement Using Reinforcement Learning." Information 13, no. 2 (January 21, 2022): 53. http://dx.doi.org/10.3390/info13020053.
Повний текст джерелаPriyadharsini, S. "Home Automation and Security System." International Journal for Research in Applied Science and Engineering Technology V, no. III (March 28, 2017): 1174–79. http://dx.doi.org/10.22214/ijraset.2017.3215.
Повний текст джерелаKaur, Surinder, Rashmi Singh, Neha Khairwal, and Pratyk Jain. "HOME AUTOMATION AND SECURITY SYSTEM." Advanced Computational Intelligence: An International Journal (ACII) 3, no. 3 (July 30, 2016): 17–23. http://dx.doi.org/10.5121/acii.2016.3303.
Повний текст джерелаMathew, Alex. "Cybersecurity Infrastructure and Security Automation." Advanced Computing: An International Journal 10, no. 6 (November 30, 2019): 1–7. http://dx.doi.org/10.5121/acij.2019.10601.
Повний текст джерелаChien, Ting-Li, Kuo-Lan Su, and Jr-Hung Guo. "Intelligent Home-Automation Security System." International Journal of Automation Technology 3, no. 2 (March 5, 2009): 121–29. http://dx.doi.org/10.20965/ijat.2009.p0123.
Повний текст джерелаGranzer, Wolfgang, Fritz Praus, and Wolfgang Kastner. "Security in Building Automation Systems." IEEE Transactions on Industrial Electronics 57, no. 11 (November 2010): 3622–30. http://dx.doi.org/10.1109/tie.2009.2036033.
Повний текст джерелаG, SHYAMALA, Ronith Gowda, Sashikiran Gavanivari, Suvith K S, and Vishwamohan Narendra. "Home Automation Security Using Blockchain." International Journal of Computer Science and Engineering 7, no. 7 (July 25, 2020): 63–68. http://dx.doi.org/10.14445/23488387/ijcse-v7i7p111.
Повний текст джерелаMarsh, P. "Beyond control [automation system security]." Information Professional 2, no. 2 (April 1, 2005): 12–16. http://dx.doi.org/10.1049/inp:20050202.
Повний текст джерелаMoradi, Niloofar, Alireza Shameli-Sendi, and Alireza Khajouei. "A Scalable Stateful Approach for Virtual Security Functions Orchestration." IEEE Transactions on Parallel and Distributed Systems 32, no. 6 (June 1, 2021): 1383–94. http://dx.doi.org/10.1109/tpds.2021.3049804.
Повний текст джерелаPierantoni, Gabriele, Tamas Kiss, Gabor Terstyanszky, James DesLauriers, Gregoire Gesmier, and Hai-Van Dang. "Describing and Processing Topology and Quality of Service Parameters of Applications in the Cloud." Journal of Grid Computing 18, no. 4 (June 15, 2020): 761–78. http://dx.doi.org/10.1007/s10723-020-09524-0.
Повний текст джерелаValera, A., J. Gomez-Moreno, A. Sánchez, C. Ricolfe-Viala, R. Zotovic, and M. Vallés. "Industrial Robot Programming and UPnP Services Orchestration for the Automation of Factories." International Journal of Advanced Robotic Systems 9, no. 4 (January 2012): 123. http://dx.doi.org/10.5772/51373.
Повний текст джерелаŠimek, Dalibor, and Roman Šperka. "How Robot/human Orchestration Can Help in an HR Department: A Case Study From a Pilot Implementation." Organizacija 52, no. 3 (August 1, 2019): 204–17. http://dx.doi.org/10.2478/orga-2019-0013.
Повний текст джерелаBadewi, Amgad, Essam Shehab, Jing Zeng, and Mostafa Mohamad. "ERP benefits capability framework: orchestration theory perspective." Business Process Management Journal 24, no. 1 (February 2, 2018): 266–94. http://dx.doi.org/10.1108/bpmj-11-2015-0162.
Повний текст джерелаHermosilla, Ana, Alejandro Molina Zarca, Jorge Bernal Bernabe, Jordi Ortiz, and Antonio Skarmeta. "Security Orchestration and Enforcement in NFV/SDN-Aware UAV Deployments." IEEE Access 8 (2020): 131779–95. http://dx.doi.org/10.1109/access.2020.3010209.
Повний текст джерелаBen Said, Najah, and Ioana Cristescu. "End-to-end information flow security for web services orchestration." Science of Computer Programming 187 (February 2020): 102376. http://dx.doi.org/10.1016/j.scico.2019.102376.
Повний текст джерелаChen, Liang, Xiao Jun Zuo, and Yu Fei Wang. "Research on Information Security Test Bed and Evaluation Framework for Distribution Automation System." Applied Mechanics and Materials 737 (March 2015): 210–13. http://dx.doi.org/10.4028/www.scientific.net/amm.737.210.
Повний текст джерелаLiu, Fang. "Social Security Research under Automation Control." Applied Mechanics and Materials 340 (July 2013): 621–25. http://dx.doi.org/10.4028/www.scientific.net/amm.340.621.
Повний текст джерелаSingh, Er Dhananjali, Satyendra Kumar Singh, and Jitendra Kumar Yadav. "Home Automation and Security Using IOT." IJARCCE 8, no. 5 (May 30, 2019): 52–56. http://dx.doi.org/10.17148/ijarcce.2019.8512.
Повний текст джерелаKirubakaran, B., K. Baveena, M. Keerthana, and R. Ramya. "Automation Based StairBOT for Security Application." DJ Journal of Advances in Electronics and Communication Engineering 4, no. 2 (May 26, 2018): 17–21. http://dx.doi.org/10.18831/djece.org/2018021003.
Повний текст джерелаTreytl, Albert, Peter Palensky, and Thilo Sauter. "SECURITY CONSIDERATIONS FOR ENERGY AUTOMATION NETWORKS." IFAC Proceedings Volumes 38, no. 2 (2005): 158–65. http://dx.doi.org/10.3182/20051114-2-mx-3901.00023.
Повний текст джерела