Статті в журналах з теми "Security solutions"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security solutions".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai, and Bhagyashri D. Dangewar. "Cloud Security: Problems and Solutions." International Journal of Scientific Research 3, no. 4 (June 1, 2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.
Повний текст джерелаXu, Vincent. "Data Security Solutions." RESEARCH REVIEW International Journal of Multidisciplinary 05, no. 07 (July 15, 2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.
Повний текст джерелаWebb, K. W. "Biometric Security Solutions." IEEE Security and Privacy Magazine 3, no. 5 (September 2005): 7. http://dx.doi.org/10.1109/msp.2005.117.
Повний текст джерелаGOHOREANU, Bogdan, Florin SANDU, and Dan-Nicolae ROBU. "SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 1 (July 31, 2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.
Повний текст джерелаWEBER, CYNTHIA, and MARK LACY. "Securing by design." Review of International Studies 37, no. 3 (March 1, 2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.
Повний текст джерелаZakarya, Muhammad, Muazzam Ali Khattak, Izaz Ur Rahman, and Ayaz Ali Khan. "Grid High Availability and Service Security Issues with Solutions." International Journal of Engineering and Technology 4, no. 6 (2012): 723–29. http://dx.doi.org/10.7763/ijet.2012.v4.472.
Повний текст джерелаGEANĂ, Ionuţ Cătălin. "Security Solutions for Informatics Systems." International Journal of Information Security and Cybercrime 1, no. 2 (December 21, 2012): 17–24. http://dx.doi.org/10.19107/ijisc.2012.02.02.
Повний текст джерелаDhiman, Deepika. "WLAN Security Issues and Solutions." IOSR Journal of Computer Engineering 16, no. 1 (2014): 67–75. http://dx.doi.org/10.9790/0661-16146775.
Повний текст джерелаFausett, Crystal M., Megan P. Christovich, Jarod M. Parker, John M. Baker, and Joseph R. Keebler. "Telemedicine Security: Challenges and Solutions." Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, no. 1 (June 2021): 340–44. http://dx.doi.org/10.1177/2327857921101241.
Повний текст джерелаTrubilin, Alexander Ivanovich, Konstantin Eduardovich Tyupakov, and Alexander Alexandrovich Adamenko. "Food security: problems and solutions." Proceedings of the Kuban State Agrarian University, no. 90 (2021): 5–10. http://dx.doi.org/10.21515/1999-1703-90-5-10.
Повний текст джерелаYaacob, Mashkuri, Farhat Anwar, Rashidah Funke Olanrewaju, Burhan Ul Islam Khan, and Roohie Naaz Mir. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.10026783.
Повний текст джерелаKhan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Farhat Anwar, Roohie Naaz Mir, and Mashkuri Yaacob. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.105180.
Повний текст джерелаSmith, Robert E. "Proactive Solutions for Multinetwork Security." Information Systems Security 3, no. 2 (January 1994): 47–55. http://dx.doi.org/10.1080/10658989409342456.
Повний текст джерелаNorifusa, Masaya. "Internet security: difficulties and solutions." International Journal of Medical Informatics 49, no. 1 (March 1998): 69–74. http://dx.doi.org/10.1016/s1386-5056(98)00012-4.
Повний текст джерелаHancock, Bill. "Network Solutions Re-evaluates Security." Computers & Security 19, no. 5 (July 2000): 398–400. http://dx.doi.org/10.1016/s0167-4048(00)05018-5.
Повний текст джерелаReid, Linda. "Information Security: Risks and Solutions." Journal of Information Privacy and Security 2, no. 1 (January 2006): 1–2. http://dx.doi.org/10.1080/15536548.2006.10855782.
Повний текст джерелаH.S, Anupama, Anusha M, Aparna Joshi, Apoorva N, N. K. Cauvery, and Lingaraju G.M. "Security Solutions Using Brain Signals." IAES International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (April 20, 2018): 105. http://dx.doi.org/10.11591/ijai.v7.i2.pp105-110.
Повний текст джерелаPotdar, Aarti, Pranav Patil, Raunak Bagla, and Rohitashwa Pandey. "Security Solutions for Cloud Computing." International Journal of Computer Applications 128, no. 16 (October 15, 2015): 17–21. http://dx.doi.org/10.5120/ijca2015906747.
Повний текст джерелаPhithakkitnukoon, Santi, Ram Dantu, and Enkh-Amgalan Baatarjav. "VoIP Security — Attacks and Solutions." Information Security Journal: A Global Perspective 17, no. 3 (July 29, 2008): 114–23. http://dx.doi.org/10.1080/19393550802308618.
Повний текст джерелаBarki, Amira, Abdelmadjid Bouabdallah, Said Gharout, and Jacques Traore. "M2M Security: Challenges and Solutions." IEEE Communications Surveys & Tutorials 18, no. 2 (2016): 1241–54. http://dx.doi.org/10.1109/comst.2016.2515516.
Повний текст джерелаKim, JiHoon, Jong In Lim, and Huy Kang Kim. "Collaborative security response by interworking between multiple security solutions." Journal of the Korea Institute of Information Security and Cryptology 23, no. 1 (February 28, 2013): 69–79. http://dx.doi.org/10.13089/jkiisc.2013.23.1.069.
Повний текст джерелаN, Dr Chitra Kiran, Mr Suhas Suresh, and Mrs Suchira Suresh. "Vulnerability, threats, and attacks in E-Payments System: Security Solutions." International Journal of Psychosocial Rehabilitation 24, no. 04 (February 28, 2020): 829–39. http://dx.doi.org/10.37200/ijpr/v24i4/pr201056.
Повний текст джерелаFotiou and Polyzos. "Name-Based Security for Information-Centric Networking Architectures." Future Internet 11, no. 11 (November 1, 2019): 232. http://dx.doi.org/10.3390/fi11110232.
Повний текст джерелаBrown, Michael G., and Paolina Centonze. "Exploiting Flaws in Big Data Systems." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (May 17, 2016): 6967–75. http://dx.doi.org/10.24297/ijct.v15i8.1498.
Повний текст джерелаChhikara, Shashi, Iti Raghav, and Nitasha Hasteer. "Analyzing Security Solutions in Cloud Computing." International Journal of Computer Applications 68, no. 25 (April 18, 2013): 17–21. http://dx.doi.org/10.5120/11750-7247.
Повний текст джерелаDhingra, Madhavi. "BYOD SECURITY AND ITS POSSIBLE SOLUTIONS." International Journal of Engineering Technologies and Management Research 5, no. 2 (April 27, 2020): 101–6. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.620.
Повний текст джерелаRosaire, Senou Mahugnon, and Degila Jules. "Smart Contracts Security Threats and Solutions." International Journal of Information Technology and Web Engineering 17, no. 1 (January 1, 2022): 1–30. http://dx.doi.org/10.4018/ijitwe.304048.
Повний текст джерелаTrabelsi, Zouheir, and Wassim El Hajj. "On investigating ARP spoofing security solutions." International Journal of Internet Protocol Technology 5, no. 1/2 (2010): 92. http://dx.doi.org/10.1504/ijipt.2010.032618.
Повний текст джерелаSTEFAN, HENRY, and LIAKAT ALI Md. "CLOUD COMPUTING SECURITY THREATS AND SOLUTIONS." i-manager’s Journal on Cloud Computing 4, no. 2 (2017): 1. http://dx.doi.org/10.26634/jcc.4.2.14249.
Повний текст джерелаEljialy, A. E. M. "Proposed Solutions of Oracle Sysdba Security." Journal of Industrial and Intelligent Information 1, no. 1 (2013): 68–71. http://dx.doi.org/10.12720/jiii.1.1.68-71.
Повний текст джерелаCAZACU, Andrei-Robert. "IoT Security: Threats and Possible Solutions." Informatica Economica 26, no. 2/2022 (June 30, 2022): 57–64. http://dx.doi.org/10.24818/issn14531305/26.2.2022.06.
Повний текст джерелаFortov, V. E., A. A. Makarov, and T. A. Mitrova. "Global energy security: Problems and solutions." Herald of the Russian Academy of Sciences 77, no. 1 (February 2007): 7–14. http://dx.doi.org/10.1134/s1019331607010029.
Повний текст джерелаHerath, Tejaswini C., Hemantha S. B. Herath, and John D'Arcy. "Organizational Adoption of Information Security Solutions." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 51, no. 2 (May 13, 2020): 12–35. http://dx.doi.org/10.1145/3400043.3400046.
Повний текст джерелаShoham, O. "IP@SS - integrated passenger security solutions." IEEE Aerospace and Electronic Systems Magazine 18, no. 3 (March 2003): 16–21. http://dx.doi.org/10.1109/maes.2003.1193714.
Повний текст джерелаBlatchford, Clive W. "The Fight for International Security Solutions." Information Systems Security 2, no. 3 (January 1993): 23–27. http://dx.doi.org/10.1080/19393559308551363.
Повний текст джерелаFlater, David. "Bad Security Metrics Part 2: Solutions." IT Professional 20, no. 2 (March 2018): 76–79. http://dx.doi.org/10.1109/mitp.2018.021921653.
Повний текст джерелаOgiela, Marek R. "Cognitive solutions for security and cryptography." Cognitive Systems Research 55 (June 2019): 258–61. http://dx.doi.org/10.1016/j.cogsys.2019.02.006.
Повний текст джерелаS., Dr Arunkumar. "Cryptography based Security Solutions to IOT Enabled Health Care Monitoring System." Journal of Advanced Research in Dynamical and Control Systems 12, no. 7 (July 20, 2020): 265–72. http://dx.doi.org/10.5373/jardcs/v12i7/20202008.
Повний текст джерелаDarji, Dhara N., and Nita B. Thakkar. "Challenges in Mobile Ad Hoc Networks: Security Threats and its Solutions." Indian Journal of Applied Research 3, no. 1 (October 1, 2011): 72–74. http://dx.doi.org/10.15373/2249555x/jan2013/29.
Повний текст джерелаMAREȘ, Marian-Sorin. "Solutions to Secure a Network." International Journal of Information Security and Cybercrime 7, no. 2 (December 29, 2018): 41–51. http://dx.doi.org/10.19107/ijisc.2018.02.05.
Повний текст джерелаZanoon, Nabeel, Nashat Albdour, Hatem S. A. Hamatta, and Rasha Moh'd Al-Tarawneh. "Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security Solutions." International Journal of Network Security & Its Applications 7, no. 3 (May 30, 2015): 01–13. http://dx.doi.org/10.5121/ijnsa.2015.7301.
Повний текст джерелаMichelberger, Pál, and Ágnes Kemendi. "DATA, INFORMATION AND IT SECURITY - SOFTWARE SUPPORT FOR SECURITY ACTIVITIES." Problems of Management in the 21st Century 15, no. 2 (December 10, 2020): 108–24. http://dx.doi.org/10.33225/pmc/20.15.108.
Повний текст джерелаKaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (October 2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.
Повний текст джерелаMohan, Madan, Aadarsh Malviya, and Anuranjan Mishra. "Big Data Security Problem and Its Solutions." International Journal of Engineering and Advanced Technology 11, no. 1 (October 30, 2021): 34–36. http://dx.doi.org/10.35940/ijeat.a3130.1011121.
Повний текст джерелаTawalbeh, Lo’ai, Fadi Muheidat, Mais Tawalbeh, and Muhannad Quwaider. "IoT Privacy and Security: Challenges and Solutions." Applied Sciences 10, no. 12 (June 15, 2020): 4102. http://dx.doi.org/10.3390/app10124102.
Повний текст джерелаSharma, Ravi, and Nonita Sharma. "Attacks on Resource-Constrained IoT Devices and Security Solutions." International Journal of Software Science and Computational Intelligence 14, no. 1 (January 1, 2022): 1–21. http://dx.doi.org/10.4018/ijssci.310943.
Повний текст джерелаRamanauskaitė, Simona, Anatoly Shein, Antanas Čenys, and Justinas Rastenis. "Security Ontology Structure for Formalization of Security Document Knowledge." Electronics 11, no. 7 (March 31, 2022): 1103. http://dx.doi.org/10.3390/electronics11071103.
Повний текст джерелаKarimkulov, Kurbonkul Mavlankulovich, Ikromjon Esanboyevich Uzohkov, and Madraim Khasanovich Sarikulov. "Food security in Uzbekistan: Problems and solutions." South Asian Journal of Marketing & Management Research 10, no. 11 (2020): 115–23. http://dx.doi.org/10.5958/2249-877x.2020.00080.6.
Повний текст джерелаLevashov, Viktor, and Viliam Sarian. "The digitalization and security: problems and solutions." Social novelties and Social sciences, no. 1 (2020): 37–46. http://dx.doi.org/10.31249/snsn/2020.01.03.
Повний текст джерелаIbn Minar, Nateq Be Nazir. "Bluetooth Security Threats And Solutions: A Survey." International Journal of Distributed and Parallel systems 3, no. 1 (January 31, 2012): 127–48. http://dx.doi.org/10.5121/ijdps.2012.3110.
Повний текст джерела