Статті в журналах з теми "Security solutions"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security solutions".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai, and Bhagyashri D. Dangewar. "Cloud Security: Problems and Solutions." International Journal of Scientific Research 3, no. 4 (June 1, 2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.
Xu, Vincent. "Data Security Solutions." RESEARCH REVIEW International Journal of Multidisciplinary 05, no. 07 (July 15, 2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.
Webb, K. W. "Biometric Security Solutions." IEEE Security and Privacy Magazine 3, no. 5 (September 2005): 7. http://dx.doi.org/10.1109/msp.2005.117.
GOHOREANU, Bogdan, Florin SANDU, and Dan-Nicolae ROBU. "SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 1 (July 31, 2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.
WEBER, CYNTHIA, and MARK LACY. "Securing by design." Review of International Studies 37, no. 3 (March 1, 2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.
Zakarya, Muhammad, Muazzam Ali Khattak, Izaz Ur Rahman, and Ayaz Ali Khan. "Grid High Availability and Service Security Issues with Solutions." International Journal of Engineering and Technology 4, no. 6 (2012): 723–29. http://dx.doi.org/10.7763/ijet.2012.v4.472.
GEANĂ, Ionuţ Cătălin. "Security Solutions for Informatics Systems." International Journal of Information Security and Cybercrime 1, no. 2 (December 21, 2012): 17–24. http://dx.doi.org/10.19107/ijisc.2012.02.02.
Dhiman, Deepika. "WLAN Security Issues and Solutions." IOSR Journal of Computer Engineering 16, no. 1 (2014): 67–75. http://dx.doi.org/10.9790/0661-16146775.
Fausett, Crystal M., Megan P. Christovich, Jarod M. Parker, John M. Baker, and Joseph R. Keebler. "Telemedicine Security: Challenges and Solutions." Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, no. 1 (June 2021): 340–44. http://dx.doi.org/10.1177/2327857921101241.
Trubilin, Alexander Ivanovich, Konstantin Eduardovich Tyupakov, and Alexander Alexandrovich Adamenko. "Food security: problems and solutions." Proceedings of the Kuban State Agrarian University, no. 90 (2021): 5–10. http://dx.doi.org/10.21515/1999-1703-90-5-10.
Yaacob, Mashkuri, Farhat Anwar, Rashidah Funke Olanrewaju, Burhan Ul Islam Khan, and Roohie Naaz Mir. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.10026783.
Khan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Farhat Anwar, Roohie Naaz Mir, and Mashkuri Yaacob. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.105180.
Smith, Robert E. "Proactive Solutions for Multinetwork Security." Information Systems Security 3, no. 2 (January 1994): 47–55. http://dx.doi.org/10.1080/10658989409342456.
Norifusa, Masaya. "Internet security: difficulties and solutions." International Journal of Medical Informatics 49, no. 1 (March 1998): 69–74. http://dx.doi.org/10.1016/s1386-5056(98)00012-4.
Hancock, Bill. "Network Solutions Re-evaluates Security." Computers & Security 19, no. 5 (July 2000): 398–400. http://dx.doi.org/10.1016/s0167-4048(00)05018-5.
Reid, Linda. "Information Security: Risks and Solutions." Journal of Information Privacy and Security 2, no. 1 (January 2006): 1–2. http://dx.doi.org/10.1080/15536548.2006.10855782.
H.S, Anupama, Anusha M, Aparna Joshi, Apoorva N, N. K. Cauvery, and Lingaraju G.M. "Security Solutions Using Brain Signals." IAES International Journal of Artificial Intelligence (IJ-AI) 7, no. 2 (April 20, 2018): 105. http://dx.doi.org/10.11591/ijai.v7.i2.pp105-110.
Potdar, Aarti, Pranav Patil, Raunak Bagla, and Rohitashwa Pandey. "Security Solutions for Cloud Computing." International Journal of Computer Applications 128, no. 16 (October 15, 2015): 17–21. http://dx.doi.org/10.5120/ijca2015906747.
Phithakkitnukoon, Santi, Ram Dantu, and Enkh-Amgalan Baatarjav. "VoIP Security — Attacks and Solutions." Information Security Journal: A Global Perspective 17, no. 3 (July 29, 2008): 114–23. http://dx.doi.org/10.1080/19393550802308618.
Barki, Amira, Abdelmadjid Bouabdallah, Said Gharout, and Jacques Traore. "M2M Security: Challenges and Solutions." IEEE Communications Surveys & Tutorials 18, no. 2 (2016): 1241–54. http://dx.doi.org/10.1109/comst.2016.2515516.
Kim, JiHoon, Jong In Lim, and Huy Kang Kim. "Collaborative security response by interworking between multiple security solutions." Journal of the Korea Institute of Information Security and Cryptology 23, no. 1 (February 28, 2013): 69–79. http://dx.doi.org/10.13089/jkiisc.2013.23.1.069.
N, Dr Chitra Kiran, Mr Suhas Suresh, and Mrs Suchira Suresh. "Vulnerability, threats, and attacks in E-Payments System: Security Solutions." International Journal of Psychosocial Rehabilitation 24, no. 04 (February 28, 2020): 829–39. http://dx.doi.org/10.37200/ijpr/v24i4/pr201056.
Fotiou and Polyzos. "Name-Based Security for Information-Centric Networking Architectures." Future Internet 11, no. 11 (November 1, 2019): 232. http://dx.doi.org/10.3390/fi11110232.
Brown, Michael G., and Paolina Centonze. "Exploiting Flaws in Big Data Systems." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (May 17, 2016): 6967–75. http://dx.doi.org/10.24297/ijct.v15i8.1498.
Chhikara, Shashi, Iti Raghav, and Nitasha Hasteer. "Analyzing Security Solutions in Cloud Computing." International Journal of Computer Applications 68, no. 25 (April 18, 2013): 17–21. http://dx.doi.org/10.5120/11750-7247.
Dhingra, Madhavi. "BYOD SECURITY AND ITS POSSIBLE SOLUTIONS." International Journal of Engineering Technologies and Management Research 5, no. 2 (April 27, 2020): 101–6. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.620.
Rosaire, Senou Mahugnon, and Degila Jules. "Smart Contracts Security Threats and Solutions." International Journal of Information Technology and Web Engineering 17, no. 1 (January 1, 2022): 1–30. http://dx.doi.org/10.4018/ijitwe.304048.
Trabelsi, Zouheir, and Wassim El Hajj. "On investigating ARP spoofing security solutions." International Journal of Internet Protocol Technology 5, no. 1/2 (2010): 92. http://dx.doi.org/10.1504/ijipt.2010.032618.
STEFAN, HENRY, and LIAKAT ALI Md. "CLOUD COMPUTING SECURITY THREATS AND SOLUTIONS." i-manager’s Journal on Cloud Computing 4, no. 2 (2017): 1. http://dx.doi.org/10.26634/jcc.4.2.14249.
Eljialy, A. E. M. "Proposed Solutions of Oracle Sysdba Security." Journal of Industrial and Intelligent Information 1, no. 1 (2013): 68–71. http://dx.doi.org/10.12720/jiii.1.1.68-71.
CAZACU, Andrei-Robert. "IoT Security: Threats and Possible Solutions." Informatica Economica 26, no. 2/2022 (June 30, 2022): 57–64. http://dx.doi.org/10.24818/issn14531305/26.2.2022.06.
Fortov, V. E., A. A. Makarov, and T. A. Mitrova. "Global energy security: Problems and solutions." Herald of the Russian Academy of Sciences 77, no. 1 (February 2007): 7–14. http://dx.doi.org/10.1134/s1019331607010029.
Herath, Tejaswini C., Hemantha S. B. Herath, and John D'Arcy. "Organizational Adoption of Information Security Solutions." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 51, no. 2 (May 13, 2020): 12–35. http://dx.doi.org/10.1145/3400043.3400046.
Shoham, O. "IP@SS - integrated passenger security solutions." IEEE Aerospace and Electronic Systems Magazine 18, no. 3 (March 2003): 16–21. http://dx.doi.org/10.1109/maes.2003.1193714.
Blatchford, Clive W. "The Fight for International Security Solutions." Information Systems Security 2, no. 3 (January 1993): 23–27. http://dx.doi.org/10.1080/19393559308551363.
Flater, David. "Bad Security Metrics Part 2: Solutions." IT Professional 20, no. 2 (March 2018): 76–79. http://dx.doi.org/10.1109/mitp.2018.021921653.
Ogiela, Marek R. "Cognitive solutions for security and cryptography." Cognitive Systems Research 55 (June 2019): 258–61. http://dx.doi.org/10.1016/j.cogsys.2019.02.006.
S., Dr Arunkumar. "Cryptography based Security Solutions to IOT Enabled Health Care Monitoring System." Journal of Advanced Research in Dynamical and Control Systems 12, no. 7 (July 20, 2020): 265–72. http://dx.doi.org/10.5373/jardcs/v12i7/20202008.
Darji, Dhara N., and Nita B. Thakkar. "Challenges in Mobile Ad Hoc Networks: Security Threats and its Solutions." Indian Journal of Applied Research 3, no. 1 (October 1, 2011): 72–74. http://dx.doi.org/10.15373/2249555x/jan2013/29.
MAREȘ, Marian-Sorin. "Solutions to Secure a Network." International Journal of Information Security and Cybercrime 7, no. 2 (December 29, 2018): 41–51. http://dx.doi.org/10.19107/ijisc.2018.02.05.
Zanoon, Nabeel, Nashat Albdour, Hatem S. A. Hamatta, and Rasha Moh'd Al-Tarawneh. "Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security Solutions." International Journal of Network Security & Its Applications 7, no. 3 (May 30, 2015): 01–13. http://dx.doi.org/10.5121/ijnsa.2015.7301.
Michelberger, Pál, and Ágnes Kemendi. "DATA, INFORMATION AND IT SECURITY - SOFTWARE SUPPORT FOR SECURITY ACTIVITIES." Problems of Management in the 21st Century 15, no. 2 (December 10, 2020): 108–24. http://dx.doi.org/10.33225/pmc/20.15.108.
Kaliyamurthy, Nitheesh Murugan, Swapnesh Taterh, and Suresh Shanmugasundaram. "Software Defined Networking – Imposed Security Measures Over Vulnerable Threats and Attacks." International Journal of Applied Metaheuristic Computing 10, no. 4 (October 2019): 60–67. http://dx.doi.org/10.4018/ijamc.2019100104.
Mohan, Madan, Aadarsh Malviya, and Anuranjan Mishra. "Big Data Security Problem and Its Solutions." International Journal of Engineering and Advanced Technology 11, no. 1 (October 30, 2021): 34–36. http://dx.doi.org/10.35940/ijeat.a3130.1011121.
Tawalbeh, Lo’ai, Fadi Muheidat, Mais Tawalbeh, and Muhannad Quwaider. "IoT Privacy and Security: Challenges and Solutions." Applied Sciences 10, no. 12 (June 15, 2020): 4102. http://dx.doi.org/10.3390/app10124102.
Sharma, Ravi, and Nonita Sharma. "Attacks on Resource-Constrained IoT Devices and Security Solutions." International Journal of Software Science and Computational Intelligence 14, no. 1 (January 1, 2022): 1–21. http://dx.doi.org/10.4018/ijssci.310943.
Ramanauskaitė, Simona, Anatoly Shein, Antanas Čenys, and Justinas Rastenis. "Security Ontology Structure for Formalization of Security Document Knowledge." Electronics 11, no. 7 (March 31, 2022): 1103. http://dx.doi.org/10.3390/electronics11071103.
Karimkulov, Kurbonkul Mavlankulovich, Ikromjon Esanboyevich Uzohkov, and Madraim Khasanovich Sarikulov. "Food security in Uzbekistan: Problems and solutions." South Asian Journal of Marketing & Management Research 10, no. 11 (2020): 115–23. http://dx.doi.org/10.5958/2249-877x.2020.00080.6.
Levashov, Viktor, and Viliam Sarian. "The digitalization and security: problems and solutions." Social novelties and Social sciences, no. 1 (2020): 37–46. http://dx.doi.org/10.31249/snsn/2020.01.03.
Ibn Minar, Nateq Be Nazir. "Bluetooth Security Threats And Solutions: A Survey." International Journal of Distributed and Parallel systems 3, no. 1 (January 31, 2012): 127–48. http://dx.doi.org/10.5121/ijdps.2012.3110.