Results for 'Security'

989 found
Order:
  1. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Food security: modern challenges and mechanisms to ensure.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Košice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring food security during martial law requires the use of mechanisms to support agricultural exports, diversify logistics routes, ensure environmental safety, provide financial and marketing support. Basic research focuses on assessment the state of agricultural producers, analysing the financial and accounting system, logistics activities, ensuring competitiveness, and environmental pollution. The research results have been implemented in the different decision-making models during martial law, international logistics management, digital audit, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  4. Human Security Law in Iraq: Reforming Rules, Practices, and Urban Spaces.Hannibal Travis - manuscript
    This article addresses a few moments in the evolution of human security law in Iraq, focusing in particular on the Coalition Provisional Authority, the new Iraqi Constitution, Iraqi High Tribunal (successor to the Iraqi Special Tribunal), and the International Criminal Court. It synthesizes the results of some existing research on ongoing impunity for certain crimes against political candidates, journalists, anti-corruption activists, and ethnic and religious minorities, a situation which may have tainted Iraq’s transition to a more democratic republic, while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  79
    Cloud Security Automation: Leveraging AI and Machine Learning for Protection.Monika Bhandakar Muskan Chourasia, Laxmi Thakre, , Dnyaneshwari Mendhe - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research 13 (2):868-871.
    Cloud security automation has become increasingly vital as organizations scale their operations in the cloud. As cyber threats become more sophisticated and frequent, traditional security measures are no longer enough to effectively protect cloud environments. This paper explores the role of Artificial Intelligence (AI) and Machine Learning (ML) in automating cloud security processes. By integrating AI and ML, organizations can proactively detect, respond to, and mitigate potential security threats in real-time. This paper reviews current applications of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Perceptually Secured Knowledge.Elijah Chudnoff - 2025 - In Ori Beck & Farid Masrour, The Relational View of Perception: New Philosophical Essays. New York, NY: Routledge.
    Perceptually secured knowledge consists of beliefs that amount to knowledge just because they are based on suitable perceptual states. Relationism about the ground of perceptually secured knowledge is the view that if a perceptual state can make a belief based on it amount to knowledge, then it can do that because it constitutes an appropriate kind of relational state, e.g., a state of perceptual acquaintance. I explore the prospects of both maintaining that some beliefs amount to perceptually secured knowledge and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  47
    Cloud Security and Compliance: Navigating the Complexities.Karishma K. H. Anusha J. Adhikar, Apeksha K. Jadhav, Charitha G. - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (3):864-866.
    As businesses increasingly move to the cloud, they face growing challenges in ensuring both security and compliance. The complexity arises from the need to protect sensitive data while adhering to a wide range of regulatory requirements, such as GDPR, HIPAA, and industry-specific standards. This paper explores the intersection of cloud security and compliance, focusing on the challenges organizations face when navigating these complexities. We discuss the shared responsibility model, key compliance frameworks, and strategies to integrate security and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  47
    Enhancing Security of Cloud-Native Microservices with Service Mesh Technologies.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1.
    : As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  9. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  75
    SECURITY AND PRIVACY TECHNIQUE IN BIG DATA: A REVIEW.Pamarthi Kartheek - 2024 - North American Journal of Engineering Research 5 (1).
    The importance of Big Data as a foundational component of the AI and ML landscape is not going away anytime soon. As a result, the past fifteen years have seen a tremendous investment in Big Data research. The purpose of this literature review is to compile the most recent results from Big Data studies conducted over the past fifteen years. The study will address questions about the main applications of Big Data analytics, the main challenges and limitations encountered by researchers, (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  11. Freedom, security and justice in the European Union: a short genealogy of the "Security Union".Elisa Orru - 2022 - Eunomia 11 (1):143–162.
    This article focuses on the so-called “Area of Freedom, Security and Justice” (ASFJ), namely the policy field of the European Union (EU) that covers judicial and police cooperation, migration and asylum policies and the control of external borders. The article explores how the AFSJ has emerged and how, within it, the relationship between freedom and security has evolved over time and brought about a shift towards a “Security Union”.
    Download  
     
    Export citation  
     
    Bookmark  
  12. ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed to accommodate both (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  13. Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Security practices in AI development.Petr Spelda & Vit Stritecky - forthcoming - AI and Society.
    What makes safety claims about general purpose AI systems such as large language models trustworthy? We show that rather than the capabilities of security tools such as alignment and red teaming procedures, it is security practices based on these tools that contributed to reconfiguring the image of AI safety and made the claims acceptable. After showing what causes the gap between the capabilities of security tools and the desired safety guarantees, we critically investigate how AI security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Attachment, Security, and Relational Networks.Stephanie Collins & Liam Shields - forthcoming - Journal of Value Inquiry.
    The philosophical literature on personal relationships is focused on dyads: close relationships between just two people. This paper aims to characterise the value of looser and larger relational networks, particularly from the perspective of liberal political theory. We focus on relational networks' value vis-a-vis the important good of felt security. We begin by characterising felt security and analysing how felt security is produced within dyads. We highlight the ambivalent nature of dyadic relationships as a source of felt (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  21
    Secure the Drug Components using Data Mining.Santhosh Kumar DrK. V. Shiny, Sujay Sharvesh A. S., Sridhar D. - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    In the pharmaceutical and healthcare industries, the secure handling of sensitive drug component data is crucial. This project presents a comprehensive system for the secure storage, encryption, and controlled access of drug datasets using modern encryption techniques and cloud-based storage. Users can upload drug-related CSV files through a web interface, which are then processed and encrypted selectively before being uploaded to Amazon S3. Each file is associated with a unique encryption key, which is securely stored and can only be retrieved (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  67
    SECURING CLOUD-NATIVE MICROSERVICES WITH SERVICE MESH TECHNOLOGIES.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-6.
    As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by implementing (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  18.  60
    Cloud Security Unlocked: Safeguarding the Digital Frontier.Godse Rahul Vishwakarma Prem, Sanjay Kumar - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management 12 (2):613-618.
    As businesses and individuals increasingly rely on cloud computing for a vast array of services, the need for robust cloud security becomes ever more critical. Cloud environments offer unparalleled flexibility, scalability, and cost-effectiveness but simultaneously introduce a complex security landscape that poses significant challenges. The importance of safeguarding data, applications, and systems from cyber threats in the cloud is paramount to maintaining the confidentiality, integrity, and availability of digital assets. This paper explores the evolving landscape of cloud (...), identifying the risks and vulnerabilities inherent in cloud computing and the key strategies and technologies used to mitigate them. We introduce a comprehensive framework for cloud security that incorporates encryption, access management, threat detection, and compliance adherence. Emerging technologies like Artificial Intelligence (AI), Machine Learning (ML), and blockchain are also discussed, showcasing their role in transforming cloud security practices. By analyzing best practices and future trends, this paper provides a roadmap for securing the digital frontier in an era increasingly defined by cloud computing. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Monitoring Peace and Security Mandates for Human Rights.Deepa Kansra - 2022 - Artha: The Sri Ram Economics Journal 1 (1):188-192.
    The jurisprudence under international human rights treaties has had a considerable impact across countries. Known for addressing complex agendas, the work of expert bodies under the treaties has been credited and relied upon for filling the gaps in the realization of several objectives, including the peace and security agenda. -/- In 1982, the Human Rights Committee (ICCPR), in a General Comment observed that “states have the supreme duty to prevent wars, acts of genocide and other acts of mass violence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Download  
     
    Export citation  
     
    Bookmark  
  21.  56
    Cloud Security Vulnerabilities: How to Identify and Address Risks.Tejas S. Zagade Nitin D. Parkhe, Paresh L. Waghmare, Bhushan P. Rathod - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research 13 (2):851-853.
    Cloud computing has revolutionized the way businesses store and process data, offering flexibility, scalability, and cost efficiency. However, with these benefits come significant security risks. Cloud environments introduce unique vulnerabilities that organizations must address to ensure data protection and maintain compliance. This paper explores common cloud security vulnerabilities, methods for identifying risks, and strategies for mitigating them. By reviewing existing literature and best practices, the study emphasizes the importance of proactive security measures in preventing data breaches, unauthorized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - 2025 - Critical Review of International Social and Political Philosophy 28 (2):286-306.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Food security as a global public good.Cristian Timmermann - 2020 - In José Luis Vivero-Pol, Tomaso Ferrando, Olivier de Schutter & Ugo Mattei, Routledge Handbook of Food as a Commons. Routledge. pp. 85-99.
    Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good. However, there are four other ways of understanding a public good which are worthy of attention. A normative public good is a good from which nobody ought to be excluded. Alternatively, one might acknowledge the benevolent character of a public good. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  38
    AI Security: A Unified Risk Governance Framework for Cybersecurity Compliance.Tripathi Praveen - 2023 - International Journal of Innovative Research in Computer and Communication Engineering 11 (4):1691-1693.
    Cloud security remains a top concern for enterprises. This study introduces AI Security, a risk governance framework integrating AI, DevSecOps, and predictive analytics to enhance compliance automation and threat intelligence in cloud environments.
    Download  
     
    Export citation  
     
    Bookmark  
  25.  37
    Securing the Cloud: Best Practices for Protecting Your Data.Saket Khandarkar Zeeshan Shaikh, Suyesh Badge, Tushar Parvez - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (3):839-841.
    Cloud computing has revolutionized how businesses store and access data, but it also introduces new risks. Securing data in the cloud requires a combination of strategic approaches, robust policies, and technological solutions. This paper explores best practices for safeguarding cloud environments, including encryption, access controls, regular security audits, and the implementation of a zero-trust architecture. By identifying key risks and offering practical solutions, this research provides a roadmap for businesses to enhance cloud security and mitigate potential threats.
    Download  
     
    Export citation  
     
    Bookmark  
  26.  37
    Securing the Distributed Workforce: A Framework for Enterprise Cybersecurity in the Post-COVID Era.Sreejith Sreekandan Nair Govindarajan Lakshmikanthan - 2022 - International Journal of Advanced Research in Education and Technology 9 (2):594-602.
    COVID-19 is the new standard for forced changes in the workforce, forcing the adoption of remote and hybrid work environments globally. It was in the period of this rapid adoption of distributed work environments that new opportunities for flexibility and productivity were opened up, but fundamental weaknesses of conventional notions of cybersecurity were unveiled. As employees connect to company networks from a plethora of different places and different types of devices, situations were complex at the corporate level to ensure that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  45
    Network Security Threat Detection in IoT-Enabled Smart Cities.Reddy Pothireddy Nirup Kumar - 2022 - International Journal of Scientific Research in Science and Technology 9 (4):784-799.
    Since security threats in IoT-enabled smart cities may not appear clear and present to detection mechanisms, efforts have been made to use artificial intelligence methods for anomaly detection. Anomaly detection has been performed using unsupervised learning approaches (Autoencoders, GANs, One Class SVMs) in turn, with these instances considered security threats. In addition, an element for patches and traffic redirection in real time is included in the framework. Results show that the AI detection in general has much more (...) resilience, decreasing possible attack vectors. This makes the integration of various features like AI, blockchain, and IDS for a solid IoT security a must. Since security threats in IoT-enabled smart cities may not appear clear and present to detection mechanisms, efforts have been made to use artificial intelligence methods for anomaly detection. Anomaly detection has been performed using unsupervised learning approaches (Autoencoders, GANs, One-Class SVMs) in turn, with these instances considered security threats. In addition, an element for patches and traffic redirection in real time is included in the framework. Results show that the AI detection in general has much more security resilience, decreasing possible attack vectors. This makes the integration of various features like AI, blockchain, and IDS for a solid IoT security a must. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Cesc - manuscript
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Security Institutions, Use of Force and the State: A Moral Framework.Shannon Ford - 2016 - Dissertation, Australian National University
    This thesis examines the key moral principles that should govern decision-making by police and military when using lethal force. To this end, it provides an ethical analysis of the following question: Under what circumstances, if any, is it morally justified for the agents of state-sanctioned security institutions to use lethal force, in particular the police and the military? Recent literature in this area suggests that modern conflicts involve new and unique features that render conventional ways of thinking about the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Securing IoT Networks: Machine Learning-Based Malware Detection and Adaption.G. Ganesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-16.
    Although Internet of Things (IoT) devices are being rapidly embraced worldwide, there are still several security concerns. Due to their limited resources, they are susceptible to malware assaults such as Gafgyt and Mirai, which have the ability to interrupt networks and infect devices. This work looks into methods based on machine learning to identify and categorize malware in IoT network activity. A dataset comprising both malware and benign traffic is used to assess different classification techniques, such as Random Forest, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Homomorphic Encryption: Enabling Secure Cloud Data Processing.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):260-264.
    Homomorphic encryption is a transformative cryptographic technique that enables secure cloud data processing by allowing computations on encrypted data without requiring decryption. Unlike traditional encryption methods, which protect data only at rest and in transit, homomorphic encryption ensures end-to-end security, even during computation. This capability is particularly vital for industries that rely on cloud computing while handling sensitive information, such as finance, healthcare, and government sectors. However, despite its strong security guarantees, the widespread adoption of homomorphic encryption remains (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  33.  86
    Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Self Control and Moral Security.Jessica Wolfendale & Jeanette Kennett - 2019 - In David Shoemaker, Oxford Studies in Agency and Responsibility Volume 6. Oxford University Press. pp. 33-63.
    Self-control is integral to successful human agency. Without it we cannot extend our agency across time and secure central social, moral, and personal goods. But self-control is not a unitary capacity. In the first part of this paper we provide a taxonomy of self-control and trace its connections to agency and the self. In part two, we turn our attention to the external conditions that support successful agency and the exercise of self-control. We argue that what we call moral (...) is a critical foundation for agency. Parts three and four explore what happens to agency when moral security is lacking, as in the case of those subject to racism, and those living in poverty. The disadvantages suffered by those who are poor, in a racial minority or other oppressed group, or suffering mental illness or addiction, are often attributed to a lack of individual self-control or personal responsibility. In particular, members of these groups are often seen as irresponsibly focused on short-term pleasures over long-term good, a view underwritten by particular psychological theories of self-control. We explore how narratives about racism and poverty undermine moral security, and limit and distort the possibility of synchronic and diachronic self-control. Where moral security is undermined, the connection between self-control and diachronic goods often fails to obtain and agency contracts accordingly. We close with some preliminary reflections on the implications for responsibility. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  37. Strengthening Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-663.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze network traffic, (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  38. OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the new subject (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  75
    A Proficient Two Level Security Contrivances for Storing Data in Cloud.R. Sugumar K. Anbazhagan - 2016 - Indian Journal of Science and Technology 9 (48):1-5.
    Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish algorithm is used in (...)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  43.  74
    Application Security in the OSI Model: Protecting the Application Layer from Emerging Threats.Bellamkonda Srikanth - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (5):8120-8126.
    The application layer of the Open Systems Interconnection (OSI) model plays a critical role in enabling end-user interaction with network services, making it a primary target for cybersecurity threats. This paper reviews contemporary research on securing the application layer, addressing emerging threats such as injection attacks, malware, phishing, and zero-day vulnerabilities. Key strategies, including secure development practices, application firewalls, cryptographic protocols, and user education, are explored to mitigate these risks. The challenges of an evolving threat landscape and resource constraints are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Global security and economic asymmetry: a comparison of developed and developing countries.Aida Guliyeva, Igor Britchenko & Ulviyya Rzayeva - 2018 - Journal of Security and Sustainability Issues 7 (4):707-719.
    This paper tackles the asymmetry of economic interests and geopolitics between developed and developing countries. Currently, the geopolitics presupposes that the majority of novel technologies are devised and designed in developed countries with their subsequent transfer to the developing countries. Moreover, in the context of the global crisis, the issue of de-dollarization is relevant from the political and economic points of view. Our specific focus is on the small oil countries and the issue how to get off the oil needle (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  45. Perpetual anarchy : From economic security to financial insecurity.S. M. Amadae - 2017 - Finance and Society 2 (3):188-96.
    This forum contribution addresses two major themes in de Goede’s original essay on ‘Financial security’: (1) the relationship between stable markets and the proverbial ‘security dilemma’; and (2) the development of new decision-technologies to address risk in the post-World War II period. Its argument is that the confluence of these two themes through rational choice theory represents a fundamental re-evaluation of the security dilemma and its relationship to the rule of law governing market relations, ushering in an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Environmental and economic security in the conditions of the Ukraine`s economy.Igor Britchenko, Jozefína Drotárová, Mykola Antonov, Juliia Kholodna, Olena Polonska & Yuliia Popova - 2022 - Ad Alta: Journal of Interdisciplinary Research 2 (12):118-122.
    The article examines the peculiarities and modern specifics of the formation of ecological and economic security in Ukraine in the conditions of digitalization. It was determined that the lack of dynamic growth, the violation of the optimal balance and balance of the ecological and economic system are caused by the depletion of raw resources, a decrease in the overall potential of the environment, and the irrational use of natural resources. It has been proven that in the conditions of digitalization, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  46
    Cloudguard: Fortress Security in the Digital World.Matam Avinash Kumar Chengali Ramakrishna Rao, Padidala Pradeep Rao - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (1):753-757.
    : As organizations continue to adopt cloud computing for its numerous advantages—such as scalability, cost-efficiency, and flexibility—the need to secure digital assets within the cloud has never been more critical. Cloud security faces unique challenges due to the distributed and multi-tenant nature of cloud services. Cyber-attacks, data breaches, and misconfigurations are among the prominent risks that threaten the integrity, confidentiality, and availability of cloud-based data and applications. In this paper, we explore CloudGuard, an advanced security framework designed to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
    This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, security, and usability. Tests show that improved ABKS speeds up search searches and lowers storage costs, making it a viable cloud storage alternative. Exploring sophisticated machine learning algorithms for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  83
    Network Security Challenges in Remote Work Environments: Solutions for Protecting Data and Applications.Bellamkonda Srikanth - 2021 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 10 (10):7330-7337.
    The rise of remote work has redefined the modern workplace, driven by advancements in technology and the global need for flexible work environments. While remote work offers increased productivity and employee satisfaction, it has also introduced a host of network security challenges. Organizations must contend with securing sensitive data and critical applications across distributed networks, many of which extend beyond traditional corporate perimeters. This research paper explores the multifaceted security threats associated with remote work environments, including phishing attacks, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi, 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper security (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 989