Results for 'secure '

987 found
Order:
  1.  51
    Enhancing Security of Cloud-Native Microservices with Service Mesh Technologies.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1.
    : As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by implementing zero-trust policies, automatic (...)
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  2. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as morally important—for example, when (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  3.  74
    SECURING CLOUD-NATIVE MICROSERVICES WITH SERVICE MESH TECHNOLOGIES.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-6.
    As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by implementing zero-trust policies, automatic traffic (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  4. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  51
    Cloud Security and Compliance: Navigating the Complexities.Karishma K. H. Anusha J. Adhikar, Apeksha K. Jadhav, Charitha G. - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (3):864-866.
    As businesses increasingly move to the cloud, they face growing challenges in ensuring both security and compliance. The complexity arises from the need to protect sensitive data while adhering to a wide range of regulatory requirements, such as GDPR, HIPAA, and industry-specific standards. This paper explores the intersection of cloud security and compliance, focusing on the challenges organizations face when navigating these complexities. We discuss the shared responsibility model, key compliance frameworks, and strategies to integrate security and compliance efforts. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  88
    Cloud Security Automation: Leveraging AI and Machine Learning for Protection.Monika Bhandakar Muskan Chourasia, Laxmi Thakre, , Dnyaneshwari Mendhe - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research 13 (2):868-871.
    Cloud security automation has become increasingly vital as organizations scale their operations in the cloud. As cyber threats become more sophisticated and frequent, traditional security measures are no longer enough to effectively protect cloud environments. This paper explores the role of Artificial Intelligence (AI) and Machine Learning (ML) in automating cloud security processes. By integrating AI and ML, organizations can proactively detect, respond to, and mitigate potential security threats in real-time. This paper reviews current applications of AI and ML in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  64
    Cloud Security Unlocked: Safeguarding the Digital Frontier.Godse Rahul Vishwakarma Prem, Sanjay Kumar - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management 12 (2):613-618.
    As businesses and individuals increasingly rely on cloud computing for a vast array of services, the need for robust cloud security becomes ever more critical. Cloud environments offer unparalleled flexibility, scalability, and cost-effectiveness but simultaneously introduce a complex security landscape that poses significant challenges. The importance of safeguarding data, applications, and systems from cyber threats in the cloud is paramount to maintaining the confidentiality, integrity, and availability of digital assets. This paper explores the evolving landscape of cloud security, identifying the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  46
    Network Security Threat Detection in IoT-Enabled Smart Cities.Reddy Pothireddy Nirup Kumar - 2022 - International Journal of Scientific Research in Science and Technology 9 (4):784-799.
    Since security threats in IoT-enabled smart cities may not appear clear and present to detection mechanisms, efforts have been made to use artificial intelligence methods for anomaly detection. Anomaly detection has been performed using unsupervised learning approaches (Autoencoders, GANs, One Class SVMs) in turn, with these instances considered security threats. In addition, an element for patches and traffic redirection in real time is included in the framework. Results show that the AI detection in general has much more security resilience, decreasing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the new subject in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  21
    Secure Microservice Communication in Optical Networks.Jagdish Jangid - 2025 - Journal of Information Systems Engineering and Management 10 (21s):911-926.
    As optical network functions increasingly adopt microservice architectures, traditional con-tainer security mechanisms are proving insufficient against sophisticated attacks targeting these critical infrastructure components. This paper introduces a novel framework for securing microser-vice communications in optical networks through the application of Memory Protection Keys (MPK) for enhanced container isolation. Converging containerization technologies with optical networking introduces unique security challenges, particularly in maintaining isolation between sensitive optical control functions while preserving the ultra-low latency requirements essential for network operations. The proposed approach leverages (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  68
    Cloud Security Vulnerabilities: How to Identify and Address Risks.Tejas S. Zagade Nitin D. Parkhe, Paresh L. Waghmare, Bhushan P. Rathod - 2025 - International Journal of Multidisciplinary and Scientific Emerging Research 13 (2):851-853.
    Cloud computing has revolutionized the way businesses store and process data, offering flexibility, scalability, and cost efficiency. However, with these benefits come significant security risks. Cloud environments introduce unique vulnerabilities that organizations must address to ensure data protection and maintain compliance. This paper explores common cloud security vulnerabilities, methods for identifying risks, and strategies for mitigating them. By reviewing existing literature and best practices, the study emphasizes the importance of proactive security measures in preventing data breaches, unauthorized access, and service (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - 2025 - Critical Review of International Social and Political Philosophy 28 (2):286-306.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can work to the benefit of freedom. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  43
    Securing the Cloud: Best Practices for Protecting Your Data.Saket Khandarkar Zeeshan Shaikh, Suyesh Badge, Tushar Parvez - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (3):839-841.
    Cloud computing has revolutionized how businesses store and access data, but it also introduces new risks. Securing data in the cloud requires a combination of strategic approaches, robust policies, and technological solutions. This paper explores best practices for safeguarding cloud environments, including encryption, access controls, regular security audits, and the implementation of a zero-trust architecture. By identifying key risks and offering practical solutions, this research provides a roadmap for businesses to enhance cloud security and mitigate potential threats.
    Download  
     
    Export citation  
     
    Bookmark  
  15. Security practices in AI development.Petr Spelda & Vit Stritecky - forthcoming - AI and Society.
    What makes safety claims about general purpose AI systems such as large language models trustworthy? We show that rather than the capabilities of security tools such as alignment and red teaming procedures, it is security practices based on these tools that contributed to reconfiguring the image of AI safety and made the claims acceptable. After showing what causes the gap between the capabilities of security tools and the desired safety guarantees, we critically investigate how AI security practices attempt to fill (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  55
    Cloudguard: Fortress Security in the Digital World.Matam Avinash Kumar Chengali Ramakrishna Rao, Padidala Pradeep Rao - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (1):753-757.
    : As organizations continue to adopt cloud computing for its numerous advantages—such as scalability, cost-efficiency, and flexibility—the need to secure digital assets within the cloud has never been more critical. Cloud security faces unique challenges due to the distributed and multi-tenant nature of cloud services. Cyber-attacks, data breaches, and misconfigurations are among the prominent risks that threaten the integrity, confidentiality, and availability of cloud-based data and applications. In this paper, we explore CloudGuard, an advanced security framework designed to protect (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  34
    Online Secure Transaction System with Crpytography.Dastagiraiah C. - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (3):1-12.
    In today’s digital age, secure online transactions are crucial for maintaining the confidentiality, integrity, and authenticity of sensitive data. This project presents a Secure Online Transaction System developed in Java, utilizing MySQL as the database management system, and employing the AES (Advanced Encryption Standard) algorithm for encryption purposes. The objective of this project was to design and implement a robust system that ensures secure online transactions, safeguarding against unauthorized access, data breaches, and fraudulent activities. To achieve this, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Download  
     
    Export citation  
     
    Bookmark  
  19. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal and external negative (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Terrorism, Security, and the Threat of Counterterrorism.Jessica Wolfendale - 2007 - Studies in Conflict and Terrorism 30 (1):75-93.
    Download  
     
    Export citation  
     
    Bookmark  
  21.  25
    Secure the Drug Components using Data Mining.Santhosh Kumar DrK. V. Shiny, Sujay Sharvesh A. S., Sridhar D. - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    In the pharmaceutical and healthcare industries, the secure handling of sensitive drug component data is crucial. This project presents a comprehensive system for the secure storage, encryption, and controlled access of drug datasets using modern encryption techniques and cloud-based storage. Users can upload drug-related CSV files through a web interface, which are then processed and encrypted selectively before being uploaded to Amazon S3. Each file is associated with a unique encryption key, which is securely stored and can only (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Food security as a global public good.Cristian Timmermann - 2020 - In José Luis Vivero-Pol, Tomaso Ferrando, Olivier de Schutter & Ugo Mattei, Routledge Handbook of Food as a Commons. Routledge. pp. 85-99.
    Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good. However, there are four other ways of understanding a public good which are worthy of attention. A normative public good is a good from which nobody ought to be excluded. Alternatively, one might acknowledge the benevolent character of a public good. Others have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Perceptually Secured Knowledge.Elijah Chudnoff - 2025 - In Ori Beck & Farid Masrour, The Relational View of Perception: New Philosophical Essays. New York, NY: Routledge.
    Perceptually secured knowledge consists of beliefs that amount to knowledge just because they are based on suitable perceptual states. Relationism about the ground of perceptually secured knowledge is the view that if a perceptual state can make a belief based on it amount to knowledge, then it can do that because it constitutes an appropriate kind of relational state, e.g., a state of perceptual acquaintance. I explore the prospects of both maintaining that some beliefs amount to perceptually secured knowledge and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Attachment, Security, and Relational Networks.Stephanie Collins & Liam Shields - forthcoming - Journal of Value Inquiry.
    The philosophical literature on personal relationships is focused on dyads: close relationships between just two people. This paper aims to characterise the value of looser and larger relational networks, particularly from the perspective of liberal political theory. We focus on relational networks' value vis-a-vis the important good of felt security. We begin by characterising felt security and analysing how felt security is produced within dyads. We highlight the ambivalent nature of dyadic relationships as a source of felt security. We then (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  18
    A Security Evaluation Framework for Software-Defined Network Architectures in Data Center Environments.Siddiqui Raza Junaid - 2014 - International Journal of Advanced Research in Arts, Science, Engineering and Management 1 (2):528-533.
    Software-Defined Networking (SDN) has transformed data center network (DCN) architectures by enabling centralized control, dynamic configuration, and programmable network management. However, the decoupling of control and data planes introduces new security challenges, including controller compromise, flow rule manipulation, and inter-tenant data leakage. This paper proposes a comprehensive security evaluation framework tailored for SDN-based data centers. The framework identifies key threat vectors, classifies attack surfaces, and provides a methodology for evaluating resilience against attacks. By integrating security metrics such as availability, integrity, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Peter Sloterdijk and the ‘Security Architecture of Existence’: Immunity, Autochthony, and Ontological Nativism.Thomas Sutherland - 2019 - Theory, Culture and Society 36 (7-8):193-214.
    Centred on 'Foams', the third volume of his Spheres trilogy, this article questions the privilege granted by Peter Sloterdijk to motifs of inclusion and exclusion, contending that whilst his prioritization of dwelling as a central aspect of human existence provides a promising counterpoint to the dislocative and isolative effects of post-industrial capitalism, it is compromised by its dependence upon an anti-cosmopolitan outlook that views cultural distantiation as a natural and preferable state of human affairs, and valorizes a purported ontological security (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  27. Freedom, security and justice in the European Union: a short genealogy of the "Security Union".Elisa Orru - 2022 - Eunomia 11 (1):143–162.
    This article focuses on the so-called “Area of Freedom, Security and Justice” (ASFJ), namely the policy field of the European Union (EU) that covers judicial and police cooperation, migration and asylum policies and the control of external borders. The article explores how the AFSJ has emerged and how, within it, the relationship between freedom and security has evolved over time and brought about a shift towards a “Security Union”.
    Download  
     
    Export citation  
     
    Bookmark  
  28. Self Control and Moral Security.Jessica Wolfendale & Jeanette Kennett - 2019 - In David Shoemaker, Oxford Studies in Agency and Responsibility Volume 6. Oxford University Press. pp. 33-63.
    Self-control is integral to successful human agency. Without it we cannot extend our agency across time and secure central social, moral, and personal goods. But self-control is not a unitary capacity. In the first part of this paper we provide a taxonomy of self-control and trace its connections to agency and the self. In part two, we turn our attention to the external conditions that support successful agency and the exercise of self-control. We argue that what we call moral (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  29.  16
    ENHANCING ENTERPRISE CLOUD SECURITY: PROTECTING CRITICAL DATA AND INFRASTRUCTURE.Baladari Venkata - 2020 - International Journal of Business Quantitative Economics and Applied Management Research 6 (6):85-98.
    The rapid adoption of cloud computing by businesses has led to substantial cybersecurity concerns, necessitating comprehensive security systems to safeguard cloud infrastructure. Cloud environments' multi-tenant nature renders systems vulnerable to threats including unauthorized access, data theft, and distributed denial-of-service (DDoS) attacks. Protecting data confidentiality, privacy, and regulatory adherence requires implementing a combination of encryption, authentication protocols, and intrusion detection measures. These risks have been addressed through the use of sophisticated methods, such as dynamic remote data auditing, decentralized access control, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  85
    SECURITY AND PRIVACY TECHNIQUE IN BIG DATA: A REVIEW.Pamarthi Kartheek - 2024 - North American Journal of Engineering Research 5 (1).
    The importance of Big Data as a foundational component of the AI and ML landscape is not going away anytime soon. As a result, the past fifteen years have seen a tremendous investment in Big Data research. The purpose of this literature review is to compile the most recent results from Big Data studies conducted over the past fifteen years. The study will address questions about the main applications of Big Data analytics, the main challenges and limitations encountered by researchers, (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  31. Robust evidence and secure evidence claims.Kent W. Staley - 2004 - Philosophy of Science 71 (4):467-488.
    Many philosophers have claimed that evidence for a theory is better when multiple independent tests yield the same result, i.e., when experimental results are robust. Little has been said about the grounds on which such a claim rests, however. The present essay presents an analysis of the evidential value of robustness that rests on the fallibility of assumptions about the reliability of testing procedures and a distinction between the strength of evidence and the security of an evidence claim. Robustness can (...)
    Download  
     
    Export citation  
     
    Bookmark   60 citations  
  32. Homomorphic Encryption: Enabling Secure Cloud Data Processing.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):260-264.
    Homomorphic encryption is a transformative cryptographic technique that enables secure cloud data processing by allowing computations on encrypted data without requiring decryption. Unlike traditional encryption methods, which protect data only at rest and in transit, homomorphic encryption ensures end-to-end security, even during computation. This capability is particularly vital for industries that rely on cloud computing while handling sensitive information, such as finance, healthcare, and government sectors. However, despite its strong security guarantees, the widespread adoption of homomorphic encryption remains limited (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  33. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning algorithm, and finally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Anthropology of Security and Security in Anthropology: Cases of Counterterrorism in the United States.Meg Stalcup & Limor Samimian-Darash - 2017 - Anthropological Theory 1 (17):60-87.
    In our study of U.S. counterterrorism programs, we found that anthropology needs a mode of analysis that considers security as a form distinct from insecurity, in order to capture the very heterogeneity of security objects, logics and forms of action. This article first presents a genealogy for the anthropology of security, and identifies four main approaches: violence and State terror; military, militarization, and militarism; para-state securitization; and what we submit as “security analytics.” Security analytics moves away from studying security formations, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Philosophy of Global Security.Vihren Bouzov - 2015 - In Mihai-Dan Chiţoiu Ioan-Alexandru Tofan, Proceedings of the International Conference “Humanities and Social Sciences Today. Classical and Contemporary Issues” – Philosophy and Other Humanities. Pro Universitaria. pp. 43-51.
    We are living in an imbalanced and insecure world. It is torn by violent conflicts on a global scale: between the West and the East, between rich and poor countries, between Christianity and Islam, between the Great Forces and naughty countries, between a global capitalist elite and workers and between the global democratic community and global terrorism. An optimistic thesis will be grounded asserting that varied cultures and civilizations can solve all existing problems and contradictions peacefully and can carry out (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  39
    AI Security: A Unified Risk Governance Framework for Cybersecurity Compliance.Tripathi Praveen - 2023 - International Journal of Innovative Research in Computer and Communication Engineering 11 (4):1691-1693.
    Cloud security remains a top concern for enterprises. This study introduces AI Security, a risk governance framework integrating AI, DevSecOps, and predictive analytics to enhance compliance automation and threat intelligence in cloud environments.
    Download  
     
    Export citation  
     
    Bookmark  
  37.  32
    SmartCrypt: Enhancing Security for Storing and Sharing Time-Series Data in IIoT.Narra Pujitha Sindhu Priyanka Chadalavada - 2025 - International Journal of Advanced Research in Education and Technology 12 (2):678-686.
    To ensure widespread access, scalability, and sharing capabilities, applications of the Industrial Internet of Things (IIoT) leverage the cloud for storing the data streams they collect. However, the secure storage and sharing of the vast amounts of continuously generated data present significant privacy challenges, including the risk of data breaches. This paper introduces SmartCrypt, a system designed for secure data storage and sharing that facilitates analytics on encrypted time series data. SmartCrypt allows users to securely and selectively share (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Strengthening Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-663.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze network traffic, (...)
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  39.  52
    Windows Endpoint Security using PowerShell and ADMX.Prashant Mhanta Jayram Bagal, Dipanshu Sendre, Dr Jayashree Shinde, Prachi Telharkar - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (7):9473-9478.
    In today's digital landscape, small-scale companies encounter significant challenges in safeguarding their sensitive data against threats due to limited financial resources. Traditional data loss prevention solutions often come with hefty price tags, rendering them inaccessible to such organizations. Our project addresses this issue by designing a user-friendly script that can be easily deployed and managed by non- experts, lowering the barrier to entry for enhancing data security. Our project proposes an innovative approach leveraging PowerShell and ADMX to develop a cost- (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  30
    Understanding Cloud Security: A Comprehensive Guide for Enterprises.Abhijeet Datey Sanjogita Mishra, Simran Vyas, Madhavi Sawarkar, , Rupali Tayade - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (3):845-847.
    Cloud security is an essential aspect of modern enterprise IT infrastructure, as organizations increasingly migrate to the cloud for data storage, processing, and application hosting. This guide provides a thorough understanding of cloud security, outlining key risks, challenges, and best practices that enterprises must consider when securing their cloud environments. The paper explores various security models, including shared responsibility, zero trust, and defense-in-depth, and discusses technologies such as encryption, identity and access management (IAM), multi-factor authentication (MFA), and security monitoring tools. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign have been (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Food security: modern challenges and mechanisms to ensure.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Košice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring food security during martial law requires the use of mechanisms to support agricultural exports, diversify logistics routes, ensure environmental safety, provide financial and marketing support. Basic research focuses on assessment the state of agricultural producers, analysing the financial and accounting system, logistics activities, ensuring competitiveness, and environmental pollution. The research results have been implemented in the different decision-making models during martial law, international logistics management, digital audit, agricultural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  86
    Secure and Efficient Data Deduplication Framework for Hybrid Cloud Architectures.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):623-633.
    The exponential growth of data storage requirements has become a pressing challenge in hybrid cloud environments, necessitating efficient data deduplication methods. This research proposes a novel Smart Deduplication Framework (SDF) designed to identify and eliminate redundant data, thus optimizing storage usage and improving data retrieval speeds. The framework leverages a hybrid cloud architecture, combining the scalability of public clouds with the security of private clouds. By employing a combination of client-side hashing, metadata indexing, and machine learning-based duplicate detection, the framework (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Security Through Mutual Understanding and Co-existence or Military Might?: Somali and U.S. Perspectives.Gail M. Presbey - 2011 - In Elavie Ndura-Ouédraogo, Matt Meyer & Judith Atiri, Seeds Bearing Fruit: Pan African Peace Action in the 21st Century. Africa World Press. pp. 323-351.
    Download  
     
    Export citation  
     
    Bookmark  
  46.  39
    Securing the Distributed Workforce: A Framework for Enterprise Cybersecurity in the Post-COVID Era.Sreejith Sreekandan Nair Govindarajan Lakshmikanthan - 2022 - International Journal of Advanced Research in Education and Technology 9 (2):594-602.
    COVID-19 is the new standard for forced changes in the workforce, forcing the adoption of remote and hybrid work environments globally. It was in the period of this rapid adoption of distributed work environments that new opportunities for flexibility and productivity were opened up, but fundamental weaknesses of conventional notions of cybersecurity were unveiled. As employees connect to company networks from a plethora of different places and different types of devices, situations were complex at the corporate level to ensure that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Human Security Law in Iraq: Reforming Rules, Practices, and Urban Spaces.Hannibal Travis - manuscript
    This article addresses a few moments in the evolution of human security law in Iraq, focusing in particular on the Coalition Provisional Authority, the new Iraqi Constitution, Iraqi High Tribunal (successor to the Iraqi Special Tribunal), and the International Criminal Court. It synthesizes the results of some existing research on ongoing impunity for certain crimes against political candidates, journalists, anti-corruption activists, and ethnic and religious minorities, a situation which may have tainted Iraq’s transition to a more democratic republic, while aggravating (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, failing to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  25
    Password-Based Lineman Security System.Alok Patil Prof Sumedha Patil, Niyati Darekar, Suyash Nangare, Vinit Sonawane - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (4).
    Password-Based Security Systems are elements of an authentication mechanism for controlling access into digital systems that are frequently used in your daily life. The user walks up to a digital system (computer/smartphone) and enters their privileged passcode that is verified by the confirmation methods of an encrypted version of their passcode. The security practice of how effective the password-based system is related to two independent cases of secured compliance, the strength of the password itself, and whether any other systems are (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 987