Results 1 to 10 of about 221,130 (133)

Distributed Machine Learning Architecture for Security Improvement in Computer Drafting and Writing in Art Asset Identification System

open access: goldInternational Journal on Recent and Innovation Trends in Computing and Communication, 2023
Art asset identification service is becoming increasingly important in the art market, where the value of art assets is constantly changing. The service provides authentication, evaluation, and provenance research for artworks, which helps art collectors and institutions to protect their investments and ensure the authenticity of their collections. The
Xing Yin
openalex   +3 more sources

Forgery face detection method based on multi-domain temporal features mining

open access: yes网络与信息安全学报, 2023
Financial technology has greatly facilitated people’s daily life with the continuous development of computer technology in the financial services industry.However, digital finance is accompanied by security problems that can be extremely harmful.Face ...
Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU
doaj   +3 more sources

A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures [PDF]

open access: yesSoftware: Practice and Experience, 2020
SummaryFog computing is an emerging paradigm in the Internet of Things (IoT) space, consisting of a middle computation layer, sitting between IoT devices and Cloud servers. Fog computing provides additional computing, storage, and networking resources in close proximity to where data is being generated and/or consumed.
Farhadi, Mozhdeh   +3 more
openaire   +4 more sources

Super-Fast Computation for the Three-Asset Equity-Linked Securities Using the Finite Difference Method [PDF]

open access: yesMathematics, 2020
In this article, we propose a super-fast computational algorithm for three-asset equity-linked securities (ELS) using the finite difference method (FDM). ELS is a very popular investment product in South Korea. There are one-, two-, and three-asset ELS. The three-asset ELS is the most popular financial product among them.
Chaeyoung Lee   +6 more
openaire   +2 more sources

A framework for evaluating security risk in system design

open access: yesDiscover Internet of Things, 2022
Design and development of ubiquitous computer network systems has become increasingly difficult as technology continues to grow. From the introduction of new technologies to the discovery of existing threats, weaknesses, and vulnerabilities there is a ...
Paul A. Wortman, John A. Chandy
doaj   +1 more source

The Strategy Detection on Information Security in Corporate Organizations on Crucial Asset

open access: yesJOIV: International Journal on Informatics Visualization, 2020
Information Security is a crucial asset within an organization, and it needs to be protected, Information System (IS) Security is still threats a significant concern for many organizations.
Yakubu Ajiji Makeri
doaj   +1 more source

Impact Assessment for Cyber Security Situation Awareness [PDF]

open access: yesInternational Journal of Information and Communication Technology Research, 2023
Cyber security situation awareness is important for the analysis of cyberspace, and detection of ever-changing threats. As computer networks and systems continue to increase in complexity and sophistication, the requirements and on a cybersecurity ...
Sina FarahaniNia   +3 more
doaj  

The management of information security: A South African case study

open access: yesSouth African Journal of Business Management, 2003
The growing misuse of information technology and the increased dependence on computer technology and systems heightened the requirements for information security. Unfortunately there often is a feeling of apathy towards information security by management,
L. C.H. Fourie
doaj   +1 more source

Integrating security and usability into the requirements and design process [PDF]

open access: yes, 2006
According to Ross Anderson, 'Many systems fail because their designers protect the wrong things or protect the right things in the wrong way'. Surveys also show that security incidents in industry are rising, which highlights the difficulty of designing ...
Flechais, I, Mascolo, C, Sasse, MA
core   +1 more source

Evaluation of Information Management Systems in Isfahan University of Medical Science by ISO/IEC 27001 Standard

open access: yesمدیریت اطلاعات سلامت, 2015
Introduction: considering the information threats and the need to procedures for develop and improve security and confidentiality, international standard organization (ISO) established information security standard ISO/IEC 27001.
Rouhollah Sheikh Abumasoudi   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy