Application of deep learning in behavior recognition and early warning system for campus safety management. [PDF]
Liu L.
europepmc +1 more source
Towards a secure cloud repository architecture for the continuous monitoring of patients with mental disorders. [PDF]
Georgiou D +4 more
europepmc +1 more source
A Longitudinal dataset of sector-level patent data for Europe. [PDF]
Dimas P, Stamopoulos D, Protogerou A.
europepmc +1 more source
Does living with children or financial adequacy mitigate the impact of IADL limitations on older adults' well-being? Findings from the Longitudinal Indonesian Family Life Survey. [PDF]
Mangunsong F +4 more
europepmc +1 more source
Related searches:
Market‐inspired framework for securing assets in cloud computing environments
Software: Practice and Experience, 2022AbstractSelf‐adaptive security methods have been extensively leveraged for securing software systems and users from runtime threats in online and elastic environments, such as the cloud. The existing solutions treat security as an aggregated quality by enforcing “one service for all” without considering the explicit security requirements of each asset ...
Giannis Tziakouris +4 more
openaire +2 more sources
Prioritization methodology of computing assets for connected vehicles in security assessment purpose
2019 12th CMI Conference on Cybersecurity and Privacy (CMI), 2019The paper is devoted to a preparation for security assessment of connected vehicles, prioritization points of attacks on structural elements in particular. Described approach is based on quality assessment of developed components and their accordance with model of attacker.
Andrey Barinov +3 more
openaire +1 more source
Cyber security information exchange based on Data Asset De-coupling factor in cloud computing
2011 IEEE Recent Advances in Intelligent Computational Systems, 2011Cloud computing-based services have rapidly developed, but their security aspects are still at the initial stage of development. In order to preserve cyber security in cloud computing, cyber security information that will be exchanged within it needs to be identified and discussed.
T.M Bhraguram, M.S Sumesh
openaire +1 more source
Computer Security: Planning to Protect Corporate Assets
Journal of Business Strategy, 1990The author describes the strengths and weaknesses of current systems and reveals how planning can preempt a breach in security.
openaire +2 more sources
Protecting information assets through effective computer security training
Proceedings of IEEE International Carnahan Conference on Security Technology CCST-94, 1994Once you give users access to your computer systems, you're vulnerable! Giving untrained users access to your computer information systems is like giving the keys of a Lamborghini to a teenager! Your computer systems are an accident waiting to happen, unless you have an effective computer security training program embedded within your high-technology ...
openaire +1 more source
Computer Security Threats Towards the E-Learning System Assets
2011E-learning system is a web-based system which is exposed to computer threats. Services or asset of the e-learning system must be protected from any computer threats to ensure the users have peace of mind when using it. It is important to identify and understand the threats to the system in order develop a secure system.
Zainal Fikri Zamzuri +3 more
openaire +1 more source

