Results 121 to 130 of about 373,921 (174)
Some of the next articles are maybe not open access.

Information Asset Classification and Labelling Model Using Fuzzy Approach for Effective Security Risk Assessment

2020 International Conference in Mathematics, Computer Engineering and Computer Science (ICMCECS), 2020
Many information assets have been exposed to threats as a result of business owners not having access to an efficient model for classifying their information assets into appropriate security risk levels, required level of protection and priority.
C. Y. Alonge   +5 more
semanticscholar   +1 more source

A Detailed Investigation of Implementation of Internet of Things (IOT) in Cyber Security in Healthcare Sector

2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), 2022
The use of “electronic healthcare technology” is widespread, and it has huge potential to improve “clinical outcomes and transform” how therapy is administered. On the other hand, medical device and information security is becoming a significant problem.
Prince Tehseen Ganai   +5 more
semanticscholar   +1 more source

Usage of Classifier Ensemble for Security Enrichment in IDS

2022 International Conference on Automation, Computing and Renewable Systems (ICACRS), 2022
The success of the web and the consequent rise in data sharing have made network security a challenge. Attackers from all around the world target PC installations. When an attack is successful, an electronic device's security is jeopardised.
Ch. Phaneendra Varma   +3 more
semanticscholar   +1 more source

Prioritization methodology of computing assets for connected vehicles in security assessment purpose

2019 12th CMI Conference on Cybersecurity and Privacy (CMI), 2019
The paper is devoted to a preparation for security assessment of connected vehicles, prioritization points of attacks on structural elements in particular. Described approach is based on quality assessment of developed components and their accordance with model of attacker.
Daria Sharova   +3 more
openaire   +2 more sources

Cyber security information exchange based on Data Asset De-coupling factor in cloud computing

2011 IEEE Recent Advances in Intelligent Computational Systems, 2011
Cloud computing-based services have rapidly developed, but their security aspects are still at the initial stage of development. In order to preserve cyber security in cloud computing, cyber security information that will be exchanged within it needs to be identified and discussed.
T.M Bhraguram, M.S Sumesh
openaire   +2 more sources

Computer Vision Based Asset Surveillance for Smart Buildings

International Conference on Intelligent Computing, 2018
Unraveling meaningful pattern form the video offers a solution to many real-world problems, especially surveillance and security. Detecting and tracking an object under the area of video surveillance, not only automates the security but also leverages ...
K. Gautam, L. Parameswaran, S. Thangavel
semanticscholar   +1 more source

Information Security Culture Model. A Case Study

Latin American Computing Conference / Conferencia Latinoamericana En Informatica, 2021
This research covers the problem related to user behavior and its relationship with the protection of computer assets in terms of confidentiality, integrity, and availability.
W. Marchand-Niño   +1 more
semanticscholar   +1 more source

Blockchain: Future Facilitator of Asset Information Modelling and Management?

Annual International Computer Software and Applications Conference, 2020
Recently, businesses and government bodies in the Architecture, Engineering, and Construction (AEC) sector have faced a key challenge to the delivery of effective project outcomes.
A. Raslan   +4 more
semanticscholar   +1 more source

Integrating IoT Monitoring for Security Operation Center

Global Internet of Things Summit, 2020
A Security Operation Center (SOC) performs critical functions in alerting and taking defensive actions for computer security. As network infrastructures evolve with broader inclusion of IoT (Internet of Things) and ad hoc wireless connectivity, the SOC ...
David L. Weissman, A. Jayasumana
semanticscholar   +1 more source

Vulnerability Analysis on Internet of Things (IoT) Networks using Raspberry Pi and Open Web Application Security Project (OWASP)

2024 FORTEI-International Conference on Electrical Engineering (FORTEI-ICEE)
The security of a network supports a system so that every device is in a safe condition, with secure communication, and secure access control to every asset in the IoT ecosystem.
S. Budiyanto   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy