Results 11 to 20 of about 365,185 (272)

Understanding Security Issues in the NFT Ecosystem [PDF]

open access: yesConference on Computer and Communications Security, 2021
Non-Fungible Tokens (NFTs) have emerged as a way to collect digital art as well as an investment vehicle. Despite having been popularized only recently, NFT markets have witnessed several high-profile (and high-value) asset sales and a tremendous growth ...
Dipanjan Das   +4 more
semanticscholar   +1 more source

Optimal Management of Computer Network Security in the Era of Big Data

open access: yesJ. Comput. Networks Commun., 2022
As the “new oil of the future,” big data is becoming the leading industry of the new economy, the core asset of the country and enterprises, the “new blue ocean” to be pursued, and the national strategy to be developed by all countries.
Minfeng Chen
semanticscholar   +1 more source

Ensuring Privacy and Security on Banking Websites in Malaysia: A Cookies Scanner Solution

open access: yesJournal of Informatics and Web Engineering, 2023
In this new era of science and technology, data can be said to be an extremely valuable asset for individuals, corporations, and even countries. Different parties attempt to obtain users' data occasionally, and the collection of web cookies is a ...
Yi Hong Tay   +4 more
semanticscholar   +1 more source

Real Estate Security using Blockchain

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology, 2023
Property is an important asset, and the use of blockchain technology can help improve the implementation of work in this sector as well as its characteristics significantly for a smooth and trouble-free work flow to achieve a reliable system.
R. C. Suryawanshi   +3 more
semanticscholar   +1 more source

Threats in Software CPS and Potential Security Solutions

open access: yesJournal of Machine and Computing, 2022
The concept of cybernetics, microelectronics, design, and process science are all intertwined in CPS. Embedded systems are often used to describe process control. While a strong connection between the physical and computational aspects is still important
heanyi Emeka Ukamaka, Agada Martina
semanticscholar   +1 more source

Cross border Interbank Payment System (CIPS) Security Supplements; Tangible Radio Safety Box, Software as non-textual Password and Revolving Executable Code Modules

open access: yesWseas Transactions on Business and Economics, 2022
Our research started a long ago as additional security for the asset owner to facilitate CIPS ( Cross-border Interbank Payment System) holistic security.
A. Zisopoulos   +3 more
semanticscholar   +1 more source

A framework for security requirements engineering [PDF]

open access: yes, 2006
This paper presents a framework for security requirements elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals based on
Haley, Charles B.   +3 more
core   +1 more source

Asset Management Security System Using RFID Technology

open access: yesInternational journal of engineering and technology, 2018
Using radio wave or radio frequency scanners to identify wirelessly any object is not so much complex in reality. The latest version of this technology is known as radio frequency identification or RFID.
Soumyasanta Rakshit, Dr. S. S. Sridhar
semanticscholar   +1 more source

Evaluation of Information Management Systems in Isfahan University of Medical Science by ISO/IEC 27001 Standard

open access: yesمدیریت اطلاعات سلامت, 2015
Introduction: considering the information threats and the need to procedures for develop and improve security and confidentiality, international standard organization (ISO) established information security standard ISO/IEC 27001.
Rouhollah Sheikh Abumasoudi   +3 more
doaj   +1 more source

Run-time risk management in adaptive ICT systems [PDF]

open access: yes, 2013
We will present results of the SERSCIS project related to risk management and mitigation strategies in adaptive multi-stakeholder ICT systems.
Chakravarthy, Ajay   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy