Results 11 to 20 of about 365,185 (272)
Understanding Security Issues in the NFT Ecosystem [PDF]
Non-Fungible Tokens (NFTs) have emerged as a way to collect digital art as well as an investment vehicle. Despite having been popularized only recently, NFT markets have witnessed several high-profile (and high-value) asset sales and a tremendous growth ...
Dipanjan Das+4 more
semanticscholar +1 more source
Optimal Management of Computer Network Security in the Era of Big Data
As the “new oil of the future,” big data is becoming the leading industry of the new economy, the core asset of the country and enterprises, the “new blue ocean” to be pursued, and the national strategy to be developed by all countries.
Minfeng Chen
semanticscholar +1 more source
Ensuring Privacy and Security on Banking Websites in Malaysia: A Cookies Scanner Solution
In this new era of science and technology, data can be said to be an extremely valuable asset for individuals, corporations, and even countries. Different parties attempt to obtain users' data occasionally, and the collection of web cookies is a ...
Yi Hong Tay+4 more
semanticscholar +1 more source
Real Estate Security using Blockchain
Property is an important asset, and the use of blockchain technology can help improve the implementation of work in this sector as well as its characteristics significantly for a smooth and trouble-free work flow to achieve a reliable system.
R. C. Suryawanshi+3 more
semanticscholar +1 more source
Threats in Software CPS and Potential Security Solutions
The concept of cybernetics, microelectronics, design, and process science are all intertwined in CPS. Embedded systems are often used to describe process control. While a strong connection between the physical and computational aspects is still important
heanyi Emeka Ukamaka, Agada Martina
semanticscholar +1 more source
Our research started a long ago as additional security for the asset owner to facilitate CIPS ( Cross-border Interbank Payment System) holistic security.
A. Zisopoulos+3 more
semanticscholar +1 more source
A framework for security requirements engineering [PDF]
This paper presents a framework for security requirements elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals based on
Haley, Charles B.+3 more
core +1 more source
Asset Management Security System Using RFID Technology
Using radio wave or radio frequency scanners to identify wirelessly any object is not so much complex in reality. The latest version of this technology is known as radio frequency identification or RFID.
Soumyasanta Rakshit, Dr. S. S. Sridhar
semanticscholar +1 more source
Introduction: considering the information threats and the need to procedures for develop and improve security and confidentiality, international standard organization (ISO) established information security standard ISO/IEC 27001.
Rouhollah Sheikh Abumasoudi+3 more
doaj +1 more source
Run-time risk management in adaptive ICT systems [PDF]
We will present results of the SERSCIS project related to risk management and mitigation strategies in adaptive multi-stakeholder ICT systems.
Chakravarthy, Ajay+4 more
core +1 more source