Results 221 to 230 of about 365,185 (272)
Some of the next articles are maybe not open access.

Prioritization methodology of computing assets for connected vehicles in security assessment purpose

2019 12th CMI Conference on Cybersecurity and Privacy (CMI), 2019
The paper is devoted to a preparation for security assessment of connected vehicles, prioritization points of attacks on structural elements in particular. Described approach is based on quality assessment of developed components and their accordance with model of attacker.
Daria Sharova   +3 more
openaire   +2 more sources

Computer Vision Based Asset Surveillance for Smart Buildings

International Conference on Intelligent Computing, 2018
Unraveling meaningful pattern form the video offers a solution to many real-world problems, especially surveillance and security. Detecting and tracking an object under the area of video surveillance, not only automates the security but also leverages ...
K. Gautam, L. Parameswaran, S. Thangavel
semanticscholar   +1 more source

Information Security Culture Model. A Case Study

Latin American Computing Conference / Conferencia Latinoamericana En Informatica, 2021
This research covers the problem related to user behavior and its relationship with the protection of computer assets in terms of confidentiality, integrity, and availability.
W. Marchand-Niño   +1 more
semanticscholar   +1 more source

Cyber security information exchange based on Data Asset De-coupling factor in cloud computing

2011 IEEE Recent Advances in Intelligent Computational Systems, 2011
Cloud computing-based services have rapidly developed, but their security aspects are still at the initial stage of development. In order to preserve cyber security in cloud computing, cyber security information that will be exchanged within it needs to be identified and discussed.
T.M Bhraguram, M.S Sumesh
openaire   +2 more sources

Blockchain: Future Facilitator of Asset Information Modelling and Management?

Annual International Computer Software and Applications Conference, 2020
Recently, businesses and government bodies in the Architecture, Engineering, and Construction (AEC) sector have faced a key challenge to the delivery of effective project outcomes.
A. Raslan   +4 more
semanticscholar   +1 more source

Integrating IoT Monitoring for Security Operation Center

Global Internet of Things Summit, 2020
A Security Operation Center (SOC) performs critical functions in alerting and taking defensive actions for computer security. As network infrastructures evolve with broader inclusion of IoT (Internet of Things) and ad hoc wireless connectivity, the SOC ...
David L. Weissman, A. Jayasumana
semanticscholar   +1 more source

Vulnerability Analysis on Internet of Things (IoT) Networks using Raspberry Pi and Open Web Application Security Project (OWASP)

2024 FORTEI-International Conference on Electrical Engineering (FORTEI-ICEE)
The security of a network supports a system so that every device is in a safe condition, with secure communication, and secure access control to every asset in the IoT ecosystem.
S. Budiyanto   +4 more
semanticscholar   +1 more source

Database Security Threats and Challenges

International Symposium on Digital Forensics and Security, 2020
with the growth and increasing sophistication of the Internet and the increasing dependence, it appeared more and more services over the Internet-based database, so it increases the risks facing databases. The number of attacks against these repositories
Abdulazeez Mousa   +2 more
semanticscholar   +1 more source

Multimodal Security of Iris and Fingerprint with Bloom Filters

arXiv.org
The standard methods of identification such as PIN Numbers (Personal Identification Number), Passwords, smart cards can be easily stolen and can be misused easily. To overcome this, biometric is introduced, as it will be unique to each individual.
Dr. R. Sridevi, P. Shobana
semanticscholar   +1 more source

Information security management and the human aspect in organizations

Information and Computer Security, 2017
The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be addressed efficiently, especially in organizations in which data are a valuable
H. Stewart, J. Jürjens
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy