Results 221 to 230 of about 365,185 (272)
Some of the next articles are maybe not open access.
Prioritization methodology of computing assets for connected vehicles in security assessment purpose
2019 12th CMI Conference on Cybersecurity and Privacy (CMI), 2019The paper is devoted to a preparation for security assessment of connected vehicles, prioritization points of attacks on structural elements in particular. Described approach is based on quality assessment of developed components and their accordance with model of attacker.
Daria Sharova+3 more
openaire +2 more sources
Computer Vision Based Asset Surveillance for Smart Buildings
International Conference on Intelligent Computing, 2018Unraveling meaningful pattern form the video offers a solution to many real-world problems, especially surveillance and security. Detecting and tracking an object under the area of video surveillance, not only automates the security but also leverages ...
K. Gautam, L. Parameswaran, S. Thangavel
semanticscholar +1 more source
Information Security Culture Model. A Case Study
Latin American Computing Conference / Conferencia Latinoamericana En Informatica, 2021This research covers the problem related to user behavior and its relationship with the protection of computer assets in terms of confidentiality, integrity, and availability.
W. Marchand-Niño+1 more
semanticscholar +1 more source
Cyber security information exchange based on Data Asset De-coupling factor in cloud computing
2011 IEEE Recent Advances in Intelligent Computational Systems, 2011Cloud computing-based services have rapidly developed, but their security aspects are still at the initial stage of development. In order to preserve cyber security in cloud computing, cyber security information that will be exchanged within it needs to be identified and discussed.
T.M Bhraguram, M.S Sumesh
openaire +2 more sources
Blockchain: Future Facilitator of Asset Information Modelling and Management?
Annual International Computer Software and Applications Conference, 2020Recently, businesses and government bodies in the Architecture, Engineering, and Construction (AEC) sector have faced a key challenge to the delivery of effective project outcomes.
A. Raslan+4 more
semanticscholar +1 more source
Integrating IoT Monitoring for Security Operation Center
Global Internet of Things Summit, 2020A Security Operation Center (SOC) performs critical functions in alerting and taking defensive actions for computer security. As network infrastructures evolve with broader inclusion of IoT (Internet of Things) and ad hoc wireless connectivity, the SOC ...
David L. Weissman, A. Jayasumana
semanticscholar +1 more source
2024 FORTEI-International Conference on Electrical Engineering (FORTEI-ICEE)
The security of a network supports a system so that every device is in a safe condition, with secure communication, and secure access control to every asset in the IoT ecosystem.
S. Budiyanto+4 more
semanticscholar +1 more source
The security of a network supports a system so that every device is in a safe condition, with secure communication, and secure access control to every asset in the IoT ecosystem.
S. Budiyanto+4 more
semanticscholar +1 more source
Database Security Threats and Challenges
International Symposium on Digital Forensics and Security, 2020with the growth and increasing sophistication of the Internet and the increasing dependence, it appeared more and more services over the Internet-based database, so it increases the risks facing databases. The number of attacks against these repositories
Abdulazeez Mousa+2 more
semanticscholar +1 more source
Multimodal Security of Iris and Fingerprint with Bloom Filters
arXiv.orgThe standard methods of identification such as PIN Numbers (Personal Identification Number), Passwords, smart cards can be easily stolen and can be misused easily. To overcome this, biometric is introduced, as it will be unique to each individual.
Dr. R. Sridevi, P. Shobana
semanticscholar +1 more source
Information security management and the human aspect in organizations
Information and Computer Security, 2017The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be addressed efficiently, especially in organizations in which data are a valuable
H. Stewart, J. Jürjens
semanticscholar +1 more source