Results 21 to 30 of about 815,217 (293)

Neural network based single index evaluation for SQL injection attack detection in health care data

open access: yesMeasurement: Sensors, 2023
In recent years, there are a lot of security risks in the network, and there is the combination intersection between the computer network security problems and security evaluation.
N. Nagabhooshanam   +4 more
doaj  

Siber Suçların Siber Saldırılara Maruz Kalan Şirketlerin Hisse Senedi Fiyatları Üzerindeki Etkileri

open access: yesİşletme Bilimi Dergisi, 2021
Amaç: İnternet ve diğer dijital teknolojileri kullanarak işlenen yasa dışı faaliyetler, siber suç olarak adlandırılmaktadır. Siber suçlar, kullanıcıların gizli verilerine yetkisiz erişim, DOS saldırıları, virüs yayma, çevrimiçi dolandırıcılık ve ...
Barış Aksoy, Necati Alp Erilli
doaj   +1 more source

A Multi-Vocal Review of Security Orchestration [PDF]

open access: yesACM Comput. Surv. 52, 2, Article 37 (April 2019), 45 pages, 2020
Organizations use diverse types of security solutions to prevent cyberattacks. Multiple vendors provide security solutions developed using heterogeneous technologies and paradigms. Hence, it is a challenging rather impossible to easily make security solutions to work an integrated fashion. Security orchestration aims at smoothly integrating multivendor
arxiv   +1 more source

Keamanan pada Grid Computing~Survey Paper

open access: yesElkawnie: Journal of Islamic Science and Technology, 2015
Grid computing provides high computing power, enormous data storage, and collaboration possibilities to its users. Grid computing is currently in the midst of evolving standards, inheriting and customizing from those developed in the high performance ...
Ghufran Ibnu Yasa
doaj   +1 more source

Some Fundamental Cybersecurity Concepts

open access: yesIEEE Access, 2014
The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios.
Kelce S. Wilson, Muge Ayse Kiy
doaj   +1 more source

Blsnet: a tri-branch lightweight network for gesture segmentation against cluttered backgrounds

open access: yesComplex & Intelligent Systems, 2023
Hand gesture segmentation is an essential step to recognize hand gestures for human–robot interaction. However, complex backgrounds and the variety of gesture shapes cause low semantic segmentation accuracy in the existing lightweight methods because of ...
Guoyu Zhou, Zhenchao Cui, Jing Qi
doaj   +1 more source

SECURITY OF TEACHING ACTIVITIES ONLINE [PDF]

open access: yesAnalele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie, 2021
The current pandemic context has led to the rapid transition of all online teaching activities, and the security of all activities has become vulnerable, largely due to limited awareness by students and teachers, creating a security breach through the ...
CARINA-ELENA STEGĂROIU   +2 more
doaj  

An Overview of the Security Concerns in Enterprise Cloud Computing [PDF]

open access: yesInternational Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011, 2011
Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures.
arxiv   +1 more source

Computer Multimedia Security Protection System Based on the Network Security Active Defense Model

open access: yesAdvances in Multimedia, 2021
In response to the continuous development of computer science and multimedia technology, many problems related to computer multimedia security are gradually exposed in the development.
Yanhong Shang, Jing Zhang
doaj   +1 more source

Integrity Auditing for Multi-Copy in Cloud Storage Based on Red-Black Tree

open access: yesIEEE Access, 2021
With the rapid development of cloud storage, cloud users are willing to store data in the cloud storage system, and at the same time, the requirements for the security, integrity, and availability of data storage are getting higher and higher.
Zhenpeng Liu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy