Results 41 to 50 of about 4,301,094 (348)

Keamanan pada Grid Computing~Survey Paper

open access: yesElkawnie: Journal of Islamic Science and Technology, 2015
Grid computing provides high computing power, enormous data storage, and collaboration possibilities to its users. Grid computing is currently in the midst of evolving standards, inheriting and customizing from those developed in the high performance ...
Ghufran Ibnu Yasa
doaj   +1 more source

Individual versus Organizational Computer Security and Privacy Concerns in Journalism

open access: yesProceedings on Privacy Enhancing Technologies, 2016
A free and open press is a critical piece of the civil-society infrastructure that supports both established and emerging democracies. However, as the professional activities of reporting and publishing are increasingly conducted by digital means ...
Susan E Mcgregor   +2 more
semanticscholar   +1 more source

Neural network based single index evaluation for SQL injection attack detection in health care data

open access: yesMeasurement: Sensors, 2023
In recent years, there are a lot of security risks in the network, and there is the combination intersection between the computer network security problems and security evaluation.
N. Nagabhooshanam   +4 more
doaj  

Computer security for data collection technologies☆

open access: yesInternational Conference on Information and Communication Technologies and Development, 2016
Many organizations in the developing world (e.g., NGOs), include digital data collection in their workflow. Data collected can include information that may be considered sensitive, such as medical or socioeconomic data, and which could be affected by ...
Camille Cobb   +5 more
semanticscholar   +1 more source

Some Fundamental Cybersecurity Concepts

open access: yesIEEE Access, 2014
The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios.
Kelce S. Wilson, Muge Ayse Kiy
doaj   +1 more source

SECURITY OF TEACHING ACTIVITIES ONLINE [PDF]

open access: yesAnalele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie, 2021
The current pandemic context has led to the rapid transition of all online teaching activities, and the security of all activities has become vulnerable, largely due to limited awareness by students and teachers, creating a security breach through the ...
CARINA-ELENA STEGĂROIU   +2 more
doaj  

Blsnet: a tri-branch lightweight network for gesture segmentation against cluttered backgrounds

open access: yesComplex & Intelligent Systems, 2023
Hand gesture segmentation is an essential step to recognize hand gestures for human–robot interaction. However, complex backgrounds and the variety of gesture shapes cause low semantic segmentation accuracy in the existing lightweight methods because of ...
Guoyu Zhou, Zhenchao Cui, Jing Qi
doaj   +1 more source

Security of computer communication [PDF]

open access: yesIEEE Communications Society Magazine, 1978
n ...
openaire   +3 more sources

occumb: An R package for site occupancy modeling of eDNA metabarcoding data

open access: yesPopulation Ecology, EarlyView.
This study introduces a new R package, occumb, for the convenient application of site occupancy modeling using environmental DNA (eDNA) metabarcoding data. We outline a data analysis workflow, including data setup, model fitting, model assessment, and comparison of potential study settings based on model predictions, all of which can be performed using
Keiichi Fukaya, Yuta Hasebe
wiley   +1 more source

Integrity Auditing for Multi-Copy in Cloud Storage Based on Red-Black Tree

open access: yesIEEE Access, 2021
With the rapid development of cloud storage, cloud users are willing to store data in the cloud storage system, and at the same time, the requirements for the security, integrity, and availability of data storage are getting higher and higher.
Zhenpeng Liu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy