Results 141 to 150 of about 164,979 (324)

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Least Effort Strategies for Cybersecurity

open access: green, 2003
Sean P. Gorman   +3 more
openalex   +2 more sources

RDHNet: Reversible Data Hiding Method for Securing Colour Images Using AlexNet and Watershed Transform in a Fusion Domain

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Medical images play a crucial role in diagnosis, treatment procedures and overall healthcare. Nevertheless, they also pose substantial risks to patient confidentiality and safety. Safeguarding the confidentiality of patients' data has become an urgent and practical concern.
Mohamed Meselhy Eltoukhy   +3 more
wiley   +1 more source

Secure and Efficient maTLS With Proxy Signature Scheme

open access: yesIEEE Access
Many companies providing mobile and web-based internet services deploy various middleboxes, including network and security appliances, to enhance network functionality and security. In particular, security appliances such as Web Application Firewalls and
Taehyun Ahn, Jiwon Kwak, Seungjoo Kim
doaj   +1 more source

Some Fundamental Cybersecurity Concepts [PDF]

open access: gold, 2014
Kelce S. Wilson, Muge Ayse Kiy
openalex   +1 more source

A Study and Evaluation of Network Security by Employing Decision‐Making Approach Based on Bipolar Complex Fuzzy Yager Aggregation Operators

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT The evaluation and assessment of network security is a decision‐making (DM) problem that occurs in an environment with multiple criteria, which have uncertainty, bipolarity, and extra‐related information. The traditional approaches fail to address the need to acquire a wide range of information for the assessment, especially in situations ...
Walid Emam   +3 more
wiley   +1 more source

Cybersecurity activities for education and curriculum design: A survey

open access: yesComputers in Human Behavior Reports
Cyber threats are one of the main concerns in this growing technology epoch. To tackle this issue, highly skilled and motivated cybersecurity professionals are increasingly in demand to prevent, detect, respond to, or even mitigate the effects of such ...
Muhusina Ismail   +6 more
doaj   +1 more source

Cybersecurity for "Open Science"

open access: yes, 2017
Presentation to the APLU Council on Research, September 9th ...
openaire   +1 more source

Home - About - Disclaimer - Privacy