Results 21 to 30 of about 77,587 (303)
In the era of big data, an ocean of data generated by Internet of Things (IoT) devices will be analyzed and processed by cloud computing. However, outsourcing of data can lead to leakage of user privacy to those unreliable service providers.
Qian Zhou +4 more
doaj +1 more source
The Necessity and Importance of Incorporating Media and Information Literacy into Holistic Metaliteracy [PDF]
Digitalization and the emergence of the Internet have resulted in escalating access to information and communication. Given the circumstances that soaring access to information amounts to the intensification of misinformation and disinformation, a set of
Salehi-Nejad, Alireza
core +8 more sources
Security threats in cyberspace
The article is an attempt to highlight the main types of security threats in cyberspace. As literature provides a multitude of different approaches, standards, methodologies, and proposals for the classification of threats, the article focuses on threats to privacy and national ICT security.
Marian Kopczewski +3 more
openaire +1 more source
Mobile Device Fingerprint Identification Using Gyroscope Resonance
Device fingerprint is information about the target computing device for the purpose of identification. The fingerprinting algorithm that how to assimilate the target into an identifier has been well studied for more than 20 years.
Junze Tian +6 more
doaj +1 more source
Security challenges when space merges with cyberspace
Spaceborne systems, such as communication satellites, sensory, surveillance, GPS and a multitude of other functionalities, form an integral part of global ICT cyberinfrastructures. However, a focussed discourse highlighting the distinctive threats landscape of these spaceborne assets is conspicuous by its absence.
Vijay Varadharajan, Neeraj Suri
openaire +2 more sources
Cyberspace security: Cyberpunk 202..?
Information security is currently the Achilles heel for any state, since no one has absolute capabilities in this area, and there is no limit to perfection. Constantly improving technologies amaze the imagination, as well as those created as a response, not to mention the amount of funding spent on them.
openaire +1 more source
Feature Graph Construction With Static Features for Malware Detection
Malware can greatly compromise the integrity and trustworthiness of information and is in a constant state of evolution. Existing feature fusion-based detection methods generally overlook the correlation between features.
Binghui Zou +6 more
doaj +1 more source
Patterns of interest change in stack overflow
Stack Overflow is currently the largest programming related question and answer community, containing multiple programming areas. The change of user’s interest is the micro-representation of the intersection of macro-knowledge and has been widely studied
Chenbo Fu +4 more
doaj +1 more source
Creating An Information Technology Security Program for Educators [PDF]
Information Technology (IT) Security education has become a critical component to college curriculum within the past few years. Along with developing security courses and degrees, there is a need to train college educators and disseminate the security ...
Kenney, S., Kuzma, Joanne, Philippe, T.
core +1 more source
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee +8 more
wiley +1 more source

