Results 21 to 30 of about 77,587 (303)

A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
In the era of big data, an ocean of data generated by Internet of Things (IoT) devices will be analyzed and processed by cloud computing. However, outsourcing of data can lead to leakage of user privacy to those unreliable service providers.
Qian Zhou   +4 more
doaj   +1 more source

The Necessity and Importance of Incorporating Media and Information Literacy into Holistic Metaliteracy [PDF]

open access: yes, 2020
Digitalization and the emergence of the Internet have resulted in escalating access to information and communication. Given the circumstances that soaring access to information amounts to the intensification of misinformation and disinformation, a set of
Salehi-Nejad, Alireza
core   +8 more sources

Security threats in cyberspace

open access: yesScientific Journal of the Military University of Land Forces, 2022
The article is an attempt to highlight the main types of security threats in cyberspace. As literature provides a multitude of different approaches, standards, methodologies, and proposals for the classification of threats, the article focuses on threats to privacy and national ICT security.
Marian Kopczewski   +3 more
openaire   +1 more source

Mobile Device Fingerprint Identification Using Gyroscope Resonance

open access: yesIEEE Access, 2021
Device fingerprint is information about the target computing device for the purpose of identification. The fingerprinting algorithm that how to assimilate the target into an identifier has been well studied for more than 20 years.
Junze Tian   +6 more
doaj   +1 more source

Security challenges when space merges with cyberspace

open access: yesSpace Policy, 2023
Spaceborne systems, such as communication satellites, sensory, surveillance, GPS and a multitude of other functionalities, form an integral part of global ICT cyberinfrastructures. However, a focussed discourse highlighting the distinctive threats landscape of these spaceborne assets is conspicuous by its absence.
Vijay Varadharajan, Neeraj Suri
openaire   +2 more sources

Cyberspace security: Cyberpunk 202..?

open access: yesJuridical Journal of Samara University, 2023
Information security is currently the Achilles heel for any state, since no one has absolute capabilities in this area, and there is no limit to perfection. Constantly improving technologies amaze the imagination, as well as those created as a response, not to mention the amount of funding spent on them.
openaire   +1 more source

Feature Graph Construction With Static Features for Malware Detection

open access: yesIET Information Security
Malware can greatly compromise the integrity and trustworthiness of information and is in a constant state of evolution. Existing feature fusion-based detection methods generally overlook the correlation between features.
Binghui Zou   +6 more
doaj   +1 more source

Patterns of interest change in stack overflow

open access: yesScientific Reports, 2022
Stack Overflow is currently the largest programming related question and answer community, containing multiple programming areas. The change of user’s interest is the micro-representation of the intersection of macro-knowledge and has been widely studied
Chenbo Fu   +4 more
doaj   +1 more source

Creating An Information Technology Security Program for Educators [PDF]

open access: yes, 2009
Information Technology (IT) Security education has become a critical component to college curriculum within the past few years. Along with developing security courses and degrees, there is a need to train college educators and disseminate the security ...
Kenney, S., Kuzma, Joanne, Philippe, T.
core   +1 more source

Dammarenediol II enhances etoposide‐induced apoptosis by targeting O‐GlcNAc transferase and Akt/GSK3β/mTOR signaling in liver cancer

open access: yesMolecular Oncology, EarlyView.
Etoposide induces DNA damage, activating p53‐dependent apoptosis via caspase‐3/7, which cleaves PARP1. Dammarenediol II enhances this apoptotic pathway by suppressing O‐GlcNAc transferase activity, further decreasing O‐GlcNAcylation. The reduction in O‐GlcNAc levels boosts p53‐driven apoptosis and influences the Akt/GSK3β/mTOR signaling pathway ...
Jaehoon Lee   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy