Results 1 to 10 of about 3,165,354 (231)

Security of Data Science and Data Science for Security [PDF]

open access: yes, 2019
In this chapter, we present a brief overview of important topics regarding the connection of data science and security. In the first part, we focus on the security of data science and discuss a selection of security aspects that data scientists should consider to make their services and products more secure.
Tellenbach, Bernhard   +2 more
openaire   +2 more sources

Data Security

open access: yes大数据
As Artificial Intelligence (AI) and the Metaverse become more essential to scientific study, they introduce novel difficulties and opportunities for data protection. The integration of these technologies facilitates unparalleled levels of data generation, dissemination, and cooperation. Nonetheless, they also provide new risks in data storage, transfer,
Kehinde Iyioluwa Adeyinka   +1 more
  +6 more sources

Data Security

open access: yes, 2023
Data security has become a significant concern in recent times, with the increasing amount of sensitive data being stored and transferred through digital channels. This paper explores the various aspects of data security, including the threats, vulnerabilities, and countermeasures.
openaire   +1 more source

Data Security

open access: yesErgonomics International Journal, 2018
Data security should be a priority in your organization. Data breaches are expensive. The top 13 breaches of last year alone cost the affected companies more than $32 billion. After the initial incident, the exposed information can take on new lives. Once the data is out there, it is completely exposed and the backlash of a breach can seem never ending
openaire   +2 more sources

Data Security

open access: yesACM Computing Surveys, 1979
The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest in the technical safeguards for data. There are four kinds of safeguards, each related to but distinct from the others. Access controls regulate which users may enter the system and subsequently which data sets an active user may ...
Denning, Dorothy E., Denning, Peter J.
openaire   +2 more sources

Modern Data Security

open access: yesArchives of Pathology & Laboratory Medicine, 2004
Robert R, Klein   +2 more
openaire   +2 more sources

Enhancing Data Security of Cloud Based LMS. [PDF]

open access: yesWirel Pers Commun, 2023
Chatterjee P, Bose R, Banerjee S, Roy S.
europepmc   +1 more source

Blockchain enabled data security in vehicular networks. [PDF]

open access: yesSci Rep, 2023
Sehar NU   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy