Results 11 to 20 of about 25,084,029 (287)
Blockchain enabled data security in vehicular networks. [PDF]
Recently, researchers have applied blockchain technology in vehicular networks to take benefit of its security features, such as confidentiality, authenticity, immutability, integrity, and non-repudiation.
Sehar NU+6 more
europepmc +2 more sources
Metaverse in Healthcare Integrated with Explainable AI and Blockchain: Enabling Immersiveness, Ensuring Trust, and Providing Patient Data Security. [PDF]
Digitization and automation have always had an immense impact on healthcare. It embraces every new and advanced technology. Recently the world has witnessed the prominence of the metaverse which is an emerging technology in digital space.
Ali S+9 more
europepmc +2 more sources
Security of Data Science and Data Science for Security [PDF]
In this chapter, we present a brief overview of important topics regarding the connection of data science and security. In the first part, we focus on the security of data science and discuss a selection of security aspects that data scientists should consider to make their services and products more secure.
Tellenbach, Bernhard+2 more
openaire +5 more sources
Background Women’s mobile health (mHealth) is a growing phenomenon in the mobile app global market. An increasing number of women worldwide use apps geared to female audiences (female technology).
Alfawzan N+3 more
europepmc +2 more sources
Distributed storage for data security [PDF]
5 pages, submitted to ITW ...
Annina Bracher, Amos Lapidoth, Eran Hof
openaire +4 more sources
Future consumer mobile phone security: A case study using the data-centric security model [PDF]
In the interconnected world that we live in, traditional security barriers are\ud broken down. Developments such as outsourcing, increased usage of mobile\ud devices and wireless networks each cause new security problems.\ud To address the new security ...
André van Cleeff
core +14 more sources
Cloud data security and various cryptographic algorithms
Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration.
Yahia Alemami+3 more
semanticscholar +1 more source
Background Seasonal influenza places a substantial burden annually on healthcare services. Policies during the COVID-19 pandemic limited the transmission of seasonal influenza, making the timing and magnitude of a potential resurgence difficult to ...
Jonathon Mellor+7 more
doaj +1 more source
CDSTAEP: Cross-Domain Spatial-Temporal Association Learning for Abnormal Events Prediction
Predicting network abnormal events and behavior can enhance security situation awareness and the ability to infer attack intentions. Most of the existing abnormal event prediction methods usually rely on the temporal relationship features between events ...
Mingcheng Gao+3 more
doaj +1 more source
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.
Rose Adee, H. Mouratidis
semanticscholar +1 more source