Results 11 to 20 of about 25,084,029 (287)

Blockchain enabled data security in vehicular networks. [PDF]

open access: yesSci Rep, 2023
Recently, researchers have applied blockchain technology in vehicular networks to take benefit of its security features, such as confidentiality, authenticity, immutability, integrity, and non-repudiation.
Sehar NU   +6 more
europepmc   +2 more sources

Metaverse in Healthcare Integrated with Explainable AI and Blockchain: Enabling Immersiveness, Ensuring Trust, and Providing Patient Data Security. [PDF]

open access: yesSensors (Basel), 2023
Digitization and automation have always had an immense impact on healthcare. It embraces every new and advanced technology. Recently the world has witnessed the prominence of the metaverse which is an emerging technology in digital space.
Ali S   +9 more
europepmc   +2 more sources

Security of Data Science and Data Science for Security [PDF]

open access: yes, 2019
In this chapter, we present a brief overview of important topics regarding the connection of data science and security. In the first part, we focus on the security of data science and discuss a selection of security aspects that data scientists should consider to make their services and products more secure.
Tellenbach, Bernhard   +2 more
openaire   +5 more sources

Privacy, Data Sharing, and Data Security Policies of Women's mHealth Apps: Scoping Review and Content Analysis.

open access: yesJMIR Mhealth Uhealth, 2022
Background Women’s mobile health (mHealth) is a growing phenomenon in the mobile app global market. An increasing number of women worldwide use apps geared to female audiences (female technology).
Alfawzan N   +3 more
europepmc   +2 more sources

Distributed storage for data security [PDF]

open access: yes2014 IEEE Information Theory Workshop (ITW 2014), 2014
5 pages, submitted to ITW ...
Annina Bracher, Amos Lapidoth, Eran Hof
openaire   +4 more sources

Future consumer mobile phone security: A case study using the data-centric security model [PDF]

open access: green, 2008
In the interconnected world that we live in, traditional security barriers are\ud broken down. Developments such as outsourcing, increased usage of mobile\ud devices and wireless networks each cause new security problems.\ud To address the new security ...
André van Cleeff
core   +14 more sources

Cloud data security and various cryptographic algorithms

open access: yesInternational Journal of Electrical and Computer Engineering (IJECE), 2023
Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration.
Yahia Alemami   +3 more
semanticscholar   +1 more source

Forecasting influenza hospital admissions within English sub-regions using hierarchical generalised additive models

open access: yesCommunications Medicine, 2023
Background Seasonal influenza places a substantial burden annually on healthcare services. Policies during the COVID-19 pandemic limited the transmission of seasonal influenza, making the timing and magnitude of a potential resurgence difficult to ...
Jonathon Mellor   +7 more
doaj   +1 more source

CDSTAEP: Cross-Domain Spatial-Temporal Association Learning for Abnormal Events Prediction

open access: yesApplied Sciences, 2023
Predicting network abnormal events and behavior can enhance security situation awareness and the ability to infer attack intentions. Most of the existing abnormal event prediction methods usually rely on the temporal relationship features between events ...
Mingcheng Gao   +3 more
doaj   +1 more source

A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography

open access: yesItalian National Conference on Sensors, 2022
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.
Rose Adee, H. Mouratidis
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy