Results 221 to 230 of about 25,084,029 (287)
Some of the next articles are maybe not open access.

Blockchain-Based Data Security for Artificial Intelligence Applications in 6G Networks

IEEE Network, 2020
The sixth generation (6G) networks are expected to provide a fully connected world with terrestrial wireless and satellite communications integration.
Weiwei Li   +4 more
semanticscholar   +1 more source

Analysis of various data security techniques of steganography: A survey

Information Security Journal, 2020
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security is termed as a serious issue while communication of data is processed over the Internet.
Sachin Dhawan, Rashmi Gupta
semanticscholar   +1 more source

Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security

IEEE Transactions on Sustainable Computing, 2020
Deep learning methods, e.g., convolutional neural networks (CNNs) and Recurrent Neural Networks (RNNs), have achieved great success in image processing and natural language processing especially in high level vision applications such as recognition and ...
Feng Jiang   +7 more
semanticscholar   +1 more source

Enhanced Data Security Framework Using Lightweight Cryptography and Multi-Level Encryption

2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE)
Network security is essential for individuals as well as organizations in the modern day, since the majority of enterprises and organizations store their data on clouds.
Projjal Chakrabarty   +4 more
semanticscholar   +1 more source

Data Security

Journal of Chemical Information and Computer Sciences, 1975
Data security is a rich and complex subject dealing with the protection of the computing capability from all threats to its continuity. Some fundamental elements of the process of achieving a reasonable, prudent measure of that protection are considered.
openaire   +2 more sources

Data security

Nursing Management, 2016
A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal ...
openaire   +2 more sources

Data-centric security: Integrating data privacy and data security

IBM Journal of Research and Development, 2009
Classifying data according to its permissible use, appropriate handling, and business value is critical for data privacy and security protection. This is essential for compliance with the constantly evolving regulatory landscape concerning protected data. Problems arise when users compromise data privacy and security by overlooking the critical need to
A. C. Nelson   +4 more
openaire   +2 more sources

Securing Data with Workgroup Security [PDF]

open access: possible, 2004
Protecting and securing your data is a matter of balancing software technology and people processes. If you trust the people who use your database, then data protection is a straightforward computer process. If you cannot afford to trust your users, you have to make it as difficult as you can for users to thwart your security and protection measures ...
openaire   +1 more source

Secure Data Dissemination

2004
In this chapter, we present the main security issues related to the selective dissemination of information (SDI system). More precisely, after provided an overview of the work carried out in this field, we have focused on the security properties that a secure SDI system (SSDI system) must satisfy and on some of the strategies and mechanisms that can be
Bertino E.   +2 more
openaire   +2 more sources

Data Security

IEEE Transactions on Consumer Electronics, 1981
Misuse of information contained in computers and actual theft via computers is on the increase. This is due to growing sophistication in data communications as well as better understanding of computers by more people. As more and more important information is contained in computers, the need to protect this information grows.
openaire   +2 more sources

Home - About - Disclaimer - Privacy