Results 21 to 30 of about 25,084,029 (287)
Analyzing the Big Data Security Through a Unified Decision-Making Approach
The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the health sector has resulted in significant advancements and benefits.
Abdulaziz Attaallah+5 more
semanticscholar +1 more source
Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network
Covert timing channels (CTCs) are defined as a mechanism that embeds covert information into network traffic. In a manner, information leakage caused by CTCs brings serious threat to network security.
Chonggao Sun+3 more
doaj +1 more source
A New Dynamic Substitution Box for Data Security using an Innovative Chaotic Map
As the motivations and capabilities of threat actors continue to evolve, providing data security has become more important than ever. For this purpose, different ciphers using various techniques are being developed.
A. Manzoor, A. Zahid, Malik Tahir Hassan
semanticscholar +1 more source
On the Security of Individual Data [PDF]
We will consider the following problem in this paper: Assume that there are $$n$$ numerical data $$\{x_1,x_2,\ldots,x_n\}$$ (like salaries of $$n$$ individuals) stored in a database and some subsums of these numbers are made public or just available for persons not eligible to learn the original data.
Demetrovics, János+2 more
openaire +3 more sources
Enhanced Data Security of Communication System Using Combined Encryption and Steganography
Data security has become a paramount necessity and more obligation in daily life. Most of our systems can be hacked, and it causes very high risks to our confidential files inside the systems.
H. Alrikabi, H. Hazim
semanticscholar +1 more source
Existing approaches to sharing of distributed medical data either provide only limited protection of patients’ privacy or sacrifice the accuracy of results.
David Froelicher+8 more
doaj +1 more source
A survey on healthcare data security in wireless body area networks
Advances in remote interchanges, the internet of nano things have empowered the wireless body area networks (WBAN) to end up a promising systems of networking standard.
Tallat Jabeen, Humaira Ashraf, A. Ullah
semanticscholar +1 more source
Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to provide computation, storage, and networking capabilities at the edge of the network in close proximity to end-users.
Belal Ali, M. Gregory, Shuo Li
semanticscholar +1 more source
The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest in the technical safeguards for data. There are four kinds of safeguards, each related to but distinct from the others. Access controls regulate which users may enter the system and subsequently which data sets an active user may ...
Denning, Dorothy E., Denning, Peter J.
openaire +5 more sources
Data Security and Privacy Protection for Cloud Storage: A Survey
The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world’s digital economy are at the top of the tide.
Pan Yang, N. Xiong, Jingli Ren
semanticscholar +1 more source