Results 31 to 40 of about 22,394,325 (191)

Do Software Security Practices Yield Fewer Vulnerabilities? [PDF]

open access: yesarXiv, 2022
Due to the ever-increasing security breaches, practitioners are motivated to produce more secure software. In the United States, the White House Office released a memorandum on Executive Order (EO) 14028 that mandates organizations provide self-attestation of the use of secure software development practices.
arxiv  

Leveraging Artificial Intelligence to Enhance Data Security and Combat Cyber Attacks

open access: yesJournal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023
This research paper examines the potential of artificial intelligence (AI) in strengthening data security and mitigating the growing threat of cyber-attacks.
Yijie Weng, Jianhao Wu
semanticscholar   +1 more source

Flexible Physical Layer Security for Joint Data and Pilots in Future Wireless Networks [PDF]

open access: yesarXiv, 2021
In this work, novel physical layer security (PLS) schemes are proposed for orthogonal frequency-division multiplexing (OFDM) to secure both data and pilots. The majority of previous studies focus on only securing the data without considering the security of the pilots used for channel estimation.
arxiv  

Data Security

open access: yesData Science Journal, 2013
There is a range of reasons for securing data and systems, from those already common nowadays (IPR, licenses, privacy, confidentiality, etc.) to others likely to appear in the future (distributed trust, reputation building, social collaboration, etc.).
openaire   +4 more sources

Data Security

open access: yes, 2023
Data security has become a significant concern in recent times, with the increasing amount of sensitive data being stored and transferred through digital channels. This paper explores the various aspects of data security, including the threats, vulnerabilities, and countermeasures.
openaire   +2 more sources

A New Advanced User Authentication and Confidentiality Security Service [PDF]

open access: yes, 2014
Network & internet security is the burning question of today's world and they are deeply related to each other for secure successful data transmission. Network security approach is totally based on the concept of network security services. In this paper, a new system of network security service is implemented which is more secure than conventional ...
arxiv   +1 more source

Secure Data Processing in the Cloud [PDF]

open access: yes, 2018
Data protection is a key issue in the adoption of cloud services. The project “RestAssured – Secure Data Processing in the Cloud,” financed by the European Union’s Horizon 2020 research and innovation programme, addresses the challenge of data protection in the cloud with a combination of innovative security solutions, data lifecycle management ...
Mann, Zoltán Ádám   +7 more
openaire   +3 more sources

A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing

open access: yesIEEE Access, 2020
Mobile edge computing, with characteristics of position awareness, mobile support, low latency, decentralization, and distribution, has received widespread attention from industry and academia, and has been applied to application areas such as ...
Yichen Hou   +5 more
semanticscholar   +1 more source

Data security and privacy in the cloud [PDF]

open access: yesMobile Multimedia/Image Processing, Security, and Applications 2019, 2019
Relying on the cloud for storing data and performing computations has become a popular solution in today’s society, which demands large data collections and/or analysis over them to be readily available, for example, to make knowledge-based decisions.
S. De Capitani di Vimercati   +3 more
openaire   +1 more source

Data Security Sharing and Storage Based on a Consortium Blockchain in a Vehicular Ad-hoc Network

open access: yesIEEE Access, 2019
A vehicular ad-hoc network (VANET) can improve the flow of traffic to facilitate intelligent transportation and to provide convenient information services, where the goal is to provide self-organizing data transmission capabilities for vehicles on the ...
Xiaohong Zhang, Xiaofeng Chen
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy