Results 31 to 40 of about 25,084,029 (287)

Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [PDF]

open access: yesComputer and Knowledge Engineering, 2023
Today’s cyber-attacks are getting more sophisticated and their volume is consistently growing. Organizations suffer from various attacks in their lifetime each of which exploiting different vulnerabilities, therefore, preventing them all is not ...
Masoud Khosravi-Farmad   +1 more
doaj   +1 more source

Research on Data Security and Privacy Protection of Wearable Equipment in Healthcare

open access: yesJournal of Healthcare Engineering, 2021
With the close integration of science and technology and health, the broad application prospects of healthy interconnection bring revolutionary changes to health services.
Dawei Jiang, Guoquan Shi
semanticscholar   +1 more source

Dubhe: a deep-learning-based B5G coverage analysis method

open access: yesEURASIP Journal on Advances in Signal Processing, 2021
In recent years, with the rapid development of various technologies such as the Internet of Things and the Internet, the demand for massive device connections and a variety of differentiated new business applications has continued to increase.
Haoyan Xu, Xiaolong Xu, Fu Xiao
doaj   +1 more source

A Comprehensive Overview of Privacy and Data Security for Cloud Storage

open access: yesInternational Journal of Scientific Research in Science Engineering and Technology, 2021
People used to carry their documents about on CDs only a few years ago. Many people have recently turned to memory sticks. Cloud computing, in this case, refers to the capacity to access and edit data stored on remote servers from any Internet-connected ...
Nikhat Akhtar   +4 more
semanticscholar   +1 more source

Hate Speech Detection Using Machine Learning: A Survey

open access: yesAcademy Journal of Science and Engineering, 2023
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H.,   +7 more
doaj  

Uncovering the relationships between military community health and affects expressed in social media

open access: yesEPJ Data Science, 2017
Military populations present a small, unique community whose mental and physical health impacts the security of the nation. Recent literature has explored social media’s ability to enhance disease surveillance and characterize distinct communities with ...
Svitlana Volkova   +3 more
doaj   +1 more source

Estimating the Growing Stem Volume of the Planted Forest Using the General Linear Model and Time Series Quad-Polarimetric SAR Images

open access: yesSensors, 2020
Increasing the area of planted forests is rather important for compensation the loss of natural forests and slowing down the global warming. Forest growing stem volume (GSV) is a key indicator for monitoring and evaluating the quality of planted forest ...
Jiangping Long   +4 more
doaj   +1 more source

Secure Internal Data Markets [PDF]

open access: yesFuture Internet, 2021
The data market concept has gained a lot of momentum in recent years, fuelled by initiatives to set up such markets, e.g., on the European level. Still, the typical data market concept aims at providing a centralised platform with all of its positive and negative side effects.
Kieseberg, Peter   +2 more
openaire   +5 more sources

Enhancing Privacy and Data Security across Healthcare Applications Using Blockchain and Distributed Ledger Concepts

open access: yesHealthcare, 2020
Nowadays, blockchain is developing as a secure and trustworthy platform for secure information sharing in areas of application like banking, supply chain management, food industry, energy, the Internet, and medical services.
Haibing Liu   +2 more
semanticscholar   +1 more source

Security and Privacy Issues of Big Data [PDF]

open access: yes, 2015
This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy.
Moura, Jose, Serrao, Carlos
core   +2 more sources

Home - About - Disclaimer - Privacy