Results 31 to 40 of about 3,073,944 (343)
Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking [PDF]
Cloud data provenance, or "what has happened to my data in the cloud", is a critical data security component which addresses pressing data accountability and data governance issues in cloud computing systems. In this paper, we present Progger (Provenance
Ko, Ryan K.L., Will, Mark Antony
core +2 more sources
Secret Sharing for Cloud Data Security
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya +2 more
core +1 more source
Designing privacy for scalable electronic healthcare linkage [PDF]
A unified electronic health record (EHR) has potentially immeasurable benefits to society, and the current healthcare industry drive to create a single EHR reflects this.
Ajayi, O. +3 more
core +2 more sources
Understanding the infection severity and epidemiological characteristics of mpox in the UK
In May 2022, individuals infected with the monkeypox virus were detected in the UK without clear travel links to endemic areas. Understanding the clinical characteristics and infection severity of mpox is necessary for effective public health policy. The
Thomas Ward +5 more
doaj +1 more source
Detecting periodic subsequences in cyber security data
Statistical approaches to cyber-security involve building realistic probability models of computer network data. In a data pre-processing phase, separating automated events from those caused by human activity should improve statistical model building and
Heard, Nick +2 more
core +1 more source
occumb: An R package for site occupancy modeling of eDNA metabarcoding data
This study introduces a new R package, occumb, for the convenient application of site occupancy modeling using environmental DNA (eDNA) metabarcoding data. We outline a data analysis workflow, including data setup, model fitting, model assessment, and comparison of potential study settings based on model predictions, all of which can be performed using
Keiichi Fukaya, Yuta Hasebe
wiley +1 more source
The real-time infection hospitalisation and fatality risk across the COVID-19 pandemic in England
The COVID-19 pandemic led to 231,841 deaths and 940,243 hospitalisations in England, by the end of March 2023. This paper calculates the real-time infection hospitalisation risk (IHR) and infection fatality risk (IFR) using the Office for National ...
Thomas Ward +5 more
doaj +1 more source
Surface defect detection plays a crucial role in ensuring the quality standards of hot-rolled steel strips. To meet the demands for high precision and real-time performance in industrial defect detection, this paper introduces an improved one-stage ...
Yunfei Ma +4 more
doaj +1 more source
Improving Both Quantity and Quality: Incentive Mechanism for Social Mobile Crowdsensing Architecture
Mobile crowdsensing has emerged as an efficient paradigm for performing large-scale sensing tasks. Improving both the quantity and quality of users is still the pivotal problem for mobile crowdsensing system.
Jia Xu +4 more
doaj +1 more source
Secure Data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology
The Industrial Internet of Things (IIoT) has become a pivotal field of development that can increase the efficiency of real-time collection, recording, analysis, and control of the entire activities of various machines, and can actively enhance quality ...
Samir M. Umran +4 more
doaj +1 more source

