Results 31 to 40 of about 1,275,223 (320)
Digital security of the hotel brand
This article is devoted to the study of the brand digital security and its impact on the business processes of hotel businesses. The emphasis is on the fact that digital communications as key drivers of the sales system create increased risks to the ...
Lyudmyla Bovsh+3 more
doaj +1 more source
Experimental measurement-device-independent quantum digital signatures over a metropolitan network [PDF]
Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable
Andersson, Erika+18 more
core +2 more sources
Legal support for digitalization of art
The relevance of digital art and digitalization of art, as a more general category, reflecting the modern technological approach to this sphere of human activity, is manifested in mainstreaming of legal regulation of various aspects of digital ...
Tatsiana N. Mikhaliova
doaj +1 more source
A Digital Twin Framework for Cyber Security in Cyber-Physical Systems [PDF]
Currently, most of the research in digital twins focuses on simulation and optimization. Digital twins are especially useful for critical systems. However, digital twins can also be used for safety and cyber security. The idea of this paper is motivated by the limitations of cyber security in Cyber-Physical Systems (CPSs).
arxiv
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues [PDF]
Improved interoperability between public and private organizations is of key significance to make digital government newest triumphant. Digital Government interoperability, information sharing protocol and security are measured the key issue for ...
Headayetullah, Md., Pradhan, G. K.
core +2 more sources
Wireless and Physical Security via Embedded Sensor Networks [PDF]
Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames (Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the ...
Bestavros, Azer, Ocean, Michael J.
core +2 more sources
Cryptocurrency wallets: assessment and security [PDF]
Digital wallet as a software program or a digital device allows users to conduct various transactions. Hot and cold digital wallets are considered as two types of this wallet. Digital wallets need an online connection fall into the first group, whereas digital wallets can operate without internet connection belong to the second group. Prior to buying a
arxiv
Digital Signature Security in Data Communication
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack
Abdillah, Leon Andretti+8 more
core +1 more source
A survey on cyber security for smart grid communications [PDF]
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it
Qian, Y, Sharif, H, Tipper, D, Yan, Y
core +1 more source
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi+2 more
wiley +1 more source