Results 31 to 40 of about 1,275,223 (320)

Digital security of the hotel brand

open access: yesMенаџмент у хотелијерству и туризму, 2023
This article is devoted to the study of the brand digital security and its impact on the business processes of hotel businesses. The emphasis is on the fact that digital communications as key drivers of the sales system create increased risks to the ...
Lyudmyla Bovsh   +3 more
doaj   +1 more source

Experimental measurement-device-independent quantum digital signatures over a metropolitan network [PDF]

open access: yes, 2017
Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable
Andersson, Erika   +18 more
core   +2 more sources

Legal support for digitalization of art

open access: yesRUDN Journal of Law, 2023
The relevance of digital art and digitalization of art, as a more general category, reflecting the modern technological approach to this sphere of human activity, is manifested in mainstreaming of legal regulation of various aspects of digital ...
Tatsiana N. Mikhaliova
doaj   +1 more source

A Digital Twin Framework for Cyber Security in Cyber-Physical Systems [PDF]

open access: yesarXiv, 2022
Currently, most of the research in digital twins focuses on simulation and optimization. Digital twins are especially useful for critical systems. However, digital twins can also be used for safety and cyber security. The idea of this paper is motivated by the limitations of cyber security in Cyber-Physical Systems (CPSs).
arxiv  

Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues [PDF]

open access: yes, 2010
Improved interoperability between public and private organizations is of key significance to make digital government newest triumphant. Digital Government interoperability, information sharing protocol and security are measured the key issue for ...
Headayetullah, Md., Pradhan, G. K.
core   +2 more sources

Wireless and Physical Security via Embedded Sensor Networks [PDF]

open access: yes, 2008
Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames (Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the ...
Bestavros, Azer, Ocean, Michael J.
core   +2 more sources

Cryptocurrency wallets: assessment and security [PDF]

open access: yesarXiv, 2023
Digital wallet as a software program or a digital device allows users to conduct various transactions. Hot and cold digital wallets are considered as two types of this wallet. Digital wallets need an online connection fall into the first group, whereas digital wallets can operate without internet connection belong to the second group. Prior to buying a
arxiv  

Digital Signature Security in Data Communication

open access: yes, 2018
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack
Abdillah, Leon Andretti   +8 more
core   +1 more source

A survey on cyber security for smart grid communications [PDF]

open access: yes, 2012
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it
Qian, Y, Sharif, H, Tipper, D, Yan, Y
core   +1 more source

Beyond digital twins: the role of foundation models in enhancing the interpretability of multiomics modalities in precision medicine

open access: yesFEBS Open Bio, EarlyView.
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy