Results 51 to 60 of about 1,504,715 (296)

Hiding Contextual Information for Defending a Global Attacker

open access: yesIEEE Access, 2018
As wireless sensor networks are mostly deployed in harsh and hostile environments, lack of human maintenance, it has become a severe challenge to offer security or privacy service, especially when facing a powerful attacker.
Qian Zhou, Xiaolin Qin, Xiaojun Xie
doaj   +1 more source

A novel and highly efficient botnet detection algorithm based on network traffic analysis of smart systems

open access: yesInternational Journal of Distributed Sensor Networks, 2022
In smart systems, attackers can use botnets to launch different cyber attack activities against the Internet of Things. The traditional methods of detecting botnets commonly used machine learning algorithms, and it is difficult to detect and control ...
Li Duan   +3 more
doaj   +1 more source

Efficacy and Safety Analysis of Roxarestat in Regulating Renal Anemia in Patients on Maintenance Hemodialysis

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Objective To compare the efficacy and safety of roxarestat versus recombinant human erythropoietin (rhEPO) in the management of renal anemia in patients undergoing maintenance hemodialysis. Methods This was a prospective, open‐label, randomized controlled trial.
Lingling Chen, Junjie Zhu, Qiaonan Ge
wiley   +1 more source

Information Privacy/Information Property

open access: yesSSRN Electronic Journal, 2000
From most objective standpoints, protecting information privacy though industry self-regulation is an abject failure. The current political climate has been hostile to proposals for meaningful privacy regulation. Privacy advocates have been casting around for some third alternative and a number of them have fastened on the idea that data privacy can be
openaire   +4 more sources

Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems

open access: yesEntropy, 2014
Recommendation systems are information-filtering systems that tailor information to users on the basis of knowledge about their preferences. The ability of these systems to profile users is what enables such intelligent functionality, but at the same ...
Javier Parra-Arnau   +2 more
doaj   +1 more source

Dietary Protein Intake and Peritoneal Protein Losses in Peritoneal Dialysis Patients

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Peritoneal dialysis (PD) patients lose protein in their waste dialysate, potentially increasing their risk for malnutrition. We wished to determine whether there was any association between losses and dietary protein intake (DPI). Methods DPI was assessed from 24‐h dietary recall using Nutrics software.
Haalah Shaaker, Andrew Davenport
wiley   +1 more source

SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors

open access: yesSensors, 2011
People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station.
Tai-Hoon Kim   +2 more
doaj   +1 more source

Perception of Information Sensitivity for Internet Users in Saudi Arabia

open access: yesActa Informatica Pragensia, 2020
The rapid evolution of Internet use has led to the collection of big data about users, which has raised users' privacy concerns about their personal information.
Khaled Almotairi, Bilal Bataineh
doaj   +1 more source

Global Education Industry - Exploring the state of affairs in Austria

open access: yesSeminar.net, 2021
Digitization initiatives in the field of education always correspond with developments in the education industry. In recent years, globally networked development dynamics have emerged that are essentially characterized by an education-industrial complex ...
English English, Reinhold Madritsch
doaj   +1 more source

Privacy as an Asset [PDF]

open access: yes, 2017
Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the
Gryz, Jarek
core  

Home - About - Disclaimer - Privacy