Results 1 to 10 of about 3,352,449 (323)

The Application of AHP Model to Guide Decision Makers: A Case Study of E-banking Security [PDF]

open access: yes, 2010
Changes in technology have resulted in new ways for bankers to deliver their services to costumers. Electronic banking systems in various forms are the evidence of such advancement. However, information security threats also evolving along this trend. This paper proposes the application of Analytic Hierarchy Process (AHP) methodology to guide decision ...
Hwang, Junseok, Syamsuddin, Irfan
arxiv   +3 more sources

A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy [PDF]

open access: yes, 2010
Ensuring security of e-government applications and infrastructures is crucial to maintain trust among stakeholders to store, process and exchange information over the e-government systems. Due to dynamic and continuous threats on e-government information security, policy makers need to perform evaluation on existing information security strategy as to ...
Hwang, Junseok, Syamsuddin, Irfan
arxiv   +3 more sources

People Are the Answer to Security: Establishing a Sustainable Information Security Awareness Training (ISAT) Program in Organization [PDF]

open access: yesInternational Journal of Computer Science and Information Security, Vol.11, No 8, August 2013, Paper ID 31071337, 2013
Educating the users on the essential of information security is very vital and important to the mission of establishing a sustainable information security in any organization and institute. At the University Technology Malaysia (UTM), we have recognized the fact that, it is about time information security should no longer be a lacking factor in ...
Ithnin, Norafida Binti   +1 more
arxiv   +2 more sources

Information-Theoretic Security for the Masses [PDF]

open access: yesarXiv, 2013
We combine interactive zero-knowledge protocols and weak physical layer randomness properties to construct a protocol which allows bootstrapping an IT-secure and PF-secure channel from a memorizable shared secret. The protocol also tolerates failures of its components, still preserving most of its security properties, which makes it accessible to ...
Nikitin, Oleksandr
arxiv   +3 more sources

Relations between information science and information security culture

open access: yesJournal of Modern Science, 2023
Objectives The aim of the article is to present the relations that exist between the culture of information security and information sciences. Material and methods desk research, Literature criticism, Synthesis, Comparative analysis.
Bogusław Jagusiak, Piotr Zaskórski
doaj   +1 more source

Specialized processors and algorithms for computing standard functions [PDF]

open access: yesE3S Web of Conferences, 2023
This article discusses the problem of creating a specialized processor device that allows you to increase the number of calculated mathematical functions, resulting in a single calculation scheme for all elementary functions, an algorithm for lowering ...
Turdimatov Mamirjon   +4 more
doaj   +1 more source

A Secure CDM-Based Data Analysis Platform (SCAP) in Multi-Centered Distributed Setting

open access: yesApplied Sciences, 2021
Hospitals have their own database structures and maintain their data in a closed manner. For this reason, it is difficult for researchers outside of institutions to access multi-center data.
Seungho Jeon   +3 more
doaj   +1 more source

A dynamic graph Hawkes process based on linear complexity self-attention for dynamic recommender systems [PDF]

open access: yesPeerJ Computer Science, 2023
The dynamic recommender system realizes the real-time recommendation for users by learning the dynamic interest characteristics, which is especially suitable for the scenarios of rapid transfer of user interests, such as e-commerce and social media.
Zhiwen Hou   +6 more
doaj   +2 more sources

Multiontology Construction and Application of Threat Model Based on Adversarial Attack and Defense Under ISO/IEC 27032

open access: yesIEEE Access, 2022
Research pertaining to threat modeling is significant. However, the existing threat modeling methods suffer from ambiguity, heterogeneity and incompleteness; furthermore, the threat models at different abstraction levels are separated from each other ...
Xuan Hu   +4 more
doaj   +1 more source

Image quality comparisons of coil setups in 3T MRI for brain and head and neck radiotherapy simulations

open access: yesJournal of Applied Clinical Medical Physics, Volume 23, Issue 12, December 2022., 2022
Abstract Purpose MRI is increasingly used for brain and head and neck radiotherapy treatment planning due to its superior soft tissue contrast. Flexible array coils can be arranged to encompass treatment immobilization devices, which do not fit in diagnostic head/neck coils. Selecting a flexible coil arrangement to replace a diagnostic coil should rely
Evangelia Kaza   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy