Results 131 to 140 of about 14,261,936 (322)

Research on a Framework for Chinese Argot Recognition and Interpretation by Integrating Improved MECT Models

open access: yesEntropy
In underground industries, practitioners frequently employ argots to communicate discreetly and evade surveillance by investigative agencies. Proposing an innovative approach using word vectors and large language models, we aim to decipher and understand
Mingfeng Li   +3 more
doaj   +1 more source

Guardians of the Web: The Evolution and Future of Website Information Security [PDF]

open access: yesarXiv
Website information security has become a critical concern in the digital age. This article explores the evolution of website information security, examining its historical development, current practices, and future directions. The early beginnings from the 1960s to the 1980s laid the groundwork for modern cybersecurity, with the development of ARPANET,
arxiv  

INFORMATION SYSTEM SECURITY (CYBER SECURITY)

open access: yesJurnal Informatika, 2016
Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations.
openaire   +3 more sources

Information Security for Libraries [PDF]

open access: yes, 2002
Libraries have made significant investments in computer-based resources, training and services. However, such investments need to be protected from misuse or mistake by taking an active role in information security.
openaire   +2 more sources

Love Data Week Event Series [PDF]

open access: yes
Love Data Week is a week-long international celebration of data, dedicated to raising awareness of the importance of research data management, security, sharing, and preservation.
University of Maine Advanced Research Computing, Security & Information Management
core   +1 more source

A systematic literature review of cybersecurity scales assessing information security awareness. [PDF]

open access: yesHeliyon, 2023
Rohan R   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy