Results 151 to 160 of about 14,261,936 (322)
Information Assurance and Security
Information Assurance and ...
Abraham,Ajith+3 more
openaire +2 more sources
Real Option Applications to Information Security [PDF]
Real options present advantages over the standard discounting methods. In this paper we analyze them briefly and examine their potential applications on information security.
Pythagoras PETRATOS
core
Retracted: Network Information Security Platform Based on Artificial Intelligence for the Elderly's Health "Integration of Physical, Medical, and Nursing Care". [PDF]
Methods In Medicine CAM.
europepmc +1 more source
Information security. 4. Information security in network.
Tsutomu Matsumoto
openalex +2 more sources
The Information Revolution and National Security [PDF]
Thomas E. Copeland
openalex +1 more source
Information security. 2. Information security in broadcasting.
Seiichi Namba
openalex +2 more sources
Information Security: Process Evaluation and Product Evaluation [PDF]
Mariki M. Eloff, Sebastiaan H. von Solms
openalex +1 more source
Privacy Law Protection Based on the Information Security Assurance Algorithm. [PDF]
Wang Z, Yue Q.
europepmc +1 more source
Federated learning is a promising new distributed machine learning paradigm, where the client realizes secure and collaborative multi-user training of machine learning models by retaining private data and sharing model parameters with the server. However,
Qiantao Yang+5 more
doaj +1 more source
Summary of Security Technologies for Information Network Systems
Kinko Yamamoto
openalex +2 more sources