The Information Security Event Management Systems
The problem of using the information security event management systems in the large commercial organizations for revealing of security threats is considered.
V. V. Filatov
doaj
Enterprise Information Security Management Using Internet of Things Combined with Artificial Intelligence Technology. [PDF]
Sun H, Bai S.
europepmc +1 more source
The Challenge of Ensuring Business Security in Information Age [PDF]
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU +2 more
core
The Federal Information Security Management Act of 2002: A Potemkin Village [PDF]
Due to the daunting possibilities of cyberwarfare, and the ease with which cyberattacks may be conducted, the United Nations has warned that the next world war could be initiated through worldwide cyberattacks between countries.
White, Daniel M.
core +1 more source
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health (SDoH). Methods We conducted a search for keywords, which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the
Joy Buie +11 more
wiley +1 more source
Networked Organizational Structure of Enterprise Information Security Management Based on Digital Transformation and Genetic Algorithm. [PDF]
Di Z, Liu Y, Li S.
europepmc +1 more source
ARCSIM Newsletter, February 2024 [PDF]
ARCSIM approaches fives years and expands services to entire UMS research community. The research enterprise at UMaine has experienced rapid growth in recent years, and with that growth comes accompanying computing, data security, and operational needs ...
Advanced Research Computing, Security & Information Management
core +1 more source
Theoretical and methodological approaches to assessing the safety and reliability of accounting and analytical information in the system of economic security of enterprises [PDF]
Subject of research is theoretical and practical aspects of accounting and analytical information in the system of economic security. Subject area is focused on ensuring reliability and accuracy of accounting and analytical information in management ...
Bondar, Mykola, Iershova, Natalia
core
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy +9 more
wiley +1 more source
Development of an Ontology Based Forensic Search Mechanism: Proof of Concept
This paper examines the problems faced by Law Enforcement in searching large quantities of electronic evidence. It examines the use of ontologies as the basis for new forensic software filters and provides a proof of concept tool based on an ontological ...
Jill Slay, Fiona Schulz
doaj

