Quantum secure patient login credential system using blockchain for electronic health record sharing framework. [PDF]
Natarajan M+3 more
europepmc +1 more source
Construction and optimization of ecological security patterns in Chinese black soil areas considering ecological importance and vulnerability. [PDF]
Chen B, Liu X, Liu J.
europepmc +1 more source
Enhancing Security Operations Center: Wazuh Security Event Response with Retrieval-Augmented-Generation-Driven Copilot. [PDF]
Ismail+7 more
europepmc +1 more source
Resilient Privacy Preservation Through a Presumed Secrecy Mechanism for Mobility and Localization in Intelligent Transportation Systems. [PDF]
Alanazi MD+6 more
europepmc +1 more source
A secure end-to-end communication framework for cooperative IoT networks using hybrid blockchain system. [PDF]
Erukala SB+6 more
europepmc +1 more source
A distributed zero-trust scheme for airborne wireless sensor networks using dynamic identity authentication. [PDF]
Wang K, Hong Y, Li Y, Yan R, Feng J.
europepmc +1 more source
Related searches:
Strategic value alignment for information security management: a critical success factor analysis
Information and Computer Security, 2018Purpose Effective information security management is a strategic issue for organizations to safeguard their information resources. Strategic value alignment is a proactive approach to manage value conflict in information security management.
Zhiling Tu+3 more
semanticscholar +1 more source
From theory to practice: guidelines for enhancing information security management
Information and Computer Security, 2019Purpose This study aims to identify the implications of security behaviour determinants for security management to propose respective guidelines which can be integrated with current security management practices, including those following the widely ...
Ioanna-Aikaterini Topa, Maria Karyda
semanticscholar +1 more source