Results 31 to 40 of about 2,116,286 (342)
In the Fourth Industrial Revolution era, data-based business management activities among enterprises proliferated are mainly based on digital transformation.
Yongho Kim, Boyoung Kim
doaj +1 more source
INVESTIGATION OF CHANGES IN THE LEVEL OF NETWORK SECURITY BASED ON A COGNITIVE APPROACH
A study was conducted on the impact of the most significant threats on the level of network security based on the examination of impulse processes on a fuzzy cognitive map.
Olha Saliieva, Yurii Yaremchuk
doaj +1 more source
Information Security Management
From the definition of words based on the rule NBR ISO/IEC 17799:2001, and a company case study, this report searches to help the Information Security understanding, and also to get the conscience of the importance one should give to it, especially these days.
openaire +1 more source
A Formal Framework for Concrete Reputation Systems [PDF]
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction.
Krukow, K., Nielsen, M., Sassone, V.
core +2 more sources
The public security patrol path planning plays a key role in public security work, however, existing ones has varying degrees of shortcomings. To address these shortcomings, this paper proposes a public security patrol path planning recommendation method
Dongxing Wang +4 more
doaj +1 more source
Risk Prediction of Theft Crimes in Urban Communities: An Integrated Model of LSTM and ST-GCN
Urbanization has been speeding up social and economic transformations in urban communities, the smallest social units in a city. However, urbanization brings challenges to urban management and security.
Xinge Han +4 more
doaj +1 more source
Design and evaluation of a mobile-based nutrition education application for infertile women in Iran
Background The prevalence of infertility in Iran is higher than the world average. Furthermorte, education and nutrition are among the effective factors in improving the quality of life of women with infertility.
Mostafa Langarizadeh +2 more
doaj +1 more source
Interpreting the management of information systems security [PDF]
The management of adverse events within organisations has become a pressing issue as the perceptions of risk continue to heighten. However the basic need for developing secure information systems has remained unfulfilled.
Dhillon, Gurpreet
core
occumb: An R package for site occupancy modeling of eDNA metabarcoding data
This study introduces a new R package, occumb, for the convenient application of site occupancy modeling using environmental DNA (eDNA) metabarcoding data. We outline a data analysis workflow, including data setup, model fitting, model assessment, and comparison of potential study settings based on model predictions, all of which can be performed using
Keiichi Fukaya, Yuta Hasebe
wiley +1 more source
A surge in successful Information Security (IS) breaches targeting Research and Education (R&E) institutions highlights a pressing need for enhanced protection.
Šarūnas Grigaliūnas +4 more
doaj +1 more source

