Results 41 to 50 of about 3,727,125 (329)

SUPER: Towards the Use of Social Sensors for Security Assessments and Proactive Management of Emergencies [PDF]

open access: yes, 2015
Social media statistics during recent disasters (e.g. the 20 million tweets relating to 'Sandy' storm and the sharing of related photos in Instagram at a rate of 10/sec) suggest that the understanding and management of real-world events by civil ...
Kaltenbrunner, Andreas   +6 more
core   +1 more source

INVESTIGATION OF CHANGES IN THE LEVEL OF NETWORK SECURITY BASED ON A COGNITIVE APPROACH

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
A study was conducted on the impact of the most significant threats on the level of network security based on the examination of impulse processes on a fuzzy cognitive map.
Olha Saliieva, Yurii Yaremchuk
doaj   +1 more source

How does intellectual capital align with cyber security? [PDF]

open access: yes, 2019
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen   +2 more
core   +3 more sources

A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]

open access: yes, 2020
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo   +3 more
core   +2 more sources

Public security patrol path planning recommendation method based on wolf-pack optimization algorithm using DAF and BRS

open access: yesScientific Reports
The public security patrol path planning plays a key role in public security work, however, existing ones has varying degrees of shortcomings. To address these shortcomings, this paper proposes a public security patrol path planning recommendation method
Dongxing Wang   +4 more
doaj   +1 more source

Interpreting the management of information systems security [PDF]

open access: yes, 1995
The management of adverse events within organisations has become a pressing issue as the perceptions of risk continue to heighten. However the basic need for developing secure information systems has remained unfulfilled.
Dhillon, Gurpreet
core  

Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus   +6 more
wiley   +1 more source

MIDS-GAN: Minority Intrusion Data Synthesizer GAN—An ACON Activated Conditional GAN for Minority Intrusion Detection

open access: yesMathematics
Intrusion Detection Systems (IDS) are vital to cybersecurity but suffer from severe class imbalance in benchmark datasets such as NSL-KDD and UNSW-NB15. Conventional oversampling methods (e.g., SMOTE, ADASYN) are efficient yet fail to preserve the latent
Chalerm Klinkhamhom   +2 more
doaj   +1 more source

INFORMATION SECURITY MANAGEMENT FRAMEWORK SUITABILITY ESTIMATION FOR SMALL AND MEDIUM ENTERPRISE

open access: yesTechnological and Economic Development of Economy, 2019
Information security is one of the key concerns of an enterprise or organization. To assure suitable management of information security a list of information security management frameworks has been developed by a number of institutions and authors.
Laima Kauspadiene   +2 more
semanticscholar   +1 more source

RT‐PCR–Based Detection of Bone Marrow Involvement in Ewing Sarcoma: Diagnostic Validity and Prognostic Relevance

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background In Ewing sarcoma (EwS), metastases, including those to bone marrow (BM), are the main factors influencing prognosis. Although reverse transcription polymerase chain reaction (RT‐PCR) offers greater sensitivity, the current EWING protocol defines BM metastases solely using light microscopic detection.
Thanh Pham   +13 more
wiley   +1 more source

Home - About - Disclaimer - Privacy