Results 41 to 50 of about 3,727,125 (329)
SUPER: Towards the Use of Social Sensors for Security Assessments and Proactive Management of Emergencies [PDF]
Social media statistics during recent disasters (e.g. the 20 million tweets relating to 'Sandy' storm and the sharing of related photos in Instagram at a rate of 10/sec) suggest that the understanding and management of real-world events by civil ...
Kaltenbrunner, Andreas +6 more
core +1 more source
INVESTIGATION OF CHANGES IN THE LEVEL OF NETWORK SECURITY BASED ON A COGNITIVE APPROACH
A study was conducted on the impact of the most significant threats on the level of network security based on the examination of impulse processes on a fuzzy cognitive map.
Olha Saliieva, Yurii Yaremchuk
doaj +1 more source
How does intellectual capital align with cyber security? [PDF]
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen +2 more
core +3 more sources
A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo +3 more
core +2 more sources
The public security patrol path planning plays a key role in public security work, however, existing ones has varying degrees of shortcomings. To address these shortcomings, this paper proposes a public security patrol path planning recommendation method
Dongxing Wang +4 more
doaj +1 more source
Interpreting the management of information systems security [PDF]
The management of adverse events within organisations has become a pressing issue as the perceptions of risk continue to heighten. However the basic need for developing secure information systems has remained unfulfilled.
Dhillon, Gurpreet
core
Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus +6 more
wiley +1 more source
Intrusion Detection Systems (IDS) are vital to cybersecurity but suffer from severe class imbalance in benchmark datasets such as NSL-KDD and UNSW-NB15. Conventional oversampling methods (e.g., SMOTE, ADASYN) are efficient yet fail to preserve the latent
Chalerm Klinkhamhom +2 more
doaj +1 more source
INFORMATION SECURITY MANAGEMENT FRAMEWORK SUITABILITY ESTIMATION FOR SMALL AND MEDIUM ENTERPRISE
Information security is one of the key concerns of an enterprise or organization. To assure suitable management of information security a list of information security management frameworks has been developed by a number of institutions and authors.
Laima Kauspadiene +2 more
semanticscholar +1 more source
ABSTRACT Background In Ewing sarcoma (EwS), metastases, including those to bone marrow (BM), are the main factors influencing prognosis. Although reverse transcription polymerase chain reaction (RT‐PCR) offers greater sensitivity, the current EWING protocol defines BM metastases solely using light microscopic detection.
Thanh Pham +13 more
wiley +1 more source

