Results 81 to 90 of about 2,199,649 (286)
Calculation of risks of information security of telecommunication enterprise
The goal of this work is to identify and assess information security risks for a typical distributed information system within three controlled areas. The main emphasis, application of information security in the considered information system is done to ...
L. M. Il’chenko +3 more
doaj +1 more source
Knowledgehubs - meeting the water sector needs of the Asia-Pacific Region [PDF]
Information exchange, Information transfer, Capacity building, Research institutes, Stakeholders, Water resource management, Irrigation management, Food security, Asia, Pacific Islands ...
Manthrithilake, Herath
core
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone +11 more
wiley +1 more source
The Information Security Event Management Systems
The problem of using the information security event management systems in the large commercial organizations for revealing of security threats is considered.
V. V. Filatov
doaj
Enterprise Information Security Management Using Internet of Things Combined with Artificial Intelligence Technology. [PDF]
Sun H, Bai S.
europepmc +1 more source
The Challenge of Ensuring Business Security in Information Age [PDF]
Every day, thousands of businesses rely on the services and information ensured by information and communication networks. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity ...
Delia Mioara POPESCU +2 more
core
Photoswitching Conduction in Framework Materials
This mini‐review summarizes recent advances in state‐of‐the‐art proton and electron conduction in framework materials that can be remotely and reversibly switched on and off by light. It discusses the various photoswitching conduction mechanisms and the strategies employed to enhance photoswitched conductivity.
Helmy Pacheco Hernandez +4 more
wiley +1 more source
Enhancing Business-Specific Phishing Chat Detection via Few-Shot Learning LLM Augmentation
Phishing through one-on-one chat messages with customers poses significant threats to businesses, yet current detections are hindered by a lack of realistic, context-specific datasets.
Saran Hansakul, Nawaporn Wisitpongphan
doaj +1 more source
Networked Organizational Structure of Enterprise Information Security Management Based on Digital Transformation and Genetic Algorithm. [PDF]
Di Z, Liu Y, Li S.
europepmc +1 more source
IASME: Information Security Management Evolution for SMEs [PDF]
Most of the research in information risk and risk management has focused on the needs of larger organisations. In the area of standards accreditation, the ISO/IEC 27001 Information Risk Management standard has continued to grow in acceptance and ...
Booth, D., Dresner, D., Henson, Richard
core

