Results 31 to 40 of about 2,693,777 (322)

Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network

open access: yesIEEE Access, 2018
Privacy-preserving outsourcing algorithms for feature extraction not only reduce users' storage and computation overhead but also preserve the image privacy.
Xiaoqin Feng   +4 more
doaj   +1 more source

Role of information security-based tourism management system in the intelligent recommendation of tourism resources

open access: yesMathematical Biosciences and Engineering, 2021
With the rapid development of tourism and the Internet industry, tourism activities have increasingly become a fashion behavior of people. The role of intelligent tourism resources in tourism activities has gradually become prominent.
Xiang Nan, Kayo kanato
doaj   +1 more source

Modeling the information security management system (ISMS) of a medical organization [PDF]

open access: yesE3S Web of Conferences, 2020
The implementation of information security systems is one of the main components, without which the existence of any modern medical institution is impossible. This question is actual for the healthcare industry. This is confirmed by the presence of large-
Safonova O.M., Kotelnikov N.V.
doaj   +1 more source

Research on the Construction of Smart City Information Security Assurance System under the Big Data Environment

open access: yesZhishi guanli luntan, 2021
[Purpose/significance] The information security problems faced by smart cities under the big data environment are becoming more and more prominent.
Zou Kai   +3 more
doaj   +1 more source

Estimating ToE Risk Level using CVSS [PDF]

open access: yes, 2009
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal   +1 more
core   +3 more sources

DEVELOPMENT OF INTELLIGENT METHODS FOR DETECTING NETWORK HAZARDOUS IMPACT AND PENETRATION BASED ON ANALYSIS OF THE BEHAVIORAL CHARACTERISTICS OF THE PROTECTED INFORMATION-CONTROL SYSTEM

open access: yesСовременная наука и инновации, 2022
The article discusses the problems of protecting the network infrastructure in the energy sector from various threats associated with external attacks (dangerous influences and intrusions).
E. P. Grabchak, E. L. Loginov
doaj   +1 more source

Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus   +6 more
wiley   +1 more source

Som Based Assurance Assessment for Information Security Management System in Organization [PDF]

open access: yes, 2010
Information Security Management System (ISMS) has a lot of standards such as ISO/IEC 27001. In order to assess the quality assurance of ISMS, an organization should design and implement some mechanism.
Akhriza, T. M. (Tubagus)
core  

Multi-Layer Cyber-Physical Security and Resilience for Smart Grid

open access: yes, 2018
The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system ...
CH Hauser   +19 more
core   +1 more source

Analysis of the legal framework for the information security management system of the NSМEP

open access: yes, 2015
Legal acts in the field of protection of banking transactions in the national system of mass electronic payments, its structure are considered. An analysis of the legal framework of banking activities has shown that it is generally based on international
Сергей Петрович Евсеев   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy