Results 31 to 40 of about 2,693,777 (322)
Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network
Privacy-preserving outsourcing algorithms for feature extraction not only reduce users' storage and computation overhead but also preserve the image privacy.
Xiaoqin Feng +4 more
doaj +1 more source
With the rapid development of tourism and the Internet industry, tourism activities have increasingly become a fashion behavior of people. The role of intelligent tourism resources in tourism activities has gradually become prominent.
Xiang Nan, Kayo kanato
doaj +1 more source
Modeling the information security management system (ISMS) of a medical organization [PDF]
The implementation of information security systems is one of the main components, without which the existence of any modern medical institution is impossible. This question is actual for the healthcare industry. This is confirmed by the presence of large-
Safonova O.M., Kotelnikov N.V.
doaj +1 more source
[Purpose/significance] The information security problems faced by smart cities under the big data environment are becoming more and more prominent.
Zou Kai +3 more
doaj +1 more source
Estimating ToE Risk Level using CVSS [PDF]
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal +1 more
core +3 more sources
The article discusses the problems of protecting the network infrastructure in the energy sector from various threats associated with external attacks (dangerous influences and intrusions).
E. P. Grabchak, E. L. Loginov
doaj +1 more source
Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus +6 more
wiley +1 more source
Som Based Assurance Assessment for Information Security Management System in Organization [PDF]
Information Security Management System (ISMS) has a lot of standards such as ISO/IEC 27001. In order to assess the quality assurance of ISMS, an organization should design and implement some mechanism.
Akhriza, T. M. (Tubagus)
core
Multi-Layer Cyber-Physical Security and Resilience for Smart Grid
The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system ...
CH Hauser +19 more
core +1 more source
Analysis of the legal framework for the information security management system of the NSМEP
Legal acts in the field of protection of banking transactions in the national system of mass electronic payments, its structure are considered. An analysis of the legal framework of banking activities has shown that it is generally based on international
Сергей Петрович Евсеев +2 more
semanticscholar +1 more source

