Results 41 to 50 of about 2,389,131 (303)

Anomaly Detection Algorithms for Low-Dimensional and High-Dimensional Data: A Critical Study

open access: yesPakistan Journal of Engineering & Technology
Suspicious events or objects that differ from the norm in data can be discovered using anomaly identification. Identifying anomalies is critical for many applicable domains of life, e.g., preventing credit card theft and spotting intrusions into ...
Mujeeb Ur Rehman   +3 more
doaj   +1 more source

IT SECURITY MANAGEMENT IN SMALL AND MEDIUM ENTERPRISES [PDF]

open access: yesBuletin ştiinţific: Universitatea din Piteşti. Seria Ştiinţe Economice, 2017
The work concerns the problem of the management of security issues in Poland, especially in the perspective of Small and Medium Enterprises. The growth of Information and Telecommunication Technology has caused major impacts on business.
Zdzislaw POLKOWSKI, Jakub DYSARZ
doaj  

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Oneiric stress and safety and security at work: the discovery of a new universal symbol [PDF]

open access: yes, 2015
Cox and Griffiths define as psychosocial risks at work “those aspects of the planning, organization and management of work, which, along with their environmental and social contexts, may affect mental and physical health of the employees, directly or ...
Accettura, Antonella   +14 more
core   +1 more source

Design of security management model for communication networks in digital cultural consumption under Metaverse – The case of mobile game

open access: yesEgyptian Informatics Journal, 2023
Under Metaverse, security management of communication networks in digital cultural consumption has attracted more and more attention. As we know, security risks of communication networks caused by non-human factors are becoming weaker and weaker due to ...
Wei Gao   +4 more
doaj   +1 more source

XML Security in Certificate Management - XML Certificator [PDF]

open access: yes, 2009
The trend of rapid growing use of XML format in data/document management system reveals that security measures should be urgently considered into next generation's data/document systems.
Cripps, Nathan, Lu, Joan
core   +1 more source

IT Solution for Security Management in the Cadastral Field [PDF]

open access: yesInformatică economică, 2011
There are presented the particularities of cadastral system which should be reflected in the software development. It is shown as well the design of the cadastral software application.
Emanuil REDNIC
doaj  

Beck and beyond: Selling security in the world risk society [PDF]

open access: yes, 2010
©2010 British International Studies AssociationExpanding on the works of Beck and others on the growing business of risk, this article examines the role of the private security industry in the creation, management and perpetuation of the world risk ...
Krahmann, E
core   +1 more source

Economic security potential management mechanism of enterprises in the system of strategic decisions [PDF]

open access: yesSHS Web of Conferences, 2019
The article is devoted to the development of an economic security potential management mechanism of an enterprise in a dynamic external environment. Theoretical approaches to defining its essence are investigated, their systematization is carried out and
Arefieva Olena   +3 more
doaj   +1 more source

Outcomes and Surgical Management of Malignant Rhabdoid Tumor of the Kidney: A Report From the Pediatric Surgical Oncology Research Collaborative

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Malignant rhabdoid tumor of the kidney (MRTK) is a rare, aggressive tumor seen in young children. The optimal timing of resection for locally advanced tumors is not well‐defined. The purpose of this study is to evaluate modern oncologic outcomes and the impact of surgical timing. Methods A multicenter retrospective review was performed
Hannah N. Rinehardt   +76 more
wiley   +1 more source

Home - About - Disclaimer - Privacy