Results 31 to 40 of about 1,939,766 (365)

Digital technologies: tensions in privacy and data

open access: yesJournal of the Academy of Marketing Science, 2022
Driven by data proliferation, digital technologies have transformed the marketing landscape. In parallel, significant privacy concerns have shaken consumer–firm relationships, prompting changes in both regulatory interventions and people’s own privacy ...
Sara Quach   +4 more
semanticscholar   +1 more source

Jurisprudential and Legal Study of the Relationship between Surrogate Mother and the Child Born of Surrogacy [PDF]

open access: yesپژوهش‌نامه حقوق اسلامی, 2013
Using surrogacy as one of the new ways of supporting fertility in away that the owner of the womb (surrogate mother) does not have anycreational relationship (through ovum) with the child, merely raisingthe fetus of another couple and giving birth to it,
Najadali Almasi   +2 more
doaj   +1 more source

Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator

open access: yesSensors, 2021
During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or ...
Kyoungmin Kim   +3 more
doaj   +1 more source

Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective

open access: yesIEEE Access, 2021
This paper proposes a safe copy-back program operation in a NAND flash memory, which is targeting digital forensics for a variety of reasons. Due to the background management operation of the NAND flash memory, the original data is highly likely to ...
Na Young Ahn, Dong Hoon Lee
doaj   +1 more source

k-Anonymity: A Model for Protecting Privacy

open access: yesInt. J. Uncertain. Fuzziness Knowl. Based Syst., 2002
Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers.
L. Sweeney
semanticscholar   +1 more source

Data privacy [PDF]

open access: yesWIREs Data Mining and Knowledge Discovery, 2014
Data privacy studies methods, tools, and theory to avoid the disclosure of sensitive information. Its origin is in statistics with the goal to ensure the confidentiality of data gathered from census and questionnaires. The topic was latter introduced in computer science and more particularly in data mining, where due to the large amount of data ...
Vicenç Torra, Guillermo Navarro-Arribas
openaire   +6 more sources

Multiple sclerosis clinical decision support system based on projection to reference datasets

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 1863-1873, December 2022., 2022
Abstract Objective Multiple sclerosis (MS) is a multifactorial disease with increasingly complicated management. Our objective is to use on‐demand computational power to address the challenges of dynamically managing MS. Methods A phase 3 clinical trial data (NCT00906399) were used to contextualize the medication efficacy of peg‐interferon beta‐1a vs ...
Chadia Ed‐driouch   +13 more
wiley   +1 more source

The anterior nucleus of the thalamus plays a role in the epileptic network

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 2010-2024, December 2022., 2022
Abstract Objectives We investigated both the metabolic differences and interictal/ictal discharges of the anterior nucleus of the thalamus (ANT) in patients with epilepsy to clarify the relationship between the ANT and the epileptic network. Methods Nineteen patients with drug‐resistant epilepsy who underwent stereoelectroencephalography were studied ...
Hao Yan   +9 more
wiley   +1 more source

Adversarial attack and defense in reinforcement learning-from AI security view

open access: yesCybersecurity, 2019
Reinforcement learning is a core technology for modern artificial intelligence, and it has become a workhorse for AI applications ranging from Atrai Game to Connected and Automated Vehicle System (CAV).
Tong Chen   +5 more
doaj   +1 more source

Integral Cryptanalysis of Lightweight Block Cipher PIPO

open access: yesIEEE Access, 2022
PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations.
Sunyeop Kim   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy