Results 21 to 30 of about 7,114,774 (349)

Attendees at 6:30 P.M. Meeting [PDF]

open access: yes, 1968
Attendees at 6:30 P.M. Meeting: The President, Secretary of State Rusk, Secretary of Defense Clifford, Secretary of Treasury Fowler, CIA Director Helms, Joint Chief of Staff Chairman Wheeler, and ...
National Security Council (U.S.)
core   +1 more source

Security-Informed Safety: Supporting Stakeholders with Codes of Practice [PDF]

open access: yes, 2018
Codes of practice provide principles and guidance on how organizations can incorporate security considerations into their safety engineering lifecycle and become more security ...
Bishop, P. G.   +3 more
core   +1 more source

Security in online learning assessment towards an effective trustworthiness approach to support e-learning teams [PDF]

open access: yes, 2014
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Caballé Llobet, Santiago   +3 more
core   +1 more source

A Survey on the Security of Blockchain Systems [PDF]

open access: yesFuture generations computer systems, 2017
Since its inception, the blockchain technology has shown promising application prospects. From the initial cryptocurrency to the current smart contract, blockchain has been applied to many fields.
Xiaoqi Li   +4 more
semanticscholar   +1 more source

Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation

open access: yesScientific Reports, 2023
Although numerous spatiotemporal approaches have been presented to address the problem of missing spatiotemporal data, there are still limitations in concurrently capturing the underlying spatiotemporal dependence of spatiotemporal graph data ...
Yifan Wang   +6 more
doaj   +1 more source

Secure Blocking + Secure Matching = Secure Record Linkage [PDF]

open access: yesJournal of Computing Science and Engineering, 2011
Performing approximate data matching has always been an intriguing problem for both industry and academia. This task becomes even more challenging when the requirement of data privacy rises. In this paper, we propose a novel technique to address the problem of efficient privacy-preserving approximate record linkage.
Alexandros Karakasidis   +1 more
openaire   +1 more source

Social Security Programs Throughout the World: The Americas, 2011 [PDF]

open access: yes, 2012
[Excerpt] This fourth issue in the current four-volume series of Social Security Programs Throughout the World reports on the countries of the Americas.
International Social Security Association   +1 more
core   +4 more sources

The impact of foreign markets globalization on the price and functionality of electronic access control systems [PDF]

open access: yesSHS Web of Conferences, 2021
Research background: The research, which is the subject of the paper, is based on the global expansion of the use of electronic access control systems using biometric data for user verification.
Boroš Martin, Lenko Filip, Velas Andrej
doaj   +1 more source

Reve\{a,i\}ling the risks: a phenomenology of information security [PDF]

open access: yes, 2009
In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have.
Pieters, Wolter
core   +4 more sources

Bone metastatic carcinoma coexisting with plasma cell myeloma: a case report

open access: yesJournal of Medical Case Reports, 2022
Objective Multiple myeloma is a clonal plasma cell proliferation often causing bone lytic lesions. It is sometimes challenging to differentiate these lytic lesions associated with multiple myeloma from bone destruction due to a metastasis.
Marwa Aloui   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy