THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS [PDF]
The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002.
SABAU-POPA CLAUDIA DIANA+3 more
doaj
Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey
Wireless Sensor Networks (WSNs) are broadly applied for various applications in tracking and surveillance due to their ease of use and other distinctive characteristics compelled by real-time cooperation among the sensor nodes.
Lakshmana Kumar Ramasamy+5 more
doaj +1 more source
Social networks as an apparatus for managing of information security in the digital economy [PDF]
The paper aims to present a new apparatus for managing of the information security of the digital economy with using of social networks. A general problem for optimization of the information security management for participants in the digital economy is formulated.
arxiv
ABSTRACT Objective Music interventions have been shown to have beneficial effects on hemodynamic parameters, pain, and anxiety in various medical settings. However, music interventions in the setting of acute stroke have not been studied. The objective of this trial was to perform a pilot feasibility study of music interventions in the setting of acute
Jeffrey J. Fletcher+7 more
wiley +1 more source
SIERRA: Ranking Anomalous Activities in Enterprise Networks [PDF]
An enterprise today deploys multiple security middleboxes such as firewalls, IDS, IPS, etc. in its network to collect different kinds of events related to threats and attacks. These events are streamed into a SIEM (Security Information and Event Management) system for analysts to investigate and respond quickly with appropriate actions.
arxiv
Home‐Based Tele‐tDCS in Amyotrophic Lateral Sclerosis: Feasibility, Safety, and Preliminary Efficacy
ABSTRACT Objective Amyotrophic lateral sclerosis (ALS) is a progressive neurodegenerative disease with limited treatment options. Transcranial direct current stimulation (tDCS) shows promise as a neuromodulatory intervention in various neurological disorders, but its application in ALS, particularly in a remote, home‐based format, remains underexplored.
Sangeetha Madhavan+6 more
wiley +1 more source
The Role of Implementation of Service Management and Security Frameworks in Information Technology Service Continuity [PDF]
Competitive business environment and high dependency to the services has caused organizations to be evaluated based on the level of their ability in providing continuous services.
Soheila Jafarnezhad+1 more
doaj +1 more source
ABSTRACT Objective Sleep spindles are an electrophysiological fingerprint of the sleeping human brain. They can be described in terms of duration, frequency, amplitude, and density, and vary widely according to age and sex. Spindles play a role in sleep and wake functions and are altered in several neurological and psychiatric disorders.
Julien Coelho+8 more
wiley +1 more source
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security.
Igor Saenko+3 more
doaj +1 more source
Technical note: Efficient online source identification algorithm for integration within a contamination event management system [PDF]
Drinking water distribution networks are part of critical infrastructures and are exposed to a number of different risks. One of them is the risk of unintended or deliberate contamination of the drinking water within the pipe network.
J. Deuerlein, L. Meyer-Harries, N. Guth
doaj +1 more source